Item Search

NameAudit NamePluginCategory
1.4 Only allow trusted users to control Docker daemonCIS Docker 1.13.0 v1.0.0 L1 LinuxUnix

ACCESS CONTROL

1.5.5 Set the ACL for each 'snmp-server community'CIS Cisco IOS 12 L1 v4.0.0Cisco

ACCESS CONTROL

1.5.7 Set 'snmp-server host' when using SNMPCIS Cisco IOS 12 L1 v4.0.0Cisco

ACCESS CONTROL

1.7 Ensure all Customer owned Amazon Machine Images for Web Tier are not shared publiclyCIS Amazon Web Services Three-tier Web Architecture L1 1.0.0amazon_aws

ACCESS CONTROL

2.4 Verify the groups within the DB2_GRP_LOOKUP environment variable are appropriate (Windows only)CIS IBM DB2 v10 v1.1.0 Windows OS Level 1Windows

ACCESS CONTROL

4.1 Create a user for the containerCIS Docker 1.13.0 v1.0.0 L1 DockerUnix

ACCESS CONTROL

4.1 Restrict access to $CATALINA_HOMECIS Apache Tomcat 7 L1 v1.1.0 MiddlewareUnix

ACCESS CONTROL

4.4.12 Ensure security constraints are specified to protect web applicationsCIS IBM WebSphere Liberty v1.0.0 L1Unix

ACCESS CONTROL

4.5 Restrict access to Tomcat temp directoryCIS Apache Tomcat 7 L1 v1.1.0Unix

ACCESS CONTROL

4.6 Restrict access to Tomcat binaries directoryCIS Apache Tomcat 7 L1 v1.1.0 MiddlewareUnix

ACCESS CONTROL

4.7 Restrict access to Tomcat web application directoryCIS Apache Tomcat 7 L1 v1.1.0Unix

ACCESS CONTROL

4.8 Restrict access to Tomcat catalina.policyCIS Apache Tomcat 7 L1 v1.1.0Unix

ACCESS CONTROL

4.9 Restrict access to Tomcat catalina.propertiesCIS Apache Tomcat 7 L1 v1.1.0Unix

ACCESS CONTROL

4.11 Restrict access to Tomcat logging.propertiesCIS Apache Tomcat 7 L1 v1.1.0 MiddlewareUnix

ACCESS CONTROL

4.12 Restrict access to Tomcat server.xmlCIS Apache Tomcat 7 L1 v1.1.0 MiddlewareUnix

ACCESS CONTROL

4.14 Restrict access to Tomcat web.xmlCIS Apache Tomcat 7 L1 v1.1.0 MiddlewareUnix

ACCESS CONTROL

5.1.3 Check System folder for world writable filesCIS Apple macOS 10.12 L1 v1.2.0Unix

ACCESS CONTROL

6.1 Restrict Access to SYSCAT.AUDITPOLICIESCIS IBM DB2 v10 v1.1.0 Database Level 1IBM_DB2DB

ACCESS CONTROL

6.1 Restrict Access to SYSCAT.AUDITPOLICIESCIS IBM DB2 9 Benchmark v3.0.1 Level 1 DBIBM_DB2DB

ACCESS CONTROL

6.1 Restrict Access to SYSCAT.AUDITPOLICIESCIS IBM DB2 9 Benchmark v3.0.1 Level 2 DBIBM_DB2DB

ACCESS CONTROL

6.2 Restrict Access to SYSCAT.AUDITUSECIS IBM DB2 9 Benchmark v3.0.1 Level 2 DBIBM_DB2DB

ACCESS CONTROL

6.4.2 Do Not Allow Trusted Context to Switch Users Without AuthenticationCIS IBM DB2 11 v1.1.0 Database Level 1IBM_DB2DB

ACCESS CONTROL

6.5 Restrict Access to SYSCAT.EVENTSCIS IBM DB2 v10 v1.1.0 Database Level 2IBM_DB2DB

ACCESS CONTROL

6.7 Restrict Access to SYSCAT.ROUTINESCIS IBM DB2 v10 v1.1.0 Database Level 2IBM_DB2DB

ACCESS CONTROL

6.9 Restrict Access to SYSCAT.PACKAGEAUTHCIS IBM DB2 v10 v1.1.0 Database Level 1IBM_DB2DB

ACCESS CONTROL

