Item Search

NameAudit NamePluginCategory
1.5.1 Set User/Group Owner on /etc/grub.confCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

ACCESS CONTROL

1.6.2 Ensure SELinux is installedCIS Aliyun Linux 2 L2 v1.0.0Unix

ACCESS CONTROL

1.7.4 Ensure permissions on /etc/motd are configuredCIS Red Hat 6 Server L1 v3.0.0Unix

ACCESS CONTROL

1.7.4 Ensure permissions on /etc/motd are configuredCIS CentOS 6 Server L1 v3.0.0Unix

ACCESS CONTROL

1.7.5 Ensure permissions on /etc/issue are configuredCIS CentOS 6 Server L1 v3.0.0Unix

ACCESS CONTROL

3.1 Ensure the Apache Web Server Runs As a Non-Root User - 'httpd.conf User = apache'CIS Apache HTTP Server 2.2 L1 v3.6.0Unix

ACCESS CONTROL

3.1 Ensure the Apache Web Server Runs As a Non-Root User - 'httpd.conf User = apache'CIS Apache HTTP Server 2.2 L1 v3.6.0 MiddlewareUnix

ACCESS CONTROL

3.2.1.1 Ensure 'Allow screenshots and screen recording' is set to 'Disabled'MobileIron - CIS Apple iOS 14 and iPadOS 14 Institution Owned L2MDM

ACCESS CONTROL

3.2.1.19 Ensure 'Allow documents from managed sources in unmanaged destinations' is set to 'Disabled'AirWatch - CIS Apple iOS 14 and iPadOS 14 Institution Owned L1MDM

ACCESS CONTROL

3.2.1.22 Ensure 'Allow Handoff' is set to 'Disabled'AirWatch - CIS Apple iOS 14 and iPadOS 14 Institution Owned L1MDM

ACCESS CONTROL

3.2.1.23 Ensure 'Require Touch ID / Face ID authentication before AutoFill' is set to 'Enabled'MobileIron - CIS Apple iOS 14 and iPadOS 14 Institution Owned L1MDM

ACCESS CONTROL

3.2.1.24 Ensure 'Force Apple Watch wrist detection' is set to 'Enabled'MobileIron - CIS Apple iOS 14 and iPadOS 14 Institution Owned L1MDM

ACCESS CONTROL

3.3.1 (L1) Ensure Information Protection sensitivity label policies are publishedCIS Microsoft 365 Foundations v5.0.0 L1 E3microsoft_azure

RISK ASSESSMENT

3.4 Ensure Apache Directories and Files Are Owned By RootCIS Apache HTTP Server 2.2 L1 v3.6.0Unix

ACCESS CONTROL

3.4.4 Ensure permissions on /etc/hosts.allow are configuredCIS CentOS 6 Workstation L1 v3.0.0Unix

ACCESS CONTROL

3.4.5 Ensure permissions on /etc/hosts.deny are configuredCIS Oracle Linux 6 Workstation L1 v2.0.0Unix

ACCESS CONTROL

3.4.5 Ensure permissions on /etc/hosts.deny are configuredCIS CentOS 6 Server L1 v3.0.0Unix

ACCESS CONTROL

3.6.1 Ensure 'Allow user to move messages from this account' is set to 'Disabled'AirWatch - CIS Apple iOS 14 and iPadOS 14 Institution Owned L1MDM

ACCESS CONTROL

3.8 Ensure the Lock File Is Secured - 'LockFile permissions'CIS Apache HTTP Server 2.2 L1 v3.6.0Unix

ACCESS CONTROL

3.9 Ensure the Pid File Is SecuredCIS Apache HTTP Server 2.2 L1 v3.6.0 MiddlewareUnix

ACCESS CONTROL

3.11 Ensure Group Write Access for the Apache Directories and Files Is Properly RestrictedCIS Apache HTTP Server 2.2 L1 v3.6.0 MiddlewareUnix

ACCESS CONTROL

3.12 Ensure Group Write Access for the Document Root Directories and Files Is Properly RestrictedCIS Apache HTTP Server 2.2 L1 v3.6.0 MiddlewareUnix

ACCESS CONTROL

4.1 Ensure Access to OS Root Directory Is Denied By Default - 'httpd.conf Require all deniedCIS Apache HTTP Server 2.2 L1 v3.6.0 MiddlewareUnix

ACCESS CONTROL

4.2 Ensure Appropriate Access to Web Content Is Allowed - 'httpd.conf Order Deny,Allow'CIS Apache HTTP Server 2.2 L1 v3.6.0 MiddlewareUnix

ACCESS CONTROL

4.2 Ensure Appropriate Access to Web Content Is Allowed - 'Require is configured'CIS Apache HTTP Server 2.2 L1 v3.6.0Unix

ACCESS CONTROL

4.4 Restrict Access to All Key Files - permissionsCIS BIND DNS v1.0.0 L1 Authoritative Name ServerUnix

ACCESS CONTROL

5.1.2 Create and Set Permissions on syslog Log Files - /var/log/daemon.logCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

ACCESS CONTROL

5.1.2 Create and Set Permissions on syslog Log Files - /var/log/unused.logCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

ACCESS CONTROL

5.1.2 Ensure permissions on /etc/crontab are configuredCIS Oracle Linux 6 Workstation L1 v2.0.0Unix

ACCESS CONTROL

5.1.5 Ensure permissions on /etc/cron.weekly are configuredCIS Red Hat 6 Workstation L1 v3.0.0Unix

ACCESS CONTROL

5.1.5 Ensure permissions on /etc/cron.weekly are configuredCIS CentOS 6 Server L1 v3.0.0Unix

ACCESS CONTROL

5.3.1 Ensure permissions on /etc/ssh/sshd_config are configuredCIS Red Hat 6 Server L1 v3.0.0Unix

ACCESS CONTROL

6.1.10 Restrict at/cron to Authorized Users - at.allowCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

ACCESS CONTROL

6.1.11 Ensure no unowned files or directories existCIS Red Hat 6 Workstation L1 v3.0.0Unix

ACCESS CONTROL

6.1.11 Ensure no unowned files or directories existCIS CentOS 6 Server L1 v3.0.0Unix

ACCESS CONTROL

6.1.12 Ensure no ungrouped files or directories existCIS Oracle Linux 6 Server L1 v2.0.0Unix

ACCESS CONTROL

6.1.14 Audit SGID executablesCIS CentOS 6 Server L1 v3.0.0Unix

ACCESS CONTROL

6.2.3 Set Permissions on /etc/ssh/sshd_configCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

ACCESS CONTROL

6.2.8 Ensure users' home directories permissions are 750 or more restrictiveCIS Aliyun Linux 2 L1 v1.0.0Unix

ACCESS CONTROL

6.2.9 Ensure users own their home directoriesCIS Oracle Linux 6 Workstation L1 v2.0.0Unix

ACCESS CONTROL

6.2.9 Ensure users own their home directoriesCIS CentOS 6 Server L1 v3.0.0Unix

ACCESS CONTROL

6.2.10 Ensure users' dot files are not group or world writableCIS Aliyun Linux 2 L1 v1.0.0Unix

ACCESS CONTROL

6.2.10 Ensure users' home directories permissions are 750 or more restrictiveCIS Red Hat 6 Server L1 v3.0.0Unix

ACCESS CONTROL

6.2.10 Ensure users' home directories permissions are 750 or more restrictiveCIS CentOS 6 Server L1 v3.0.0Unix

ACCESS CONTROL

6.2.13 Ensure no users have .netrc filesCIS Oracle Linux 6 Server L1 v2.0.0Unix

ACCESS CONTROL

7.2 Ensure appropriate database file permissions are set.CIS MongoDB 6 v1.2.0 L1 MongoDBUnix

ACCESS CONTROL

8.1.1 Set Warning Banner for Standard Login Services - /etc/issue.net permsCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

ACCESS CONTROL

10.2 Ensure BIND Processes Run in the named_t Confined Context TypeCIS BIND DNS v1.0.0 L2 Caching Only Name ServerUnix

ACCESS CONTROL

18.9.59.3.3.2 (L1) Ensure 'Do not allow drive redirection' is set to 'Enabled'CIS Microsoft Windows 8.1 v2.4.1 L1 BitlockerWindows

ACCESS CONTROL

18.9.59.3.11.2 (L1) Ensure 'Do not use temporary folders per session' is set to 'Disabled'CIS Microsoft Windows 8.1 v2.4.1 L1 BitlockerWindows

ACCESS CONTROL