Item Search

NameAudit NamePluginCategory
1.3 Ensure no 'root' user account access key existsCIS Amazon Web Services Foundations v5.0.0 L1amazon_aws

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

1.3.6 Ensure the customer lockbox feature is enabledCIS Microsoft 365 Foundations E5 L2 v3.1.0microsoft_azure

ACCESS CONTROL

1.8 Ensure all Customer owned Amazon Machine Images for Application Tier are not shared publiclyCIS Amazon Web Services Three-tier Web Architecture L1 1.0.0amazon_aws

ACCESS CONTROL

2.4 Verify the groups within the DB2_GRP_LOOKUP environment variable are appropriate (Windows only)CIS IBM DB2 v10 v1.1.0 Windows OS Level 2Windows

ACCESS CONTROL

2.5 Verify the domains within the DB2DOMAINLIST environment variable are appropriate (Windows only)CIS IBM DB2 v10 v1.1.0 Windows OS Level 1Windows

ACCESS CONTROL

2.17 Set Sticky Bit on All World-Writable DirectoriesCIS Debian Linux 7 L1 v1.0.0Unix

ACCESS CONTROL

4.1 Ensure a SNS topic is created for sending out notifications from Cloudtwatch Alarms and Auto-Scaling Groups - List SNS SubscriptionsCIS Amazon Web Services Three-tier Web Architecture L1 1.0.0amazon_aws

ACCESS CONTROL

4.1 Restrict access to $CATALINA_HOMECIS Apache Tomcat 7 L1 v1.1.0Unix

ACCESS CONTROL

4.2 Ensure a SNS topic is created for sending out notifications from RDS events - List SNS SubscriptionsCIS Amazon Web Services Three-tier Web Architecture L1 1.0.0amazon_aws

ACCESS CONTROL

4.2 Restrict access to $CATALINA_BASECIS Apache Tomcat 7 L1 v1.1.0 MiddlewareUnix

ACCESS CONTROL

4.4 Restrict access to Tomcat logs directoryCIS Apache Tomcat 7 L1 v1.1.0Unix

ACCESS CONTROL

4.9 Restrict access to Tomcat catalina.propertiesCIS Apache Tomcat 7 L1 v1.1.0 MiddlewareUnix

ACCESS CONTROL

4.14 Restrict access to Tomcat web.xmlCIS Apache Tomcat 7 L1 v1.1.0Unix

ACCESS CONTROL

5.1.2.3 Ensure 'Restrict non-admin users from creating tenants' is set to 'Yes'CIS Microsoft 365 Foundations E3 L1 v3.1.0microsoft_azure

ACCESS CONTROL

5.1.4 Check Library folder for world writable filesCIS Apple macOS 10.13 L2 v1.1.0Unix

ACCESS CONTROL

5.2.1 Ensure that the cluster has at least one active policy control mechanism in placeCIS Kubernetes v1.10.0 L1 MasterUnix

ACCESS CONTROL

5.2.1 Ensure that the cluster has at least one active policy control mechanism in placeCIS Kubernetes v1.24 Benchmark v1.0.0 L1 MasterUnix