6.9 Restrict Access to SYSCAT.PACKAGEAUTHCIS IBM DB2 v10 v1.1.0 Database Level 2IBM_DB2DB

ACCESS CONTROL

6.9 Restrict Access to SYSCAT.PACKAGEAUTHCIS IBM DB2 9 Benchmark v3.0.1 Level 2 DBIBM_DB2DB

ACCESS CONTROL

6.16 Restrict Access to SYSCAT.SECURITYPOLICIESCIS IBM DB2 9 Benchmark v3.0.1 Level 2 DBIBM_DB2DB

ACCESS CONTROL

6.17 Restrict Access to SYSCAT.SECURITYPOLICYCOMPONENTRULESCIS IBM DB2 9 Benchmark v3.0.1 Level 1 DBIBM_DB2DB

ACCESS CONTROL

6.20 Restrict Access to SYSCAT.SEQUENCEAUTHCIS IBM DB2 v10 v1.1.0 Database Level 2IBM_DB2DB

ACCESS CONTROL

6.21 Restrict Access to SYSCAT.ROLESCIS IBM DB2 9 Benchmark v3.0.1 Level 2 DBIBM_DB2DB

ACCESS CONTROL

6.23 Restrict Access to SYSCAT.TBSPACEAUTHCIS IBM DB2 v10 v1.1.0 Database Level 2IBM_DB2DB

ACCESS CONTROL

6.24 Restrict Access to SYSCAT.SCHEMATACIS IBM DB2 9 Benchmark v3.0.1 Level 2 DBIBM_DB2DB

ACCESS CONTROL

6.24 Restrict Access to TablespacesCIS IBM DB2 v10 v1.1.0 Database Level 2IBM_DB2DB

ACCESS CONTROL

6.25 Restrict Access to SYSCAT.SEQUENCEAUTHCIS IBM DB2 9 Benchmark v3.0.1 Level 2 DBIBM_DB2DB

ACCESS CONTROL

6.29 Restrict Access to SYSCAT.TBSPACEAUTHCIS IBM DB2 9 Benchmark v3.0.1 Level 1 DBIBM_DB2DB

ACCESS CONTROL

6.33 Restrict Access to SYSCAT.WORKLOADAUTHCIS IBM DB2 9 Benchmark v3.0.1 Level 1 DBIBM_DB2DB

ACCESS CONTROL

6.33 Restrict Access to SYSCAT.WORKLOADAUTHCIS IBM DB2 9 Benchmark v3.0.1 Level 2 DBIBM_DB2DB

ACCESS CONTROL

7.1 Disable System Accounts - Ensure account 'daemon' is locked.CIS Solaris 10 L1 v5.2Unix

ACCESS CONTROL

7.1 Disable System Accounts - Ensure account 'listen' is locked.CIS Solaris 10 L1 v5.2Unix

ACCESS CONTROL

7.1 Disable System Accounts - Ensure account 'nobody4' is locked.CIS Solaris 10 L1 v5.2Unix

ACCESS CONTROL

7.1 Disable System Accounts - Ensure account 'webservd' is locked.CIS Solaris 10 L1 v5.2Unix

ACCESS CONTROL

7.1 Disable System Accounts - should pass if the default shell for 'listen' is set to /usr/bin/false.CIS Solaris 10 L1 v5.2Unix

ACCESS CONTROL

8.1 Restrict access to starting and stopping DB2 instancesCIS IBM DB2 9 Benchmark v3.0.1 Level 1 OS WindowsWindows

ACCESS CONTROL

8.1.2 Limit sharing of console connectionsCIS VMware ESXi 5.5 v1.2.0 Level 2VMware

ACCESS CONTROL

8.1.3 Limit sharing of console connectionsCIS VMware ESXi 5.1 v1.0.1 Level 1VMware

ACCESS CONTROL

8.5.1 Ensure anonymous users can't join a meetingCIS Microsoft 365 Foundations E3 L2 v3.1.0microsoft_azure

ACCESS CONTROL

8.5.6 Ensure only organizers and co-organizers can presentCIS Microsoft 365 Foundations E3 L2 v3.1.0microsoft_azure

ACCESS CONTROL

10.15 Do not run applications as privilegedCIS Apache Tomcat 7 L1 v1.1.0 MiddlewareUnix

ACCESS CONTROL

Management Services Security - Configure read-only access; use read-write only when required - communityJuniper Hardening JunOS 12 Devices ChecklistJuniper

ACCESS CONTROL