1.10 Limit the number of users with ACCOUNTADMIN and SECURITYADMIN | CIS Snowflake Foundations v1.0.0 L1 | Snowflake | ACCESS CONTROL |
2.1.3 Ensure chrony is not run as the root user | CIS Red Hat EL8 Server L1 v3.0.0 | Unix | ACCESS CONTROL |
2.1.3 Ensure chrony is not run as the root user | CIS Red Hat EL8 Workstation L1 v3.0.0 | Unix | ACCESS CONTROL |
2.1.3 Ensure chrony is not run as the root user | CIS Oracle Linux 7 v4.0.0 L1 Workstation | Unix | ACCESS CONTROL |
2.1.3 Ensure chrony is not run as the root user | CIS Red Hat Enterprise Linux 7 v4.0.0 L1 Server | Unix | ACCESS CONTROL |
2.1.3 Ensure chrony is not run as the root user | CIS AlmaLinux OS 8 Workstation L1 v3.0.0 | Unix | ACCESS CONTROL |
2.3.3 Ensure chrony is not run as the root user | CIS AlmaLinux OS 9 v2.0.0 L1 Server | Unix | ACCESS CONTROL |
2.3.3 Ensure chrony is not run as the root user | CIS Rocky Linux 9 v2.0.0 L1 Workstation | Unix | ACCESS CONTROL |
3.7 Ensure 'cookies' are set with HttpOnly attribute - Default | CIS IIS 7 L2 v1.8.0 | Windows | ACCESS CONTROL |
4.1 Create a user for the container | CIS Docker 1.11.0 v1.0.0 L1 Docker | Unix | ACCESS CONTROL |
4.2 Restrict access to $CATALINA_BASE | CIS Apache Tomcat 7 L1 v1.1.0 | Unix | ACCESS CONTROL |
4.3 Restrict access to Tomcat configuration directory | CIS Apache Tomcat 7 L1 v1.1.0 | Unix | ACCESS CONTROL |
4.3 Restrict access to Tomcat configuration directory | CIS Apache Tomcat 7 L1 v1.1.0 Middleware | Unix | ACCESS CONTROL |
4.8 Ensure Handler is not granted Write and Script/Execute | CIS IIS 8.0 v1.5.1 Level 1 | Windows | ACCESS CONTROL |
4.8 Ensure Handler is not granted Write and Script/Execute - Applications | CIS IIS 7 L1 v1.8.0 | Windows | ACCESS CONTROL |
4.10 Restrict access to Tomcat context.xml | CIS Apache Tomcat 7 L1 v1.1.0 Middleware | Unix | ACCESS CONTROL |
5.7 Do not enable the 'root' account | CIS Apple macOS 10.13 L1 v1.1.0 | Unix | ACCESS CONTROL |
6.2 Restrict Access to SYSCAT.AUDITUSE | CIS IBM DB2 v10 v1.1.0 Database Level 1 | IBM_DB2DB | ACCESS CONTROL |
6.6 Restrict Access to SYSCAT.EVENTTABLES | CIS IBM DB2 v10 v1.1.0 Database Level 2 | IBM_DB2DB | ACCESS CONTROL |
6.6 Restrict Access to SYSCAT.EVENTTABLES | CIS IBM DB2 9 Benchmark v3.0.1 Level 1 DB | IBM_DB2DB | ACCESS CONTROL |
6.7 Restrict Access to SYSCAT.ROUTINES | CIS IBM DB2 9 Benchmark v3.0.1 Level 2 DB | IBM_DB2DB | ACCESS CONTROL |
6.9 Restrict Access to SYSCAT.PACKAGEAUTH | CIS IBM DB2 9 Benchmark v3.0.1 Level 1 DB | IBM_DB2DB | ACCESS CONTROL |
6.10 Restrict Access to SYSCAT.PACKAGES | CIS IBM DB2 v10 v1.1.0 Database Level 2 | IBM_DB2DB | ACCESS CONTROL |
6.11 Restrict Access to SYSCAT.PASSTHRUAUTH | CIS IBM DB2 v10 v1.1.0 Database Level 2 | IBM_DB2DB | ACCESS CONTROL |
6.11 Restrict Access to SYSCAT.PASSTHRUAUTH | CIS IBM DB2 9 Benchmark v3.0.1 Level 1 DB | IBM_DB2DB | ACCESS CONTROL |
6.12 Restrict Access to SYSCAT.SECURITYPOLICIES | CIS IBM DB2 v10 v1.1.0 Database Level 2 | IBM_DB2DB | ACCESS CONTROL |
