2.9 Ensure Dbcreator and Securityadmin roles are only used as needed | CIS Microsoft SharePoint 2016 DB v1.1.0 | MS_SQLDB | ACCESS CONTROL |
2.9 Isolate BIND with chroot'ed Subdirectory | CIS BIND DNS v3.0.1 Authoritative Name Server | Unix | ACCESS CONTROL |
3.1 Set a nondeterministic Shutdown command value | CIS Apache Tomcat 8 L1 v1.1.0 | Unix | ACCESS CONTROL |
3.1.3 Require explicit authorization for cataloging | CIS IBM DB2 v10 v1.1.0 Windows OS Level 2 | Windows | ACCESS CONTROL |
5.1.8 Ensure at/cron is restricted to authorized users - '/etc/at.allow' | CIS Ubuntu Linux 14.04 LTS Workstation L1 v2.1.0 | Unix | ACCESS CONTROL |
5.1.8 Ensure at/cron is restricted to authorized users - '/etc/cron.deny' | CIS Ubuntu Linux 14.04 LTS Workstation L1 v2.1.0 | Unix | ACCESS CONTROL |
5.4 Ensure privileged containers are not used | CIS Docker Community Edition v1.1.0 L1 Docker | Unix | ACCESS CONTROL |
5.5 Ensure root login is restricted to system console | CIS Ubuntu Linux 14.04 LTS Workstation L1 v2.1.0 | Unix | ACCESS CONTROL |
5.6 Ensure access to the su command is restricted | CIS Ubuntu Linux 14.04 LTS Workstation L1 v2.1.0 | Unix | ACCESS CONTROL |
6.1.13 Audit SUID executables | CIS Ubuntu Linux 14.04 LTS Server L1 v2.1.0 | Unix | ACCESS CONTROL |
6.1.13 Audit SUID executables | CIS Ubuntu Linux 14.04 LTS Workstation L1 v2.1.0 | Unix | ACCESS CONTROL |
6.2.5 Ensure root is the only UID 0 account | CIS Ubuntu Linux 14.04 LTS Workstation L1 v2.1.0 | Unix | ACCESS CONTROL |
6.9 Restrict at/cron To Authorized Users - should pass if /etc/cron.d/at.deny does not exist. | CIS Solaris 10 L1 v5.2 | Unix | ACCESS CONTROL |
6.10.5.9 Ensure REST Connection Limit is Set | CIS Juniper OS Benchmark v2.1.0 L1 | Juniper | ACCESS CONTROL |
6.13 Restrict at/cron to Authorized Users - /etc/cron.d/at.allow perms | CIS Solaris 11.1 L1 v1.0.0 | Unix | ACCESS CONTROL |
6.13 Restrict at/cron to Authorized Users - /etc/cron.d/at.allow perms | CIS Solaris 11.2 L1 v1.1.0 | Unix | ACCESS CONTROL |
6.13 Restrict at/cron to Authorized Users - /etc/cron.d/at.allow perms | CIS Solaris 11 L1 v1.1.0 | Unix | ACCESS CONTROL |
6.13 Restrict at/cron to Authorized Users - /etc/cron.d/at.deny | CIS Solaris 11.2 L1 v1.1.0 | Unix | ACCESS CONTROL |
6.13 Restrict at/cron to Authorized Users - /etc/cron.d/cron.allow perms | CIS Solaris 11 L1 v1.1.0 | Unix | ACCESS CONTROL |
7.1 Establish an administrator group | CIS IBM DB2 9 Benchmark v3.0.1 Level 2 OS Windows | Windows | ACCESS CONTROL |
7.3 Secure SYSMAINT Authority | CIS IBM DB2 v10 v1.1.0 Windows OS Level 2 | Windows | ACCESS CONTROL |
7.4 Establish a system monitoring group | CIS IBM DB2 9 Benchmark v3.0.1 Level 1 OS Windows | Windows | ACCESS CONTROL |
9.1.8 Restrict at/cron to Authorized Users - /etc/at.allow | CIS Debian Linux 7 L1 v1.0.0 | Unix | ACCESS CONTROL |
9.1.8 Restrict at/cron to Authorized Users - /etc/cron.deny | CIS Debian Linux 7 L1 v1.0.0 | Unix | ACCESS CONTROL |
Allow user control over installs | MSCT Windows Server 2016 MS v1.0.0 | Windows | ACCESS CONTROL |
Always install with elevated privileges | MSCT Windows Server 2019 MS v1.0.0 | Windows | ACCESS CONTROL |
Big Sur - Require Administrator Password to Modify System-Wide Preferences | NIST macOS Big Sur v1.4.0 - 800-53r4 High | Unix | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION |
