Item Search

NameAudit NamePluginCategory
2.2.4 Ensure 'Adjust memory quotas for a process' is set to 'Administrators, LOCAL SERVICE, NETWORK SERVICE'CIS Microsoft Windows 8.1 v2.4.1 L1Windows

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

2.2.8 Ensure 'Allow log on through Remote Desktop Services' is set to 'Administrators' (DC only)CIS Microsoft Windows Server 2016 STIG v3.0.0 L1 Domain ControllerWindows

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

3.2 Ensure the Apache User Account Has an Invalid ShellCIS Apache HTTP Server 2.4 v2.2.0 L1Unix

CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY

4.2.3 Ensure sshd access is configuredCIS Ubuntu Linux 18.04 LTS v2.2.0 L1 ServerUnix

ACCESS CONTROL, MEDIA PROTECTION

4.2.4 Ensure SSH access is limitedCIS Ubuntu Linux 20.04 LTS Server L1 v2.0.1Unix

ACCESS CONTROL, MEDIA PROTECTION

4.2.4 Ensure SSH access is limitedCIS Amazon Linux 2023 Server L1 v1.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

4.2.4 Ensure sshd access is configuredCIS Oracle Linux 8 Server L1 v3.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

4.2.4 Ensure sshd access is configuredCIS Oracle Linux 8 Workstation L1 v3.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

4.2.4 Ensure sshd access is configuredCIS Red Hat EL8 Server L1 v3.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

4.2.4 Ensure sshd access is configuredCIS Oracle Linux 7 v4.0.0 L1 ServerUnix

ACCESS CONTROL, MEDIA PROTECTION

4.2.4 Ensure sshd access is configuredCIS Rocky Linux 8 Workstation L1 v2.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

4.2.4 Ensure sshd access is configuredCIS Rocky Linux 8 Server L1 v2.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

4.2.4 Ensure sshd access is configuredCIS Amazon Linux 2 v3.0.0 L1Unix

ACCESS CONTROL, MEDIA PROTECTION

4.2.4 Ensure sshd access is configuredCIS CentOS Linux 7 v4.0.0 L1 ServerUnix

ACCESS CONTROL, MEDIA PROTECTION

4.2.4 Ensure sshd access is configuredCIS AlmaLinux OS 8 Workstation L1 v3.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

4.2.4 Ensure sshd access is configuredCIS Red Hat EL8 Workstation L1 v3.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

