1.1.6 - MobileIron - Disable Access to Control Center on Lock Screen | MobileIron - CIS Apple iOS 9 v1.0.0 L2 | MDM | ACCESS CONTROL |
1.1.6 - MobileIron - Disable Passcode Unlock for Fingerprints | MobileIron - CIS Apple iOS 8 v1.0.0 L2 | MDM | ACCESS CONTROL |
1.1.7 - MobileIron - Disable Access to Control Center on Lock Screen | MobileIron - CIS Apple iOS 8 v1.0.0 L2 | MDM | ACCESS CONTROL |
1.1.16 - MobileIron - Disable View in Lock Screen for apps when device is locked | MobileIron - CIS Apple iOS 9 v1.0.0 L2 | MDM | ACCESS CONTROL |
1.1.18 - MobileIron - Disable View in Lock Screen for apps when device is locked | MobileIron - CIS Apple iOS 8 v1.0.0 L2 | MDM | ACCESS CONTROL |
1.2.9 - MobileIron - Turn On Do Not Track | MobileIron - CIS Apple iOS 8 v1.0.0 L2 | MDM | ACCESS CONTROL |
1.6 Ensure Install Security Responses and System Files Is Enabled | CIS Apple macOS 14.0 Sonoma Cloud-tailored v1.1.0 L1 | Unix | RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY |
1.6 Ensure Install Security Responses and System Files Is Enabled | CIS Apple macOS 14.0 Sonoma v2.0.0 L1 | Unix | RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY |
1.6 Ensure Install Security Responses and System Files Is Enabled | CIS Apple macOS 13.0 Ventura v3.0.0 L1 | Unix | RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY |
1.6 Ensure Install Security Responses and System Files Is Enabled | CIS Apple macOS 15.0 Sequoia Cloud-tailored v1.0.0 L1 | Unix | RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY |
1.6 Ensure Install Security Responses and System Files Is Enabled | CIS Apple macOS 13.0 Ventura Cloud-tailored v1.1.0 L1 | Unix | RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY |
1.6 Ensure Install Security Responses and System Files Is Enabled | CIS Apple macOS 15.0 Sequoia v1.0.0 L1 | Unix | RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY |
1.8 Ensure 'Attachment Filtering Agent' is configured | CIS Microsoft Exchange Server 2019 L1 Edge v1.0.0 | Windows | SYSTEM AND INFORMATION INTEGRITY |
2.1.2 Audit App Store Password Settings | CIS Apple macOS 15.0 Sequoia v1.0.0 L2 | Unix | CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION |
2.1.2 Audit App Store Password Settings | CIS Apple macOS 14.0 Sonoma v2.0.0 L2 | Unix | CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION |
2.3.2.2 Ensure the Time Service Is Enabled | CIS Apple macOS 14.0 Sonoma v2.0.0 L1 | Unix | AUDIT AND ACCOUNTABILITY |
2.3.3.9 Ensure Content Caching Is Disabled | CIS Apple macOS 14.0 Sonoma v2.0.0 L2 | Unix | CONFIGURATION MANAGEMENT |
2.4.8 Disable File Sharing - AppleFileServer | CIS Apple macOS 10.12 L1 v1.2.0 | Unix | CONFIGURATION MANAGEMENT |
2.4.8 Disable File Sharing - SMB | CIS Apple macOS 10.13 L1 v1.1.0 | Unix | CONFIGURATION MANAGEMENT |
2.4.8 Ensure File Sharing Is Disabled | CIS Apple macOS 10.15 Catalina v3.0.0 L1 | Unix | ACCESS CONTROL, CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION |
2.4.8 Ensure File Sharing Is Disabled - AppleFileServer | CIS Apple macOS 10.14 v2.0.0 L1 | Unix | ACCESS CONTROL, CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION |
2.4.8 Ensure File Sharing Is Disabled - SMB | CIS Apple macOS 10.14 v2.0.0 L1 | Unix | ACCESS CONTROL, CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION |
2.12 Audit Touch ID and Wallet & Apple Pay Settings | CIS Apple macOS 10.15 Catalina v3.0.0 L1 | Unix | CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND SERVICES ACQUISITION |
2.15 Audit Touch ID and Wallet & Apple Pay Settings | CIS Apple macOS 10.14 v2.0.0 L1 | Unix | CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND SERVICES ACQUISITION |
7.5 Firewall Consideration | CIS Apple OSX 10.9 L2 v1.3.0 | Unix | |
7.11 App Store Password Settings | CIS Apple macOS 10.12 L2 v1.2.0 | Unix | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
Big Sur - Ensure Secure Boot Level Set to Full | NIST macOS Big Sur v1.4.0 - 800-53r4 High | Unix | SYSTEM AND INFORMATION INTEGRITY |
