1.3 Ensure Installation of Community Packages | CIS PostgreSQL 9.5 OS v1.1.0 | Unix | SYSTEM AND INFORMATION INTEGRITY |
1.5 Enable OS X update installs | CIS Apple OSX 10.11 El Capitan L1 v1.1.0 | Unix | SYSTEM AND INFORMATION INTEGRITY |
2.1.2 Ensure X Window System is not installed | CIS Google Container-Optimized OS v1.2.0 L1 Server | Unix | CONFIGURATION MANAGEMENT |
2.1.7 Set 'no service pad' | CIS Cisco IOS XE 17.x v2.1.1 L1 | Cisco | CONFIGURATION MANAGEMENT |
2.1.8 Set 'no service pad' | CIS Cisco IOS XE 16.x v2.1.0 L1 | Cisco | SYSTEM AND INFORMATION INTEGRITY |
2.1.19 Ensure xinetd services are not in use | CIS Debian Linux 11 v2.0.0 L1 Workstation | Unix | CONFIGURATION MANAGEMENT |
2.1.19 Ensure xinetd services are not in use | CIS Ubuntu Linux 22.04 LTS v2.0.0 L1 Server | Unix | CONFIGURATION MANAGEMENT |
2.1.20 Ensure X window server services are not in use | CIS AlmaLinux OS 9 v2.0.0 L2 Server | Unix | CONFIGURATION MANAGEMENT |
2.1.20 Ensure X window server services are not in use | CIS Debian Linux 12 v1.1.0 L2 Server | Unix | CONFIGURATION MANAGEMENT |
2.1.20 Ensure X window server services are not in use | CIS Red Hat Enterprise Linux 9 v2.0.0 L2 Server | Unix | CONFIGURATION MANAGEMENT |
2.1.20 Ensure X window server services are not in use | CIS Ubuntu Linux 22.04 LTS v2.0.0 L2 Server | Unix | CONFIGURATION MANAGEMENT |
2.1.21 Ensure X window server services are not in use | CIS SUSE Linux Enterprise 15 v2.0.0 L2 Server | Unix | CONFIGURATION MANAGEMENT |
2.2.1 Ensure xorg-x11-server-common is not installed | CIS Amazon Linux 2023 Server L2 v1.0.0 | Unix | CONFIGURATION MANAGEMENT |
2.2.2 Ensure X Window System is not installed | CIS Debian 8 Server L1 v2.0.2 | Unix | CONFIGURATION MANAGEMENT |
2.2.2 Ensure X Window System is not installed | CIS Debian 9 Server L1 v1.0.1 | Unix | CONFIGURATION MANAGEMENT |
2.2.2 Ensure X11 Server components are not installed | CIS Red Hat Enterprise Linux 7 STIG v2.0.0 L1 Server | Unix | CONFIGURATION MANAGEMENT |
2.2.2 Ensure X11 Server components are not installed | CIS SUSE Linux Enterprise 12 v3.2.1 L1 Server | Unix | CONFIGURATION MANAGEMENT |
2.2.2 Ensure X11 Server components are not installed - systemctl | CIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIG | Unix | CONFIGURATION MANAGEMENT |
2.2.19 Ensure xinetd services are not in use | CIS Red Hat EL8 Server L1 v3.0.0 | Unix | CONFIGURATION MANAGEMENT |
2.2.19 Ensure xinetd services are not in use | CIS Red Hat EL8 Workstation L1 v3.0.0 | Unix | CONFIGURATION MANAGEMENT |
2.2.19 Ensure xinetd services are not in use | CIS Rocky Linux 8 Workstation L1 v2.0.0 | Unix | CONFIGURATION MANAGEMENT |
2.2.19 Ensure xinetd services are not in use | CIS Oracle Linux 8 Server L1 v3.0.0 | Unix | CONFIGURATION MANAGEMENT |
2.2.20 Ensure X window server services are not in use | CIS Rocky Linux 8 Server L2 v2.0.0 | Unix | CONFIGURATION MANAGEMENT |
2.7.2 iCloud keychain | CIS Apple OSX 10.11 El Capitan L2 v1.1.0 | Unix | |
6.1 Ensure the X Window system is not installed | CIS Debian Linux 7 L1 v1.0.0 | Unix | CONFIGURATION MANAGEMENT |
7.1 Wireless technology on OS X | CIS Apple OSX 10.9 L2 v1.3.0 | Unix | |
18 - Kerberos 5 and Krb5p | NetApp Security Hardening Guide for ONTAP 9 v1.7.0 | Netapp_API | |
