Item Search

NameAudit NamePluginCategory
1.1.2.3.1 Ensure separate partition exists for /homeCIS Debian Linux 11 v2.0.0 L2 WorkstationUnix

ACCESS CONTROL, MEDIA PROTECTION

1.1.2.3.1 Ensure separate partition exists for /homeCIS Ubuntu Linux 24.04 LTS v1.0.0 L2 ServerUnix

ACCESS CONTROL, MEDIA PROTECTION

1.1.2.4.1 Ensure separate partition exists for /varCIS CentOS Linux 7 v4.0.0 L2 ServerUnix

ACCESS CONTROL, MEDIA PROTECTION

1.1.2.4.1 Ensure separate partition exists for /varCIS Ubuntu Linux 24.04 LTS v1.0.0 L2 ServerUnix

ACCESS CONTROL, MEDIA PROTECTION

1.1.2.4.1 Ensure separate partition exists for /varCIS Ubuntu Linux 24.04 LTS v1.0.0 L2 WorkstationUnix

ACCESS CONTROL, MEDIA PROTECTION

1.1.2.5.1 Ensure separate partition exists for /var/tmpCIS CentOS Linux 7 v4.0.0 L2 WorkstationUnix

ACCESS CONTROL, MEDIA PROTECTION

1.1.2.5.1 Ensure separate partition exists for /var/tmpCIS Debian Linux 11 v2.0.0 L2 WorkstationUnix

ACCESS CONTROL, MEDIA PROTECTION

1.3.1.4 Ensure all AppArmor Profiles are enforcingCIS Debian Linux 11 v2.0.0 L2 ServerUnix

ACCESS CONTROL, MEDIA PROTECTION

1.6.1.1 Ensure SELinux is installedCIS Fedora 28 Family Linux Workstation L1 v2.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

1.6.1.2 Ensure SELinux is not disabled in bootloader configurationCIS Fedora 28 Family Linux Workstation L1 v2.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

2.6.2 Ensure Guest Access to Shared Folders Is DisabledCIS Apple macOS 14.0 Sonoma Cloud-tailored v1.1.0 L1Unix

ACCESS CONTROL, MEDIA PROTECTION

4.2.2 Restrict Access to SYSCAT.AUDITUSECIS IBM DB2 11 v1.1.0 Database Level 1IBM_DB2DB

ACCESS CONTROL, MEDIA PROTECTION

4.2.5 Restrict Access to SYSCAT.COLGROUPDISTCIS IBM DB2 11 v1.1.0 Database Level 1IBM_DB2DB

ACCESS CONTROL, MEDIA PROTECTION

4.2.9 Restrict Access to SYSCAT.CONTROLDEPCIS IBM DB2 11 v1.1.0 Database Level 1IBM_DB2DB

ACCESS CONTROL, MEDIA PROTECTION

4.2.31 Restrict Access to SYSCAT.SERVEROPTIONSCIS IBM DB2 11 v1.1.0 Database Level 1IBM_DB2DB

ACCESS CONTROL, MEDIA PROTECTION

4.2.32 Restrict Access to SYSCAT.SCHEMAAUTHCIS IBM DB2 11 v1.1.0 Database Level 1IBM_DB2DB

ACCESS CONTROL, MEDIA PROTECTION

4.2.33 Restrict Access to SYSCAT.SCHEMATACIS IBM DB2 11 v1.1.0 Database Level 1IBM_DB2DB

ACCESS CONTROL, MEDIA PROTECTION

4.2.35 Restrict Access to SYSCAT.STATEMENTSCIS IBM DB2 11 v1.1.0 Database Level 1IBM_DB2DB

ACCESS CONTROL, MEDIA PROTECTION

4.2.36 Restrict Access to SYSCAT.STATEMENTTEXTSCIS IBM DB2 11 v1.1.0 Database Level 1IBM_DB2DB

ACCESS CONTROL, MEDIA PROTECTION

4.2.39 Restrict Access to SYSCAT.TBSPACEAUTHCIS IBM DB2 11 v1.1.0 Database Level 1IBM_DB2DB

ACCESS CONTROL, MEDIA PROTECTION

4.2.44 Restrict Access to SYSCAT.WRAPOPTIONSCIS IBM DB2 11 v1.1.0 Database Level 1IBM_DB2DB

ACCESS CONTROL, MEDIA PROTECTION

4.3.1 Restrict Access to SYSIBM.SYSAUDITPOLICIESCIS IBM DB2 11 v1.1.0 Database Level 1IBM_DB2DB

ACCESS CONTROL, MEDIA PROTECTION

4.3.23 Restrict Access to SYSIBM.SYSROUTINESCIS IBM DB2 11 v1.1.0 Database Level 1IBM_DB2DB

ACCESS CONTROL, MEDIA PROTECTION

5.1.2 Ensure permissions on /etc/crontab are configuredCIS Fedora 28 Family Linux Workstation L1 v2.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

