Item Search

NameAudit NamePluginCategory
1.1 Create local-settings.js file - general.config.filenameCIS Mozilla Firefox 102 ESR Linux L1 v1.0.0Unix

ACCESS CONTROL

1.2 Use Dedicated Least Privileged Account for MySQL Daemon/ServiceCIS MySQL 5.7 Community Linux OS L1 v2.0.0Unix

ACCESS CONTROL

1.4 Configure 'Do not allow users to enable or disable add- ons'CIS IE 9 v1.0.0Windows

ACCESS CONTROL

1.10 Limit the number of users with ACCOUNTADMIN and SECURITYADMINCIS Snowflake Foundations v1.0.0 L1Snowflake

ACCESS CONTROL

2.1.3 Ensure chrony is not run as the root userCIS Amazon Linux 2 v3.0.0 L1Unix

ACCESS CONTROL

2.1.3 Ensure chrony is not run as the root userCIS Rocky Linux 8 Server L1 v2.0.0Unix

ACCESS CONTROL

2.2 Configure the ESXi host firewall to restrict access to services running on the hostCIS VMware ESXi 5.1 v1.0.1 Level 1VMware

ACCESS CONTROL

2.2 Configure the ESXi host firewall to restrict access to services running on the hostCIS VMware ESXi 5.5 v1.2.0 Level 1VMware

