1.6.2.2 Ensure the SELinux state is enforcing | CIS Distribution Independent Linux Workstation L2 v2.0.0 | Unix | ACCESS CONTROL |
1.6.3.1 Ensure AppArmor is not disabled in bootloader configuration | CIS Distribution Independent Linux Server L2 v2.0.0 | Unix | ACCESS CONTROL |
1.6.3.1 Ensure AppArmor is not disabled in bootloader configuration | CIS Distribution Independent Linux Workstation L2 v2.0.0 | Unix | ACCESS CONTROL |
1.7.1.4 Ensure all AppArmor Profiles are enforcing - unconfined | CIS Ubuntu Linux 18.04 LXD Host L2 Workstation v1.0.0 | Unix | ACCESS CONTROL |
2.2.1.9 Ensure 'Allow Handoff' is set to 'Disabled' | MobileIron - CIS Apple iOS 13 and iPadOS 13 v1.0.0 End User Owned L2 | MDM | ACCESS CONTROL |
2.2.1.9 Ensure 'Allow Handoff' is set to 'Disabled' | AirWatch - CIS Apple iOS 14 and iPadOS 14 v1.0.0 End User Owned L2 | MDM | ACCESS CONTROL |
2.2.1.9 Ensure 'Allow Handoff' is set to 'Disabled' | MobileIron - CIS Apple iOS 14 and iPadOS 14 v1.0.0 End User Owned L2 | MDM | ACCESS CONTROL |
2.2.1.10 Ensure 'Force Apple Watch wrist detection' is set to 'Enabled' | AirWatch - CIS Apple iOS 13 and iPadOS 13 v1.0.0 End User Owned L1 | MDM | ACCESS CONTROL |
2.2.1.10 Ensure 'Force Apple Watch wrist detection' is set to 'Enabled' | MobileIron - CIS Apple iOS 14 and iPadOS 14 v1.0.0 End User Owned L1 | MDM | ACCESS CONTROL |
2.3.1 Ensure 'Managed Safari Web Domains' is 'Configured' | AirWatch - CIS Apple iOS 14 and iPadOS 14 v1.0.0 End User Owned L1 | MDM | ACCESS CONTROL |
2.9 Ensure 'Trustworthy' Database Property is set to 'Off' | CIS SQL Server 2012 Database L1 DB v1.6.0 | MS_SQLDB | ACCESS CONTROL |
3.2.1.1 Ensure 'Allow screenshots and screen recording' is set to 'Disabled' | AirWatch - CIS Apple iOS 13 and iPadOS 13 Institution Owned L2 | MDM | ACCESS CONTROL |
3.2.1.20 Ensure 'Allow documents from unmanaged sources in managed destinations' is set to 'Disabled' | AirWatch - CIS Apple iOS 14 and iPadOS 14 Institution Owned L1 | MDM | ACCESS CONTROL |
3.2.1.20 Ensure 'Allow documents from unmanaged sources in managed destinations' is set to 'Disabled' | MobileIron - CIS Apple iOS 14 and iPadOS 14 Institution Owned L1 | MDM | ACCESS CONTROL |
3.2.1.22 Ensure 'Allow Handoff' is set to 'Disabled' | MobileIron - CIS Apple iOS 14 and iPadOS 14 Institution Owned L1 | MDM | ACCESS CONTROL |
3.2.1.22 Ensure 'Require Touch ID / Face ID authentication before AutoFill' is set to 'Enabled' | MobileIron - CIS Apple iOS 13 and iPadOS 13 Institution Owned L1 | MDM | ACCESS CONTROL |
3.6.1 Ensure 'Allow user to move messages from this account' is set to 'Disabled' | MobileIron - CIS Apple iOS 14 and iPadOS 14 Institution Owned L1 | MDM | ACCESS CONTROL |
3.8 Ensure only the default permissions specified by Microsoft are granted to the public server role | CIS SQL Server 2014 Database L1 DB v1.5.0 | MS_SQLDB | ACCESS CONTROL |
3.10 Ensure Windows local groups are not SQL Logins | CIS SQL Server 2012 Database L1 AWS RDS v1.6.0 | MS_SQLDB | ACCESS CONTROL |
3.10 Ensure Windows local groups are not SQL Logins | CIS SQL Server 2014 Database L1 AWS RDS v1.5.0 | MS_SQLDB | ACCESS CONTROL |
3.10 Ensure Windows local groups are not SQL Logins | CIS SQL Server 2014 Database L1 DB v1.5.0 | MS_SQLDB | ACCESS CONTROL |
4.9 Restrict access to Tomcat catalina.policy | CIS Apache Tomcat 8 L1 v1.1.0 Middleware | Unix | ACCESS CONTROL |
5.1.2 Ensure permissions on /etc/crontab are configured | CIS Ubuntu Linux 16.04 LTS Server L1 v2.0.0 | Unix | ACCESS CONTROL |