6.14 Restrict Access to SYSCAT.SECURITYLABELCOMPONENTS | CIS IBM DB2 9 Benchmark v3.0.1 Level 1 DB | IBM_DB2DB | ACCESS CONTROL |
6.15 Restrict Access to SYSCAT.ROLEAUTH | CIS IBM DB2 v10 v1.1.0 Database Level 1 | IBM_DB2DB | ACCESS CONTROL |
6.18 Restrict Access to SYSCAT.SCHEMAAUTH | CIS IBM DB2 v10 v1.1.0 Database Level 1 | IBM_DB2DB | ACCESS CONTROL |
6.18 Restrict Access to SYSCAT.SECURITYPOLICYEXEMPTIONS | CIS IBM DB2 9 Benchmark v3.0.1 Level 1 DB | IBM_DB2DB | ACCESS CONTROL |
6.19 Restrict Access to SYSCAT.SCHEMATA | CIS IBM DB2 v10 v1.1.0 Database Level 2 | IBM_DB2DB | ACCESS CONTROL |
6.24 Restrict Access to Tablespaces | CIS IBM DB2 v10 v1.1.0 Database Level 1 | IBM_DB2DB | ACCESS CONTROL |
6.26 Restrict Access to SYSCAT.VARIABLEAUTH | CIS IBM DB2 v10 v1.1.0 Database Level 2 | IBM_DB2DB | ACCESS CONTROL |
6.27 Restrict Access to SYSCAT.PROCEDURES | CIS IBM DB2 9 Benchmark v3.0.1 Level 1 DB | IBM_DB2DB | ACCESS CONTROL |
6.28 Restrict Access to SYSCAT.XSROBJECTAUTH | CIS IBM DB2 v10 v1.1.0 Database Level 2 | IBM_DB2DB | ACCESS CONTROL |
6.29 Restrict Access to SYSCAT.TBSPACEAUTH | CIS IBM DB2 9 Benchmark v3.0.1 Level 2 DB | IBM_DB2DB | ACCESS CONTROL |
6.36 Restrict Access to SYSIBMADM.PRIVILEGES | CIS IBM DB2 9 Benchmark v3.0.1 Level 2 DB | IBM_DB2DB | ACCESS CONTROL |
7.1 Disable System Accounts - Ensure account 'gdm' is locked. | CIS Solaris 10 L1 v5.2 | Unix | ACCESS CONTROL |
7.1 Disable System Accounts - Ensure account 'sys' disallows password login | CIS Solaris 10 L1 v5.2 | Unix | ACCESS CONTROL |
7.1 Disable System Accounts - should pass if the default shell for 'lp' is set to /usr/bin/false. | CIS Solaris 10 L1 v5.2 | Unix | ACCESS CONTROL |
7.1 Disable System Accounts - should pass if the default shell for 'uucp' is set to /usr/bin/false. | CIS Solaris 10 L1 v5.2 | Unix | ACCESS CONTROL |
8.1 Restrict runtime access to sensitive packages | CIS Apache Tomcat 7 L1 v1.1.0 | Unix | ACCESS CONTROL |
8.2 Restrict access to starting and stopping the DB2 administration server | CIS IBM DB2 9 Benchmark v3.0.1 Level 2 OS Windows | Windows | ACCESS CONTROL |
8.5.2 Ensure anonymous users and dial-in callers can't start a meeting | CIS Microsoft 365 Foundations E3 L1 v3.1.0 | microsoft_azure | ACCESS CONTROL |
9.22 Find World Writable Files | CIS Solaris 10 L1 v5.2 | Unix | ACCESS CONTROL |
10.14 Do not allow symbolic linking | CIS Apache Tomcat 7 L1 v1.1.0 | Unix | ACCESS CONTROL |
12.7 Find World Writable Files | CIS Debian Linux 7 L1 v1.0.0 | Unix | ACCESS CONTROL |
20.29 Ensure 'FTP servers are configured to prevent access to the system drive' (STIG only) | CIS Microsoft Windows Server 2022 STIG v2.0.0 STIG DC | Windows | ACCESS CONTROL |
20.29 Ensure 'FTP servers are configured to prevent access to the system drive' (STIG only) | CIS Microsoft Windows Server 2022 STIG v2.0.0 STIG MS | Windows | ACCESS CONTROL |
20.51 Ensure 'Permissions for the system drive root directory must conform to minimum requirements' | CIS Microsoft Windows Server 2019 STIG v3.0.0 STIG DC | Windows | ACCESS CONTROL |