Big Sur - Ensure Secure Boot Level Set to Full | NIST macOS Big Sur v1.4.0 - 800-53r5 High | Unix | SYSTEM AND INFORMATION INTEGRITY |
Big Sur - Ensure the System Implements Malicious Code Protection Mechanisms | NIST macOS Big Sur v1.4.0 - 800-53r5 High | Unix | SYSTEM AND INFORMATION INTEGRITY |
Big Sur - Ensure the System Implements Malicious Code Protection Mechanisms | NIST macOS Big Sur v1.4.0 - 800-53r5 Low | Unix | SYSTEM AND INFORMATION INTEGRITY |
Big Sur - Ensure the System Implements Malicious Code Protection Mechanisms | NIST macOS Big Sur v1.4.0 - 800-53r5 Moderate | Unix | SYSTEM AND INFORMATION INTEGRITY |
Big Sur - Ensure the System Implements Malicious Code Protection Mechanisms | NIST macOS Big Sur v1.4.0 - All Profiles | Unix | SYSTEM AND INFORMATION INTEGRITY |
Catalina - Ensure the System Implements Malicious Code Protection Mechanisms | NIST macOS Catalina v1.5.0 - 800-53r5 Low | Unix | SYSTEM AND INFORMATION INTEGRITY |
Catalina - Ensure the System Implements Malicious Code Protection Mechanisms | NIST macOS Catalina v1.5.0 - 800-53r5 High | Unix | SYSTEM AND INFORMATION INTEGRITY |
Catalina - Ensure the System Implements Malicious Code Protection Mechanisms | NIST macOS Catalina v1.5.0 - All Profiles | Unix | SYSTEM AND INFORMATION INTEGRITY |
Catalina - Ensure the System Implements Malicious Code Protection Mechanisms | NIST macOS Catalina v1.5.0 - 800-53r5 Moderate | Unix | SYSTEM AND INFORMATION INTEGRITY |
DISA_MongoDB_Enterprise_Advanced_7.x_STIG_v1r1_Unix.audit from DISA MongoDB Enterprise Advanced 7.x STIG v1r1 | DISA MongoDB Enterprise Advanced 7.x STIG v1r1 | Unix | |
DISA_STIG_Cisco_IOS_XE_Router_NDM_v3r2.audit from DISA Cisco IOS XE Router NDM v3r2 STIG | DISA STIG Cisco IOS XE Router NDM v3r2 | Cisco | |
DISA_STIG_Cisco_IOS_XE_Router_RTR_v3r2.audit from DISA Cisco IOS XE Router RTR v3r2 STIG | DISA STIG Cisco IOS XE Router RTR v3r2 | Cisco | |
DISA_STIG_Cisco_IOS_XE_Switch_L2S_v3r1.audit from DISA Cisco IOS XE Switch L2S v3r1 STIG | DISA STIG Cisco IOS XE Switch L2S v3r1 | Cisco | |
DISA_STIG_Microsoft_Exchange_2013_Mailbox_Server_v2r3.audit from DISA Microsoft Exchange 2013 Mailbox Server v2r3 STIG | DISA Microsoft Exchange 2013 Mailbox Server STIG v2r3 | Windows | SYSTEM AND INFORMATION INTEGRITY |
DISA_STIG_Microsoft_Skype_Business_2016_v1r1.audit from DISA STIG Microsoft Skype for Business 2016 v1r1 | DISA STIG Microsoft Skype for Business 2016 v1r1 | Windows | |
DISA_STIG_VMware_vSphere_6.7_Perfcharts_Tomcat_v1r3.audit from DISA VMware vSphere 6.7 Perfcharts Tomcat v1r3 STIG | DISA STIG VMware vSphere 6.7 Perfcharts Tomcat v1r3 | Unix | |
DISA_STIG_VMware_vSphere_6.7_UI_Tomcat_v1r3.audit from DISA VMware vSphere 6.7 UI Tomcat v1r3 STIG | DISA STIG VMware vSphere 6.7 UI Tomcat v1r3 | Unix | |
DISA_SUSE_Linux_Enterprise_Server_15_STIG_v2r4.audit from DISA SUSE Linux Enterprise Server 15 STIG v2r4 | DISA SUSE Linux Enterprise Server 15 STIG v2r4 | Unix | |
F5BI-AP-000235 - The F5 BIG-IP appliance APM Access Policies that grant access to web application resources must allow only client certificates that have the User Persona Name (UPN) value in the User Persona Client Certificates. | DISA F5 BIG-IP Access Policy Manager STIG v2r4 | F5 | SYSTEM AND COMMUNICATIONS PROTECTION |
Monterey - Ensure the System Implements Malicious Code Protection Mechanisms | NIST macOS Monterey v1.0.0 - 800-53r5 Moderate | Unix | SYSTEM AND INFORMATION INTEGRITY |
Monterey - Ensure the System Implements Malicious Code Protection Mechanisms | NIST macOS Monterey v1.0.0 - 800-53r5 Low | Unix | SYSTEM AND INFORMATION INTEGRITY |
Monterey - Ensure the System Implements Malicious Code Protection Mechanisms | NIST macOS Monterey v1.0.0 - All Profiles | Unix | SYSTEM AND INFORMATION INTEGRITY |
Monterey - Ensure the System Implements Malicious Code Protection Mechanisms | NIST macOS Monterey v1.0.0 - 800-53r5 High | Unix | SYSTEM AND INFORMATION INTEGRITY |