5.1.4 Ensure sshd access is configuredCIS Debian Linux 11 v2.0.0 L1 WorkstationUnix

ACCESS CONTROL, MEDIA PROTECTION

5.1.4 Ensure sshd access is configuredCIS Debian Linux 12 v1.1.0 L1 WorkstationUnix

ACCESS CONTROL, MEDIA PROTECTION

5.1.4 Ensure sshd access is configuredCIS Ubuntu Linux 22.04 LTS v2.0.0 L1 WorkstationUnix

ACCESS CONTROL, MEDIA PROTECTION

5.1.4 Ensure sshd access is configuredCIS Debian Linux 12 v1.1.0 L1 ServerUnix

ACCESS CONTROL, MEDIA PROTECTION

5.1.4 Ensure sshd access is configuredCIS Ubuntu Linux 24.04 LTS v1.0.0 L1 ServerUnix

ACCESS CONTROL, MEDIA PROTECTION

5.1.4 Ensure sshd access is configuredCIS Debian Linux 11 v2.0.0 L1 ServerUnix

ACCESS CONTROL, MEDIA PROTECTION

5.1.4 Ensure sshd access is configuredCIS Ubuntu Linux 22.04 LTS v2.0.0 L1 ServerUnix

ACCESS CONTROL, MEDIA PROTECTION

5.1.7 Ensure sshd access is configuredCIS AlmaLinux OS 9 v2.0.0 L1 WorkstationUnix

ACCESS CONTROL, MEDIA PROTECTION

5.1.7 Ensure sshd access is configuredCIS Oracle Linux 9 v2.0.0 L1 ServerUnix

ACCESS CONTROL, MEDIA PROTECTION

5.1.7 Ensure sshd access is configuredCIS Oracle Linux 9 v2.0.0 L1 WorkstationUnix

ACCESS CONTROL, MEDIA PROTECTION

5.1.7 Ensure sshd access is configuredCIS SUSE Linux Enterprise 15 v2.0.0 L1 WorkstationUnix

ACCESS CONTROL, MEDIA PROTECTION

5.1.7 Ensure sshd access is configuredCIS Red Hat Enterprise Linux 9 v2.0.0 L1 ServerUnix

ACCESS CONTROL, MEDIA PROTECTION

5.1.7 Ensure sshd access is configuredCIS Red Hat Enterprise Linux 9 v2.0.0 L1 WorkstationUnix

ACCESS CONTROL, MEDIA PROTECTION

5.1.7 Ensure sshd access is configuredCIS Rocky Linux 9 v2.0.0 L1 ServerUnix

ACCESS CONTROL, MEDIA PROTECTION

5.1.7 Ensure sshd access is configuredCIS Rocky Linux 9 v2.0.0 L1 WorkstationUnix

ACCESS CONTROL, MEDIA PROTECTION

5.1.7 Ensure sshd access is configuredCIS SUSE Linux Enterprise 15 v2.0.0 L1 ServerUnix

ACCESS CONTROL, MEDIA PROTECTION

5.2.1 Minimize the admission of privileged containersCIS Red Hat OpenShift Container Platform v1.7.0 L1OpenShift

ACCESS CONTROL, SYSTEM AND INFORMATION INTEGRITY

5.2.5 Minimize the admission of containers with allowPrivilegeEscalationCIS Red Hat OpenShift Container Platform v1.7.0 L1OpenShift

ACCESS CONTROL, SYSTEM AND INFORMATION INTEGRITY

5.2.6 Ensure the sudoers file restricts sudo access to authorized personnel - sudoersCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIGUnix

CONFIGURATION MANAGEMENT

5.2.6 Minimize the admission of root containersCIS Red Hat OpenShift Container Platform v1.7.0 L2OpenShift

ACCESS CONTROL, SYSTEM AND INFORMATION INTEGRITY

5.2.7 Ensure sudo authentication timeout is configured - sudo command.CIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIGUnix

IDENTIFICATION AND AUTHENTICATION

5.2.8 Ensure users password required for privilege escalation when using sudo - rootpwCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIGUnix

ACCESS CONTROL

5.2.8 Ensure users password required for privilege escalation when using sudo - runaspwCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIGUnix

ACCESS CONTROL

5.2.8 Ensure users password required for privilege escalation when using sudo - targetpwCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIGUnix

ACCESS CONTROL

5.2.14 Ensure SSH access is limitedCIS SUSE Linux Enterprise Workstation 11 L1 v2.1.1Unix

ACCESS CONTROL, MEDIA PROTECTION

5.2.14 Ensure SSH access is limitedCIS SUSE Linux Enterprise Server 11 L1 v2.1.1Unix

ACCESS CONTROL, MEDIA PROTECTION

5.3.5 Ensure SSH access is limitedCIS Red Hat 6 Workstation L1 v3.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

5.3.5 Ensure SSH access is limitedCIS Red Hat 6 Server L1 v3.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

5.3.6 Ensure SSH access is limitedCIS Amazon Linux 2 STIG v2.0.0 L1 ServerUnix

ACCESS CONTROL, MEDIA PROTECTION

5.3.6 Ensure SSH access is limitedCIS Amazon Linux 2 STIG v2.0.0 L1 WorkstationUnix

ACCESS CONTROL, MEDIA PROTECTION

5.3.6 Ensure SSH access is limitedCIS Red Hat Enterprise Linux 7 STIG v2.0.0 L1 ServerUnix

ACCESS CONTROL, MEDIA PROTECTION

5.3.6 Ensure SSH access is limitedCIS Red Hat Enterprise Linux 7 STIG v2.0.0 L1 WorkstationUnix

ACCESS CONTROL, MEDIA PROTECTION

5.5.2 Ensure system accounts are secured - non-login shellCIS Red Hat 6 Workstation L1 v3.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

5.5.2 Ensure system accounts are secured - unlocked non-rootCIS Red Hat 6 Server L1 v3.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION