1.4 Only allow trusted users to control Docker daemon | CIS Docker 1.13.0 v1.0.0 L1 Linux | Unix | ACCESS CONTROL |
1.5.5 Set the ACL for each 'snmp-server community' | CIS Cisco IOS 12 L1 v4.0.0 | Cisco | ACCESS CONTROL |
1.5.7 Set 'snmp-server host' when using SNMP | CIS Cisco IOS 12 L1 v4.0.0 | Cisco | ACCESS CONTROL |
1.7 Ensure all Customer owned Amazon Machine Images for Web Tier are not shared publicly | CIS Amazon Web Services Three-tier Web Architecture L1 1.0.0 | amazon_aws | ACCESS CONTROL |
2.4 Verify the groups within the DB2_GRP_LOOKUP environment variable are appropriate (Windows only) | CIS IBM DB2 v10 v1.1.0 Windows OS Level 1 | Windows | ACCESS CONTROL |
4.1 Create a user for the container | CIS Docker 1.13.0 v1.0.0 L1 Docker | Unix | ACCESS CONTROL |
4.1 Restrict access to $CATALINA_HOME | CIS Apache Tomcat 7 L1 v1.1.0 Middleware | Unix | ACCESS CONTROL |
4.4.12 Ensure security constraints are specified to protect web applications | CIS IBM WebSphere Liberty v1.0.0 L1 | Unix | ACCESS CONTROL |
4.5 Restrict access to Tomcat temp directory | CIS Apache Tomcat 7 L1 v1.1.0 | Unix | ACCESS CONTROL |
4.6 Restrict access to Tomcat binaries directory | CIS Apache Tomcat 7 L1 v1.1.0 Middleware | Unix | ACCESS CONTROL |
4.7 Restrict access to Tomcat web application directory | CIS Apache Tomcat 7 L1 v1.1.0 | Unix | ACCESS CONTROL |
4.8 Restrict access to Tomcat catalina.policy | CIS Apache Tomcat 7 L1 v1.1.0 | Unix | ACCESS CONTROL |
4.9 Restrict access to Tomcat catalina.properties | CIS Apache Tomcat 7 L1 v1.1.0 | Unix | ACCESS CONTROL |
4.11 Restrict access to Tomcat logging.properties | CIS Apache Tomcat 7 L1 v1.1.0 Middleware | Unix | ACCESS CONTROL |
4.12 Restrict access to Tomcat server.xml | CIS Apache Tomcat 7 L1 v1.1.0 Middleware | Unix | ACCESS CONTROL |
4.14 Restrict access to Tomcat web.xml | CIS Apache Tomcat 7 L1 v1.1.0 Middleware | Unix | ACCESS CONTROL |
5.1.3 Check System folder for world writable files | CIS Apple macOS 10.12 L1 v1.2.0 | Unix | ACCESS CONTROL |
6.1 Restrict Access to SYSCAT.AUDITPOLICIES | CIS IBM DB2 v10 v1.1.0 Database Level 1 | IBM_DB2DB | ACCESS CONTROL |
6.1 Restrict Access to SYSCAT.AUDITPOLICIES | CIS IBM DB2 9 Benchmark v3.0.1 Level 1 DB | IBM_DB2DB | ACCESS CONTROL |
6.1 Restrict Access to SYSCAT.AUDITPOLICIES | CIS IBM DB2 9 Benchmark v3.0.1 Level 2 DB | IBM_DB2DB | ACCESS CONTROL |
6.2 Restrict Access to SYSCAT.AUDITUSE | CIS IBM DB2 9 Benchmark v3.0.1 Level 2 DB | IBM_DB2DB | ACCESS CONTROL |
6.4.2 Do Not Allow Trusted Context to Switch Users Without Authentication | CIS IBM DB2 11 v1.1.0 Database Level 1 | IBM_DB2DB | ACCESS CONTROL |
6.5 Restrict Access to SYSCAT.EVENTS | CIS IBM DB2 v10 v1.1.0 Database Level 2 | IBM_DB2DB | ACCESS CONTROL |
6.7 Restrict Access to SYSCAT.ROUTINES | CIS IBM DB2 v10 v1.1.0 Database Level 2 | IBM_DB2DB | ACCESS CONTROL |
6.9 Restrict Access to SYSCAT.PACKAGEAUTH | CIS IBM DB2 v10 v1.1.0 Database Level 1 | IBM_DB2DB | ACCESS CONTROL |
6.9 Restrict Access to SYSCAT.PACKAGEAUTH | CIS IBM DB2 v10 v1.1.0 Database Level 2 | IBM_DB2DB | ACCESS CONTROL |
6.9 Restrict Access to SYSCAT.PACKAGEAUTH | CIS IBM DB2 9 Benchmark v3.0.1 Level 2 DB | IBM_DB2DB | ACCESS CONTROL |
6.16 Restrict Access to SYSCAT.SECURITYPOLICIES | CIS IBM DB2 9 Benchmark v3.0.1 Level 2 DB | IBM_DB2DB | ACCESS CONTROL |
6.17 Restrict Access to SYSCAT.SECURITYPOLICYCOMPONENTRULES | CIS IBM DB2 9 Benchmark v3.0.1 Level 1 DB | IBM_DB2DB | ACCESS CONTROL |
6.20 Restrict Access to SYSCAT.SEQUENCEAUTH | CIS IBM DB2 v10 v1.1.0 Database Level 2 | IBM_DB2DB | ACCESS CONTROL |
6.21 Restrict Access to SYSCAT.ROLES | CIS IBM DB2 9 Benchmark v3.0.1 Level 2 DB | IBM_DB2DB | ACCESS CONTROL |
6.23 Restrict Access to SYSCAT.TBSPACEAUTH | CIS IBM DB2 v10 v1.1.0 Database Level 2 | IBM_DB2DB | ACCESS CONTROL |
6.24 Restrict Access to SYSCAT.SCHEMATA | CIS IBM DB2 9 Benchmark v3.0.1 Level 2 DB | IBM_DB2DB | ACCESS CONTROL |
6.24 Restrict Access to Tablespaces | CIS IBM DB2 v10 v1.1.0 Database Level 2 | IBM_DB2DB | ACCESS CONTROL |
6.25 Restrict Access to SYSCAT.SEQUENCEAUTH | CIS IBM DB2 9 Benchmark v3.0.1 Level 2 DB | IBM_DB2DB | ACCESS CONTROL |
6.29 Restrict Access to SYSCAT.TBSPACEAUTH | CIS IBM DB2 9 Benchmark v3.0.1 Level 1 DB | IBM_DB2DB | ACCESS CONTROL |
6.33 Restrict Access to SYSCAT.WORKLOADAUTH | CIS IBM DB2 9 Benchmark v3.0.1 Level 1 DB | IBM_DB2DB | ACCESS CONTROL |
6.33 Restrict Access to SYSCAT.WORKLOADAUTH | CIS IBM DB2 9 Benchmark v3.0.1 Level 2 DB | IBM_DB2DB | ACCESS CONTROL |
7.1 Disable System Accounts - Ensure account 'daemon' is locked. | CIS Solaris 10 L1 v5.2 | Unix | ACCESS CONTROL |
7.1 Disable System Accounts - Ensure account 'listen' is locked. | CIS Solaris 10 L1 v5.2 | Unix | ACCESS CONTROL |
7.1 Disable System Accounts - Ensure account 'nobody4' is locked. | CIS Solaris 10 L1 v5.2 | Unix | ACCESS CONTROL |
7.1 Disable System Accounts - Ensure account 'webservd' is locked. | CIS Solaris 10 L1 v5.2 | Unix | ACCESS CONTROL |
7.1 Disable System Accounts - should pass if the default shell for 'listen' is set to /usr/bin/false. | CIS Solaris 10 L1 v5.2 | Unix | ACCESS CONTROL |
8.1 Restrict access to starting and stopping DB2 instances | CIS IBM DB2 9 Benchmark v3.0.1 Level 1 OS Windows | Windows | ACCESS CONTROL |
8.1.2 Limit sharing of console connections | CIS VMware ESXi 5.5 v1.2.0 Level 2 | VMware | ACCESS CONTROL |
8.1.3 Limit sharing of console connections | CIS VMware ESXi 5.1 v1.0.1 Level 1 | VMware | ACCESS CONTROL |
8.5.1 Ensure anonymous users can't join a meeting | CIS Microsoft 365 Foundations E3 L2 v3.1.0 | microsoft_azure | ACCESS CONTROL |
8.5.6 Ensure only organizers and co-organizers can present | CIS Microsoft 365 Foundations E3 L2 v3.1.0 | microsoft_azure | ACCESS CONTROL |
10.15 Do not run applications as privileged | CIS Apache Tomcat 7 L1 v1.1.0 Middleware | Unix | ACCESS CONTROL |
Management Services Security - Configure read-only access; use read-write only when required - community | Juniper Hardening JunOS 12 Devices Checklist | Juniper | ACCESS CONTROL |