ACCESS CONTROL

2.3.3 Ensure chrony is not run as the root userCIS Red Hat Enterprise Linux 9 v2.0.0 L1 WorkstationUnix

ACCESS CONTROL

2.3.3 Ensure chrony is not run as the root userCIS Rocky Linux 9 v2.0.0 L1 ServerUnix

ACCESS CONTROL

2.3.3 Ensure chrony is not run as the root userCIS Oracle Linux 9 v2.0.0 L1 ServerUnix

ACCESS CONTROL

3.1 Configure 'Prevent Deleting Cookies'CIS IE 9 v1.0.0Windows

ACCESS CONTROL

3.11 Ensure 'encryption providers' are locked downCIS IIS 8.0 v1.5.1 Level 2Windows

ACCESS CONTROL

3.11 Ensure 'encryption providers' are locked downCIS IIS 7 L2 v1.8.0Windows

ACCESS CONTROL

4 - Restrict access to $JETTY_HOME - modeTNS Best Practice Jetty 9 LinuxUnix

ACCESS CONTROL

4.1 Create a user for the containerCIS Docker 1.11.0 v1.0.0 L1 DockerUnix

ACCESS CONTROL

4.2 Restrict access to $CATALINA_BASECIS Apache Tomcat 7 L1 v1.1.0Unix

ACCESS CONTROL

4.3 Restrict access to Tomcat configuration directoryCIS Apache Tomcat 7 L1 v1.1.0Unix

ACCESS CONTROL

4.3 Restrict access to Tomcat configuration directoryCIS Apache Tomcat 7 L1 v1.1.0 MiddlewareUnix

ACCESS CONTROL

4.5.4 Ensure 'ALL' Is Revoked from Unauthorized 'GRANTEE' on 'SYS.USER$'CIS Oracle Server 11g R2 DB v2.2.0OracleDB

ACCESS CONTROL

4.8 Ensure Handler is not granted Write and Script/Execute - DefaultCIS IIS 7 L1 v1.8.0Windows

ACCESS CONTROL

4.10 Restrict access to Tomcat context.xmlCIS Apache Tomcat 7 L1 v1.1.0 MiddlewareUnix

ACCESS CONTROL

5.1 Set Sticky Bit on World Writable DirectoriesCIS Solaris 11.2 L1 v1.1.0Unix

ACCESS CONTROL

5.1.3 Check System folder for world writable filesCIS Apple macOS 10.13 L1 v1.1.0Unix

ACCESS CONTROL

5.4 CIFS - 'cifs.restrict_anonymous = 2'TNS NetApp Data ONTAP 7GNetApp

ACCESS CONTROL

5.6 Set 'Disable changing certificate settings' to 'Enabled'CIS IE 11 v1.0.0Windows

ACCESS CONTROL

5.7 Do not enable the 'root' accountCIS Apple macOS 10.13 L1 v1.1.0Unix

ACCESS CONTROL

5.8 Do not enable the 'root' account - root accountCIS Apple macOS 10.12 L1 v1.2.0Unix

ACCESS CONTROL

6.12 Restrict Access to SYSCAT.SECURITYPOLICIESCIS IBM DB2 v10 v1.1.0 Database Level 1IBM_DB2DB

ACCESS CONTROL

6.19 Restrict Access to SYSCAT.SCHEMATACIS IBM DB2 v10 v1.1.0 Database Level 1IBM_DB2DB

ACCESS CONTROL

6.20 Restrict Access to SYSCAT.SEQUENCEAUTHCIS IBM DB2 v10 v1.1.0 Database Level 1IBM_DB2DB

ACCESS CONTROL

7.1 Disable System Accounts - Ensure account 'gdm' is locked.CIS Solaris 10 L1 v5.2Unix

ACCESS CONTROL

7.1 Disable System Accounts - Ensure account 'sys' disallows password loginCIS Solaris 10 L1 v5.2Unix

ACCESS CONTROL

7.1 Disable System Accounts - should pass if the default shell for 'lp' is set to /usr/bin/false.CIS Solaris 10 L1 v5.2Unix

ACCESS CONTROL

7.1 Disable System Accounts - should pass if the default shell for 'uucp' is set to /usr/bin/false.CIS Solaris 10 L1 v5.2Unix

ACCESS CONTROL

8.1 Restrict runtime access to sensitive packagesCIS Apache Tomcat 7 L1 v1.1.0Unix

ACCESS CONTROL

8.2 Restrict access to starting and stopping the DB2 administration serverCIS IBM DB2 9 Benchmark v3.0.1 Level 2 OS WindowsWindows

ACCESS CONTROL

8.5.2 Ensure anonymous users and dial-in callers can't start a meetingCIS Microsoft 365 Foundations E3 L1 v3.1.0microsoft_azure

ACCESS CONTROL

9.6 Ensure root PATH Integrity - writeable dir in pathCIS Solaris 11.2 L1 v1.1.0Unix

ACCESS CONTROL

9.22 Find World Writable FilesCIS Solaris 10 L1 v5.2Unix

ACCESS CONTROL

10.14 Do not allow symbolic linkingCIS Apache Tomcat 7 L1 v1.1.0Unix

ACCESS CONTROL

12.7 Find World Writable FilesCIS Debian Linux 7 L1 v1.0.0Unix

ACCESS CONTROL

18 - Restrict access to context.xml - modeTNS Best Practice Jetty 9 LinuxUnix

ACCESS CONTROL

18 - Restrict access to context.xml - ownerTNS Best Practice Jetty 9 LinuxUnix

ACCESS CONTROL

18.4.9 (L1) Ensure 'Remove 'Run as Different User' from context menus' is set to 'Enabled (recommended)'CIS Microsoft Windows 10 EMS Gateway v3.0.0 L1Windows

ACCESS CONTROL

20.29 Ensure 'FTP servers are configured to prevent access to the system drive'CIS Microsoft Windows Server 2019 STIG v3.0.0 STIG MSWindows

ACCESS CONTROL

20.51 Ensure 'Permissions for the system drive root directory must conform to minimum requirements'CIS Microsoft Windows Server 2016 STIG v3.0.0 STIG MSWindows

ACCESS CONTROL

20.51 Ensure 'Permissions for the system drive root directory must conform to minimum requirements'CIS Microsoft Windows Server 2019 STIG v3.0.0 STIG MSWindows

ACCESS CONTROL

21 - Restrict access to users.xml - modeTNS Best Practice Jetty 9 LinuxUnix

ACCESS CONTROL

45 - Restrict runtime access to sensitive packagesTNS Best Practice Jetty 9 LinuxUnix

ACCESS CONTROL