Item Search

NameAudit NamePluginCategory
1.1.39 Ensure that the --authorization-mode argument includes RBACCIS Kubernetes 1.13 Benchmark v1.4.1 L1Unix

SYSTEM AND INFORMATION INTEGRITY

1.3.7 Ensure that the --address argument is set to 127.0.0.1CIS Kubernetes 1.13 Benchmark v1.4.1 L1Unix

SYSTEM AND INFORMATION INTEGRITY

1.4.5 Disable MCS Translation Service (mcstrans)CIS Red Hat Enterprise Linux 5 L2 v2.2.1Unix

SYSTEM AND INFORMATION INTEGRITY

2.3 Ensure the WebDAV Modules Are DisabledCIS Apache HTTP Server 2.2 L1 v3.6.0Unix

SYSTEM AND INFORMATION INTEGRITY

2.4 Ensure 'Database Mail XPs' Server Configuration Option is set to '0'CIS SQL Server 2008 R2 DB Engine L1 v1.7.0MS_SQLDB

SYSTEM AND INFORMATION INTEGRITY

2.4 Ensure 'Database Mail XPs' Server Configuration Option is set to '0'CIS SQL Server 2014 Database L1 AWS RDS v1.5.0MS_SQLDB

SYSTEM AND INFORMATION INTEGRITY

2.7 Ensure 'Remote Admin Connections' Server Configuration Option is set to '0'CIS SQL Server 2012 Database L1 AWS RDS v1.6.0MS_SQLDB

SYSTEM AND INFORMATION INTEGRITY

2.8 Ensure the Info Module Is DisabledCIS Apache HTTP Server 2.2 L1 v3.6.0 MiddlewareUnix

SYSTEM AND INFORMATION INTEGRITY

2.9 Ensure the Basic and Digest Authentication Modules are Disabled - auth_basic_moduleCIS Apache HTTP Server 2.2 L1 v3.6.0Unix

SYSTEM AND INFORMATION INTEGRITY

2.9 Ensure the Basic and Digest Authentication Modules are Disabled - auth_digest_moduleCIS Apache HTTP Server 2.2 L1 v3.6.0Unix

SYSTEM AND INFORMATION INTEGRITY

2.11 Ensure SQL Server is configured to use non-standard portsCIS SQL Server 2012 Database L1 DB v1.6.0MS_SQLDB

SYSTEM AND INFORMATION INTEGRITY

2.11 Ensure SQL Server is configured to use non-standard portsCIS SQL Server 2014 Database L1 AWS RDS v1.5.0MS_SQLDB

SYSTEM AND INFORMATION INTEGRITY

2.11 Ensure Unnecessary SQL Server Protocols are set to 'Disabled' - 'VIA protocol is disabled'CIS SQL Server 2008 R2 DB OS L1 v1.7.0Windows

SYSTEM AND INFORMATION INTEGRITY

2.12 Ensure 'Hide Instance' option is set to 'Yes' for Production SQL Server instancesCIS SQL Server 2012 Database L1 DB v1.6.0MS_SQLDB

SYSTEM AND INFORMATION INTEGRITY

2.15 Ensure 'xp_cmdshell' Server Configuration Option is set to '0'CIS SQL Server 2012 Database L1 AWS RDS v1.6.0MS_SQLDB

SYSTEM AND INFORMATION INTEGRITY

3.1.4.1 If VLAN interfaces have IP addreses, configure anti spoofing / ingress filtering protectionsCIS Cisco NX-OS v1.2.0 L1Cisco

SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY

3.4.1 Ensure DCCP is disabled - lsmodCIS Distribution Independent Linux Server L2 v2.0.0Unix

SYSTEM AND INFORMATION INTEGRITY

3.4.2 Ensure SCTP is disabled - lsmodCIS Distribution Independent Linux Workstation L2 v2.0.0Unix

SYSTEM AND INFORMATION INTEGRITY

3.4.2 Ensure SCTP is disabled - modprobeCIS Distribution Independent Linux Server L2 v2.0.0Unix

SYSTEM AND INFORMATION INTEGRITY

3.4.3 Ensure RDS is disabled - modprobeCIS Distribution Independent Linux Server L2 v2.0.0Unix

SYSTEM AND INFORMATION INTEGRITY

3.5.2 Ensure SCTP is disabled - lsmodCIS Ubuntu Linux 18.04 LXD Host L2 Workstation v1.0.0Unix

SYSTEM AND INFORMATION INTEGRITY

3.5.2 Ensure SCTP is disabled - modprobeCIS Debian Family Workstation L2 v1.0.0Unix

SYSTEM AND INFORMATION INTEGRITY

4.1 Ensure a SNS topic is created for sending out notifications from Cloudtwatch Alarms and Auto-Scaling GroupsCIS Amazon Web Services Three-tier Web Architecture L1 1.0.0amazon_aws

ACCESS CONTROL, SYSTEM AND INFORMATION INTEGRITY

4.2 Ensure a SNS topic is created for sending out notifications from RDS eventsCIS Amazon Web Services Three-tier Web Architecture L1 1.0.0amazon_aws