5.1.4 Ensure permissions on /etc/cron.daily are configuredCIS Fedora 28 Family Linux Workstation L1 v2.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

5.1.7 Ensure No World Writable Files Exist in the Library FolderCIS Apple macOS 12.0 Monterey v4.0.0 L2Unix

ACCESS CONTROL, MEDIA PROTECTION

5.1.8 Ensure cron is restricted to authorized usersCIS Fedora 28 Family Linux Workstation L1 v2.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

5.1.9 Ensure at is restricted to authorized usersCIS Fedora 28 Family Linux Workstation L1 v2.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

5.2.4.1 Ensure audit log files are mode 0640 or less permissiveCIS Debian 10 Server L2 v2.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

5.2.4.3 Ensure only authorized users own audit log filesCIS CentOS Linux 7 v4.0.0 L2 ServerUnix

ACCESS CONTROL, MEDIA PROTECTION

5.2.4.3 Ensure only authorized users own audit log filesCIS CentOS Linux 7 v4.0.0 L2 WorkstationUnix

ACCESS CONTROL, MEDIA PROTECTION

5.2.4.4 Ensure the audit log directory is 0750 or more restrictiveCIS Debian 10 Server L2 v2.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

5.2.4.5 Ensure audit configuration files are 640 or more restrictiveCIS Debian 10 Server L2 v2.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

5.2.4.6 Ensure audit configuration files are owned by rootCIS CentOS Linux 7 v4.0.0 L2 WorkstationUnix

ACCESS CONTROL, MEDIA PROTECTION

5.2.4.7 Ensure audit configuration files belong to group rootCIS CentOS Linux 7 v4.0.0 L2 WorkstationUnix

ACCESS CONTROL, MEDIA PROTECTION

5.2.4.8 Ensure audit tools are 755 or more restrictiveCIS Debian 10 Server L2 v2.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

5.2.4.9 Ensure audit tools are owned by rootCIS CentOS Linux 7 v4.0.0 L2 WorkstationUnix

ACCESS CONTROL, MEDIA PROTECTION

6.1.14 Audit SUID executablesCIS Fedora 28 Family Linux Workstation L1 v2.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

6.1.14 Audit system file permissionsCIS CentOS Linux 7 v4.0.0 L2 ServerUnix

ACCESS CONTROL, MEDIA PROTECTION

6.2.4.1 Ensure audit log files mode is configuredCIS Ubuntu Linux 24.04 LTS v1.0.0 L2 ServerUnix

ACCESS CONTROL, MEDIA PROTECTION

6.2.4.2 Ensure audit log files owner is configuredCIS Ubuntu Linux 24.04 LTS v1.0.0 L2 ServerUnix

ACCESS CONTROL, MEDIA PROTECTION

6.2.4.5 Ensure audit configuration files mode is configuredCIS Ubuntu Linux 24.04 LTS v1.0.0 L2 ServerUnix

ACCESS CONTROL, MEDIA PROTECTION

6.2.4.10 Ensure audit tools group owner is configuredCIS Ubuntu Linux 24.04 LTS v1.0.0 L2 ServerUnix

ACCESS CONTROL, MEDIA PROTECTION

6.2.4.10 Ensure audit tools group owner is configuredCIS Ubuntu Linux 24.04 LTS v1.0.0 L2 WorkstationUnix

ACCESS CONTROL, MEDIA PROTECTION

6.4.4.3 Ensure audit log files group owner is configuredCIS Debian Linux 11 v2.0.0 L2 ServerUnix

ACCESS CONTROL, MEDIA PROTECTION

6.4.4.6 Ensure audit configuration files owner is configuredCIS Debian Linux 11 v2.0.0 L2 ServerUnix

ACCESS CONTROL, MEDIA PROTECTION

6.4.4.8 Ensure audit tools mode is configuredCIS Debian Linux 11 v2.0.0 L2 ServerUnix

ACCESS CONTROL, MEDIA PROTECTION

6.4.4.8 Ensure audit tools mode is configuredCIS Debian Linux 11 v2.0.0 L2 WorkstationUnix

ACCESS CONTROL, MEDIA PROTECTION

WA000-WI030 IIS6 - The IUSR_machinename account must not have read access to the .inc files or their equivalent. - '.inc'DISA STIG IIS 6.0 Site Checklist v6r16Windows

ACCESS CONTROL

WA000-WI6040 IIS6 - A unique non-privileged account must be used to run Worker Process Identities. - 'AppPoolIdentityType = 3 - WAMUserName'DISA STIG IIS 6.0 Site Checklist v6r16Windows

ACCESS CONTROL