Item Search

NameAudit NamePluginCategory
1.2 Use Dedicated Least Privileged Account for MySQL Daemon/ServiceCIS MySQL 5.6 Enterprise Windows OS L1 v2.0.0Windows

ACCESS CONTROL

2.1.3 Ensure chrony is not run as the root userCIS Oracle Linux 7 v4.0.0 L1 ServerUnix

ACCESS CONTROL

2.3.3 Ensure chrony is not run as the root userCIS Oracle Linux 9 v2.0.0 L1 WorkstationUnix

ACCESS CONTROL

2.5 Verify the domains within the DB2DOMAINLIST environment variable are appropriate (Windows only)CIS IBM DB2 v10 v1.1.0 Windows OS Level 2Windows

ACCESS CONTROL

3.2 Configure 'Prevent Deleting Temporary Internet Files'CIS IE 9 v1.0.0Windows

ACCESS CONTROL

3.5 Configure 'Prevent Deleting Temporary Internet Files'CIS IE 11 v1.0.0Windows

ACCESS CONTROL

3.5 Review Superuser/Admin RolesCIS MongoDB 7 v1.1.0 L2 MongoDBMongoDB

ACCESS CONTROL

3.5 Review Superuser/Admin RolesCIS MongoDB 6 v1.2.0 L2 MongoDBMongoDB

ACCESS CONTROL

3.5 Review Superuser/Admin Roles - userAdminAnyDatabaseCIS MongoDB 5 L2 DB v1.2.0MongoDB

ACCESS CONTROL

3.6 Review Superuser/Admin Roles - dbAdminAnyDatabaseCIS MongoDB 3.6 Database Audit L1 v1.1.0MongoDB

ACCESS CONTROL

3.6 Review Superuser/Admin Roles - userAdminCIS MongoDB 3.6 Database Audit L1 v1.1.0MongoDB

ACCESS CONTROL

4.1.2.8 Ensure 'cookieName' JWT (JSON Web Token) cookie name is setCIS IBM WebSphere Liberty v1.0.0 L1Unix

ACCESS CONTROL

4.4.2 Ensure 'SELECT_CATALOG_ROLE' Is Revoked from Unauthorized 'GRANTEE'CIS Oracle Server 11g R2 DB v2.2.0OracleDB

ACCESS CONTROL

4.4.12 Ensure security constraints are specified to protect web applicationsCIS IBM WebSphere Liberty v1.0.0 L1Unix

ACCESS CONTROL

4.5.1 Ensure 'ALL' Is Revoked from Unauthorized 'GRANTEE' on 'AUD$'CIS Oracle Server 11g R2 DB v2.2.0OracleDB

ACCESS CONTROL

5.1 Ensure Only Administrative Users Have Full Database AccessCIS MariaDB 10.6 on Linux L1 v1.1.0Unix

ACCESS CONTROL

5.1 Ensure Only Administrative Users Have Full Database AccessCIS Oracle MySQL Community Server 8.4 v1.0.0 L1 DatabaseMySQLDB