ACCESS CONTROL, SYSTEM AND INFORMATION INTEGRITY

4.2.4 Enable AI /heuristic based malware detectionCIS Fortigate 7.0.x v1.3.0 L2FortiGate

SYSTEM AND INFORMATION INTEGRITY

4.2.14 Ensure that the --seccomp-default parameter is set to trueCIS Kubernetes v1.12.0 L1 Worker NodeUnix

SYSTEM AND INFORMATION INTEGRITY

5.2.21 Ensure SSH AllowTcpForwarding is disabledCIS Distribution Independent Linux Server L2 v2.0.0Unix

SYSTEM AND INFORMATION INTEGRITY

5.5 Ensure all WildFire session information settings are enabledCIS Palo Alto Firewall 7 Benchmark L1 v1.0.0Palo_Alto

SYSTEM AND INFORMATION INTEGRITY

5.5 Ensure all WildFire session information settings are enabledCIS Palo Alto Firewall 6 Benchmark L1 v1.0.0Palo_Alto

SYSTEM AND INFORMATION INTEGRITY

5.6 Ensure alerts are enabled for malicious files detected by WildFireCIS Palo Alto Firewall 6 Benchmark L1 v1.0.0Palo_Alto

SYSTEM AND INFORMATION INTEGRITY

5.6 Ensure alerts are enabled for malicious files detected by WildFireCIS Palo Alto Firewall 7 Benchmark L1 v1.0.0Palo_Alto

SYSTEM AND INFORMATION INTEGRITY

5.7 Ensure HTTP Request Methods Are Restricted - 'No Deny/Allow'CIS Apache HTTP Server 2.2 L2 v3.6.0Unix

SYSTEM AND INFORMATION INTEGRITY

5.9 Ensure Old HTTP Protocol Versions Are Disallowed - 'httpd.conf <VirtualHost> RewriteEngine = on'CIS Apache HTTP Server 2.2 L1 v3.6.0Unix

SYSTEM AND INFORMATION INTEGRITY

5.9 Ensure Old HTTP Protocol Versions Are Disallowed - Rewrite module not loadedCIS Apache HTTP Server 2.2 L1 v3.6.0Unix

SYSTEM AND INFORMATION INTEGRITY

5.9 Ensure Old HTTP Protocol Versions Are Disallowed - Rewrite module not loadedCIS Apache HTTP Server 2.2 L2 v3.6.0Unix

SYSTEM AND INFORMATION INTEGRITY

5.12 Ensure IP Address Based Requests Are Disallowed - 'httpd.conf RewriteEngine = on'CIS Apache HTTP Server 2.2 L2 v3.6.0 MiddlewareUnix

SYSTEM AND INFORMATION INTEGRITY

5.12 Ensure IP Address Based Requests Are Disallowed - 'httpd.conf RewriteRule ^.(.*) - [L,F] exists'CIS Apache HTTP Server 2.2 L2 v3.6.0Unix

SYSTEM AND INFORMATION INTEGRITY

5.13 Ensure the IP Addresses for Listening for Requests Are Specified - 'httpd.conf Listen 0.0.0.0:80 does not exists'CIS Apache HTTP Server 2.2 L2 v3.6.0 MiddlewareUnix

SYSTEM AND INFORMATION INTEGRITY

5.13 Ensure the IP Addresses for Listening for Requests Are Specified - 'httpd.conf Listen 80 does not exists'CIS Apache HTTP Server 2.2 L2 v3.6.0 MiddlewareUnix

SYSTEM AND INFORMATION INTEGRITY

6.4 Ensure DNS sinkholing is configured on all anti-spyware profiles in useCIS Palo Alto Firewall 6 Benchmark L1 v1.0.0Palo_Alto

SYSTEM AND INFORMATION INTEGRITY

6.4 Ensure DNS sinkholing is configured on all anti-spyware profiles in useCIS Palo Alto Firewall 7 Benchmark L1 v1.0.0Palo_Alto

SYSTEM AND INFORMATION INTEGRITY

6.5 Ensure passive DNS monitoring is set to enabled on all anti-spyware profiles in useCIS Palo Alto Firewall 6 Benchmark L1 v1.0.0Palo_Alto

SYSTEM AND INFORMATION INTEGRITY

6.5 Ensure passive DNS monitoring is set to enabled on all anti-spyware profiles in useCIS Palo Alto Firewall 7 Benchmark L1 v1.0.0Palo_Alto

SYSTEM AND INFORMATION INTEGRITY

6.7 Ensure a Vulnerability Protection Profile is set to block attacks against critical/high, and set to default on medium, low, and infoCIS Palo Alto Firewall 7 Benchmark L1 v1.0.0Palo_Alto

SYSTEM AND INFORMATION INTEGRITY

6.7 Ensure a Vulnerability Protection Profile is set to block attacks against critical/high, and set to default on medium, low, and infoCIS Palo Alto Firewall 6 Benchmark L1 v1.0.0Palo_Alto

SYSTEM AND INFORMATION INTEGRITY

6.8 Ensure a secure Vulnerability Protection Profile is applied to all security rules allowing trafficCIS Palo Alto Firewall 7 Benchmark L1 v1.0.0Palo_Alto

SYSTEM AND INFORMATION INTEGRITY

6.8 Ensure a secure Vulnerability Protection Profile is applied to all security rules allowing trafficCIS Palo Alto Firewall 6 Benchmark L1 v1.0.0Palo_Alto

SYSTEM AND INFORMATION INTEGRITY

8.1.15 Set 'Launching programs and unsafe files' to 'Enabled:Disable'CIS IE 10 v1.1.0Windows

SYSTEM AND INFORMATION INTEGRITY

CIS Control 3 (3.6(a)) Deploy Automated Software Patch Management ToolsCAS Implementation Group 1 Audit FileUnix

SYSTEM AND INFORMATION INTEGRITY

CIS Control 3 (3.6(b)) Deploy Automated Software Patch Management ToolsCAS Implementation Group 1 Audit FileUnix

SYSTEM AND INFORMATION INTEGRITY