Allow Active X One Off Forms | MSCT Office 2016 v1.0.0 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
Allow Active X One Off Forms | MSCT M365 Apps for enterprise 2312 v1.0.0 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
Big Sur - Disable Wi-Fi Interface | NIST macOS Big Sur v1.4.0 - 800-53r4 High | Unix | ACCESS CONTROL |
Big Sur - Disable Wi-Fi Interface | NIST macOS Big Sur v1.4.0 - 800-53r5 Low | Unix | ACCESS CONTROL |
Big Sur - Disable Wi-Fi Interface | NIST macOS Big Sur v1.4.0 - CNSSI 1253 | Unix | ACCESS CONTROL |
Catalina - Disable Wi-Fi Interface | NIST macOS Catalina v1.5.0 - All Profiles | Unix | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION |
Catalina - Disable Wi-Fi Interface | NIST macOS Catalina v1.5.0 - CNSSI 1253 | Unix | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION |
Catalina - Disable Wi-Fi Interface | NIST macOS Catalina v1.5.0 - 800-53r4 Low | Unix | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION |
Catalina - Disable Wi-Fi Interface | NIST macOS Catalina v1.5.0 - 800-53r5 High | Unix | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION |
Catalina - Disable Wi-Fi Interface | NIST macOS Catalina v1.5.0 - 800-53r5 Moderate | Unix | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION |
GEN000000-LNX00360 - The X server must have the correct options enabled - ':0 /usr/bin/X:0' | DISA STIG for Oracle Linux 5 v2r1 | Unix | CONFIGURATION MANAGEMENT |
GEN005220 - .Xauthority or X*.hosts (or equivalent) file(s) must be used to restrict access to the X server. | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | CONFIGURATION MANAGEMENT |
GEN005220 - .Xauthority or X*.hosts (or equivalent) file(s) must be used to restrict access to the X server. | DISA STIG Solaris 10 X86 v2r4 | Unix | CONFIGURATION MANAGEMENT |
GEN005220 - .Xauthority or X*.hosts (or equivalent) file(s) must be used to restrict access to the X server. | DISA STIG Solaris 10 SPARC v2r4 | Unix | CONFIGURATION MANAGEMENT |
GEN005240 - The .Xauthority utility must only permit access to authorized hosts. | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
GEN005240 - The .Xauthority utility must only permit access to authorized hosts. | DISA STIG Solaris 10 X86 v2r4 | Unix | CONFIGURATION MANAGEMENT |
Monterey - Disable Wi-Fi Interface | NIST macOS Monterey v1.0.0 - 800-53r5 Low | Unix | ACCESS CONTROL |
Monterey - Disable Wi-Fi Interface | NIST macOS Monterey v1.0.0 - All Profiles | Unix | ACCESS CONTROL |
Monterey - Disable Wi-Fi Interface | NIST macOS Monterey v1.0.0 - CNSSI 1253 | Unix | ACCESS CONTROL |
Monterey - Disable Wi-Fi Interface | NIST macOS Monterey v1.0.0 - 800-53r4 High | Unix | ACCESS CONTROL |
Monterey - Disable Wi-Fi Interface | NIST macOS Monterey v1.0.0 - 800-53r5 High | Unix | ACCESS CONTROL |
OL07-00-010492 - Oracle Linux operating systems version 7.2 or newer booted with United Extensible Firmware Interface (UEFI) must have a unique name for the grub superusers account when booting into single-user mode and maintenance. | DISA Oracle Linux 7 STIG v3r2 | Unix | ACCESS CONTROL |
RHEL-08-010141 - RHEL 8 operating systems booted with United Extensible Firmware Interface (UEFI) must require a unique superusers name upon booting into single-user mode and maintenance. | DISA Red Hat Enterprise Linux 8 STIG v2r3 | Unix | ACCESS CONTROL |