ACCESS CONTROL

5.4 Set 'Disable changing certificate settings' to 'Enabled'CIS IE 9 v1.0.0Windows

ACCESS CONTROL

5.7 Do not enable the 'root' accountCIS Apple OSX 10.10 Yosemite L1 v1.2.0Unix

ACCESS CONTROL

6.2 Restrict Access to SYSCAT.AUDITUSECIS IBM DB2 v10 v1.1.0 Database Level 2IBM_DB2DB

ACCESS CONTROL

6.2 Restrict Access to SYSCAT.AUDITUSECIS IBM DB2 9 Benchmark v3.0.1 Level 1 DBIBM_DB2DB

ACCESS CONTROL

6.4 Restrict Access to SYSCAT.COLAUTHCIS IBM DB2 v10 v1.1.0 Database Level 2IBM_DB2DB

ACCESS CONTROL

6.4.2 Do Not Allow Trusted Context to Switch Users Without AuthenticationCIS IBM DB2 11 v1.1.0 Database Level 1IBM_DB2DB

ACCESS CONTROL

6.12 Restrict Access to SYSCAT.SECURITYLABELACCESSCIS IBM DB2 9 Benchmark v3.0.1 Level 2 DBIBM_DB2DB

ACCESS CONTROL

6.13 Restrict Access to SYSCAT.SECURITYPOLICYEXEMPTIONSCIS IBM DB2 v10 v1.1.0 Database Level 1IBM_DB2DB

ACCESS CONTROL

6.14 Restrict Access to SYSCAT.SURROGATEAUTHIDSCIS IBM DB2 v10 v1.1.0 Database Level 1IBM_DB2DB

ACCESS CONTROL

6.14 Restrict Access to SYSCAT.SURROGATEAUTHIDSCIS IBM DB2 v10 v1.1.0 Database Level 2IBM_DB2DB

ACCESS CONTROL

6.16 Restrict Access to SYSCAT.ROLESCIS IBM DB2 v10 v1.1.0 Database Level 2IBM_DB2DB

ACCESS CONTROL

6.17 Restrict Access to SYSCAT.ROUTINEAUTHCIS IBM DB2 v10 v1.1.0 Database Level 2IBM_DB2DB

ACCESS CONTROL

6.21 Restrict Access to SYSCAT.STATEMENTSCIS IBM DB2 v10 v1.1.0 Database Level 1IBM_DB2DB

ACCESS CONTROL

6.25 Restrict Access to SYSCAT.SEQUENCEAUTHCIS IBM DB2 9 Benchmark v3.0.1 Level 1 DBIBM_DB2DB

ACCESS CONTROL

6.27 Restrict Access to SYSCAT.WORKLOADAUTHCIS IBM DB2 v10 v1.1.0 Database Level 2IBM_DB2DB

ACCESS CONTROL

7.1 Disable System Accounts - Ensure account 'noaccess' is locked.CIS Solaris 10 L1 v5.2Unix

ACCESS CONTROL

7.1 Disable System Accounts - Ensure account 'uucp' disallows password login.CIS Solaris 10 L1 v5.2Unix

ACCESS CONTROL

7.1 Disable System Accounts - should pass if the default shell for 'adm' is set to /usr/bin/false.CIS Solaris 10 L1 v5.2Unix

ACCESS CONTROL

7.1 Disable System Accounts - should pass if the default shell for 'bin' is set to /usr/bin/false.CIS Solaris 10 L1 v5.2Unix

ACCESS CONTROL

7.1 Disable System Accounts - should pass if the default shell for 'nobody4' is set to /usr/bin/false.CIS Solaris 10 L1 v5.2Unix

ACCESS CONTROL

7.1 Disable System Accounts - should pass if the default shell for 'smmsp' is set to /usr/bin/false.CIS Solaris 10 L1 v5.2Unix

ACCESS CONTROL

9.3 Verify System Account Default Passwords - non-loginCIS Solaris 11.1 L1 v1.0.0Unix

ACCESS CONTROL

9.3 Verify System Account Default Passwords - non-loginCIS Solaris 11.2 L1 v1.1.0Unix

ACCESS CONTROL

9.6 Ensure root PATH Integrity - writeable dir in pathCIS Solaris 11 L1 v1.1.0Unix

ACCESS CONTROL

12 - Restrict access to logs directory - modeTNS Best Practice Jetty 9 LinuxUnix

ACCESS CONTROL

12 - Restrict access to logs directory - ownerTNS Best Practice Jetty 9 LinuxUnix

ACCESS CONTROL

15 - Restrict access to web application directory - ownerTNS Best Practice Jetty 9 LinuxUnix

ACCESS CONTROL

16 - Restrict access to JETTY.policy - modeTNS Best Practice Jetty 9 LinuxUnix

ACCESS CONTROL

17 - Restrict access to JETTY.properties - modeTNS Best Practice Jetty 9 LinuxUnix

ACCESS CONTROL

19 - Restrict access to logging.properties - modeTNS Best Practice Jetty 9 LinuxUnix

ACCESS CONTROL

20 - Restrict access to server.xml - modeTNS Best Practice Jetty 9 LinuxUnix

ACCESS CONTROL

20.51 Ensure 'Permissions for the system drive root directory must conform to minimum requirements'CIS Microsoft Windows Server 2016 STIG v3.0.0 STIG DCWindows

ACCESS CONTROL

Adtran : Ensure the default 'admin' username is not usedTNS Adtran AOS Best Practice AuditAdtran

ACCESS CONTROL