5.1.3 Ensure permissions on /etc/cron.hourly are configured | CIS Debian Family Workstation L1 v1.0.0 | Unix | ACCESS CONTROL |
5.1.3 Ensure permissions on /etc/cron.hourly are configured | CIS Ubuntu Linux 18.04 LXD Host L1 Server v1.0.0 | Unix | ACCESS CONTROL |
5.1.4 Ensure permissions on /etc/cron.daily are configured | CIS Debian Family Server L1 v1.0.0 | Unix | ACCESS CONTROL |
5.1.4 Ensure permissions on /etc/cron.daily are configured | CIS Ubuntu Linux 16.04 LTS Server L1 v2.0.0 | Unix | ACCESS CONTROL |
5.1.4 Ensure permissions on /etc/cron.daily are configured | CIS Ubuntu Linux 16.04 LTS Workstation L1 v2.0.0 | Unix | ACCESS CONTROL |
5.1.5 Ensure permissions on /etc/cron.weekly are configured | CIS Debian Family Server L1 v1.0.0 | Unix | ACCESS CONTROL |
5.1.5 Ensure permissions on /etc/cron.weekly are configured | CIS Debian Family Workstation L1 v1.0.0 | Unix | ACCESS CONTROL |
5.1.5 Ensure permissions on /etc/cron.weekly are configured | CIS Ubuntu Linux 18.04 LXD Host L1 Workstation v1.0.0 | Unix | ACCESS CONTROL |
5.1.7 Ensure permissions on /etc/cron.d are configured | CIS Debian Family Workstation L1 v1.0.0 | Unix | ACCESS CONTROL |
5.1.7 Ensure permissions on /etc/cron.d are configured | CIS Ubuntu Linux 18.04 LXD Host L1 Workstation v1.0.0 | Unix | ACCESS CONTROL |
5.1.7 Ensure permissions on /etc/cron.d are configured | CIS Ubuntu Linux 16.04 LTS Server L1 v2.0.0 | Unix | ACCESS CONTROL |
5.1.8 Ensure at/cron is restricted to authorized users - '/etc/at.deny' | CIS Ubuntu Linux 18.04 LXD Host L1 Server v1.0.0 | Unix | ACCESS CONTROL |
5.2.1 Ensure permissions on /etc/ssh/sshd_config are configured | CIS Ubuntu Linux 18.04 LXD Host L1 Workstation v1.0.0 | Unix | ACCESS CONTROL |
5.2.1 Ensure permissions on /etc/ssh/sshd_config are configured | CIS Ubuntu Linux 18.04 LXD Container L1 v1.0.0 | Unix | ACCESS CONTROL |
5.2.2 Ensure permissions on SSH private host key files are configured | CIS Debian Family Server L1 v1.0.0 | Unix | ACCESS CONTROL |
5.2.3 Ensure permissions on SSH public host key files are configured | CIS Debian Family Workstation L1 v1.0.0 | Unix | ACCESS CONTROL |
5.2.11 Ensure SSH PermitUserEnvironment is disabled | CIS Debian Family Server L1 v1.0.0 | Unix | ACCESS CONTROL |
5.2.12 Ensure SSH PermitUserEnvironment is disabled | CIS Ubuntu Linux 18.04 LXD Host L1 Workstation v1.0.0 | Unix | ACCESS CONTROL |
5.4.3 Ensure default group for the root account is GID 0 | CIS Ubuntu Linux 18.04 LXD Host L1 Workstation v1.0.0 | Unix | ACCESS CONTROL |
6.1.1 Audit system file permissions | CIS Ubuntu Linux 16.04 LTS Server L2 v2.0.0 | Unix | ACCESS CONTROL |
6.2.4 Ensure users own their home directories | CIS Debian Family Server L1 v1.0.0 | Unix | ACCESS CONTROL |
6.2.5 Ensure users' home directories permissions are 750 or more restrictive | CIS Debian Family Workstation L1 v1.0.0 | Unix | ACCESS CONTROL |
6.2.8 Ensure users' home directories permissions are 750 or more restrictive | CIS Debian 9 Workstation L1 v1.0.1 | Unix | ACCESS CONTROL |
6.2.8 Ensure users' home directories permissions are 750 or more restrictive | CIS Ubuntu Linux 18.04 LXD Host L1 Workstation v1.0.0 | Unix | ACCESS CONTROL |
6.2.10 Ensure users' dot files are not group or world writable | CIS Distribution Independent Linux Server L1 v2.0.0 | Unix | ACCESS CONTROL |
6.2.13 Ensure users' .netrc Files are not group or world accessible | CIS Distribution Independent Linux Workstation L1 v2.0.0 | Unix | ACCESS CONTROL |
6.2.20 Ensure shadow group is empty | CIS Ubuntu Linux 18.04 LXD Container L1 v1.0.0 | Unix | ACCESS CONTROL |