ACCESS CONTROL

5.3 Set Sticky Bit on World Writable DirectoriesCIS Solaris 10 L1 v5.2Unix

ACCESS CONTROL

5.6 Ensure Lockdown mode is enabledCIS VMware ESXi 6.5 v1.0.0 Level 1VMware

ACCESS CONTROL

6.4 Restrict Access to SYSCAT.COLAUTHCIS IBM DB2 v10 v1.1.0 Database Level 1IBM_DB2DB

ACCESS CONTROL

6.5 Restrict Access to SYSCAT.EVENTSCIS IBM DB2 9 Benchmark v3.0.1 Level 1 DBIBM_DB2DB

ACCESS CONTROL

6.7 Restrict Access to SYSCAT.ROUTINESCIS IBM DB2 v10 v1.1.0 Database Level 1IBM_DB2DB

ACCESS CONTROL

6.8 Restrict Access to SYSCAT.INDEXAUTHCIS IBM DB2 v10 v1.1.0 Database Level 2IBM_DB2DB

ACCESS CONTROL

6.8 Restrict Access to SYSCAT.INDEXAUTHCIS IBM DB2 9 Benchmark v3.0.1 Level 2 DBIBM_DB2DB

ACCESS CONTROL

6.10 Restrict Access to SYSCAT.PACKAGESCIS IBM DB2 v10 v1.1.0 Database Level 1IBM_DB2DB

ACCESS CONTROL

6.11 Restrict Access to SYSCAT.PASSTHRUAUTHCIS IBM DB2 v10 v1.1.0 Database Level 1IBM_DB2DB

ACCESS CONTROL

6.11 Restrict Access to SYSCAT.PASSTHRUAUTHCIS IBM DB2 9 Benchmark v3.0.1 Level 2 DBIBM_DB2DB

ACCESS CONTROL

6.15 Restrict Access to SYSCAT.ROLEAUTHCIS IBM DB2 v10 v1.1.0 Database Level 2IBM_DB2DB

ACCESS CONTROL

6.15 Restrict Access to SYSCAT.SECURITYLABELSCIS IBM DB2 9 Benchmark v3.0.1 Level 1 DBIBM_DB2DB

ACCESS CONTROL

6.15 Restrict Access to SYSCAT.SECURITYLABELSCIS IBM DB2 9 Benchmark v3.0.1 Level 2 DBIBM_DB2DB

ACCESS CONTROL

6.16 Restrict Access to SYSCAT.ROLESCIS IBM DB2 v10 v1.1.0 Database Level 1IBM_DB2DB

ACCESS CONTROL

6.17 Restrict Access to SYSCAT.ROUTINEAUTHCIS IBM DB2 v10 v1.1.0 Database Level 1IBM_DB2DB

ACCESS CONTROL

6.17 Restrict Access to SYSCAT.SECURITYPOLICYCOMPONENTRULESCIS IBM DB2 9 Benchmark v3.0.1 Level 2 DBIBM_DB2DB

ACCESS CONTROL

6.19 Restrict Access to SYSCAT.SURROGATEAUTHIDSCIS IBM DB2 9 Benchmark v3.0.1 Level 2 DBIBM_DB2DB

ACCESS CONTROL

6.20 Restrict Access to SYSCAT.ROLEAUTHCIS IBM DB2 9 Benchmark v3.0.1 Level 1 DBIBM_DB2DB

ACCESS CONTROL

6.22 Restrict Access to SYSCAT.ROUTINEAUTHCIS IBM DB2 9 Benchmark v3.0.1 Level 1 DBIBM_DB2DB

ACCESS CONTROL

6.22 Restrict Access to SYSCAT.TABAUTHCIS IBM DB2 v10 v1.1.0 Database Level 1IBM_DB2DB

ACCESS CONTROL

6.22 Restrict Access to SYSCAT.TABAUTHCIS IBM DB2 v10 v1.1.0 Database Level 2IBM_DB2DB

ACCESS CONTROL

6.23 Restrict Access to SYSCAT.SCHEMAAUTHCIS IBM DB2 9 Benchmark v3.0.1 Level 1 DBIBM_DB2DB

ACCESS CONTROL

6.23 Restrict Access to SYSCAT.TBSPACEAUTHCIS IBM DB2 v10 v1.1.0 Database Level 1IBM_DB2DB

ACCESS CONTROL

6.24 Restrict Access to SYSCAT.SCHEMATACIS IBM DB2 9 Benchmark v3.0.1 Level 1 DBIBM_DB2DB

ACCESS CONTROL

6.25 Restrict Access to SYSCAT.MODULEAUTHCIS IBM DB2 v10 v1.1.0 Database Level 2IBM_DB2DB

ACCESS CONTROL

6.27 Restrict Access to SYSCAT.PROCEDURESCIS IBM DB2 9 Benchmark v3.0.1 Level 2 DBIBM_DB2DB

ACCESS CONTROL

6.28 Restrict Access to SYSCAT.TABAUTHCIS IBM DB2 9 Benchmark v3.0.1 Level 1 DBIBM_DB2DB

ACCESS CONTROL

6.30 Restrict Access to TablespacesCIS IBM DB2 9 Benchmark v3.0.1 Level 1 DBIBM_DB2DB

ACCESS CONTROL

6.31 Restrict Access to SYSCAT.MODULEAUTHCIS IBM DB2 9 Benchmark v3.0.1 Level 1 DBIBM_DB2DB

ACCESS CONTROL

6.34 Restrict Access to SYSCAT.XSROBJECTAUTHCIS IBM DB2 9 Benchmark v3.0.1 Level 2 DBIBM_DB2DB

ACCESS CONTROL

6.35 Restrict Access to SYSIBMADM.OBJECTOWNERSCIS IBM DB2 9 Benchmark v3.0.1 Level 1 DBIBM_DB2DB

ACCESS CONTROL

8.5.5 Ensure meeting chat does not allow anonymous usersCIS Microsoft 365 Foundations E3 L2 v3.1.0microsoft_azure

ACCESS CONTROL

8.5.7 Ensure external participants can't give or request controlCIS Microsoft 365 Foundations E3 L1 v3.1.0microsoft_azure

ACCESS CONTROL