Big Sur - Require Administrator Password to Modify System-Wide Preferences | NIST macOS Big Sur v1.4.0 - 800-53r5 Moderate | Unix | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION |
Catalina - Require Administrator Password to Modify System-Wide Preferences | NIST macOS Catalina v1.5.0 - 800-53r5 High | Unix | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION |
Disallow WinRM from storing RunAs credentials | MSCT Windows Server 2016 DC v1.0.0 | Windows | ACCESS CONTROL |
Enable local admin password management | MSCT Windows Server 2019 MS v1.0.0 | Windows | ACCESS CONTROL |
Ensure access to the su command is restricted - pam_wheel.so | Tenable Cisco Firepower Management Center OS Best Practices Audit | Unix | ACCESS CONTROL |
Ensure core dumps are restricted - limits.conf | Tenable Cisco Firepower Management Center OS Best Practices Audit | Unix | ACCESS CONTROL |
Ensure core dumps are restricted - sysctl | Tenable Cisco Firepower Management Center OS Best Practices Audit | Unix | ACCESS CONTROL |
Ensure noexec option set on /var/tmp partition | Tenable Cisco Firepower Management Center OS Best Practices Audit | Unix | ACCESS CONTROL |
Enumerate administrator accounts on elevation | MSCT Windows 10 v1507 v1.0.0 | Windows | ACCESS CONTROL |
Network access: Do not allow anonymous enumeration of SAM accounts | MSCT Windows Server 2016 DC v1.0.0 | Windows | ACCESS CONTROL |
Network access: Do not allow anonymous enumeration of SAM accounts | MSCT Windows Server 2016 MS v1.0.0 | Windows | ACCESS CONTROL |
Network access: Do not allow anonymous enumeration of SAM accounts | MSCT Windows Server 2019 MS v1.0.0 | Windows | ACCESS CONTROL |
Network access: Do not allow anonymous enumeration of SAM accounts | MSCT Windows 10 v1507 v1.0.0 | Windows | ACCESS CONTROL |
Network access: Do not allow anonymous enumeration of SAM accounts and shares | MSCT Windows Server 2016 DC v1.0.0 | Windows | ACCESS CONTROL |
Network security: Allow LocalSystem NULL session fallback | MSCT Windows Server 2019 DC v1.0.0 | Windows | ACCESS CONTROL |
Turn on convenience PIN sign-in | MSCT Windows 10 v1507 v1.0.0 | Windows | ACCESS CONTROL |
User Account Control: Admin Approval Mode for the Built-in Administrator account | MSCT Windows Server 2016 DC v1.0.0 | Windows | ACCESS CONTROL |
User Account Control: Admin Approval Mode for the Built-in Administrator account | MSCT Windows Server 2016 MS v1.0.0 | Windows | ACCESS CONTROL |
User Account Control: Allow UIAccess applications to prompt for elevation without using the secure desktop. | MSCT Windows Server 2016 DC v1.0.0 | Windows | ACCESS CONTROL |
User Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode | MSCT Windows Server 2016 DC v1.0.0 | Windows | ACCESS CONTROL |
User Account Control: Behavior of the elevation prompt for standard users | MSCT Windows Server 2016 DC v1.0.0 | Windows | ACCESS CONTROL |
User Account Control: Only elevate UIAccess applications that are installed in secure locations | MSCT Windows Server 2012 R2 MS v1.0.0 | Windows | ACCESS CONTROL |
User Account Control: Run all administrators in Admin Approval Mode | MSCT Windows Server 2012 R2 MS v1.0.0 | Windows | ACCESS CONTROL |