Item Search

NameAudit NamePluginCategory
1.10 Limit the number of users with ACCOUNTADMIN and SECURITYADMINCIS Snowflake Foundations v1.0.0 L1Snowflake

ACCESS CONTROL

2.1.3 Ensure chrony is not run as the root userCIS Red Hat EL8 Server L1 v3.0.0Unix

ACCESS CONTROL

2.1.3 Ensure chrony is not run as the root userCIS Red Hat EL8 Workstation L1 v3.0.0Unix

ACCESS CONTROL

2.1.3 Ensure chrony is not run as the root userCIS Oracle Linux 7 v4.0.0 L1 WorkstationUnix

ACCESS CONTROL

2.1.3 Ensure chrony is not run as the root userCIS Red Hat Enterprise Linux 7 v4.0.0 L1 ServerUnix

ACCESS CONTROL

2.1.3 Ensure chrony is not run as the root userCIS AlmaLinux OS 8 Workstation L1 v3.0.0Unix

ACCESS CONTROL

2.3.3 Ensure chrony is not run as the root userCIS AlmaLinux OS 9 v2.0.0 L1 ServerUnix

ACCESS CONTROL

2.3.3 Ensure chrony is not run as the root userCIS Rocky Linux 9 v2.0.0 L1 WorkstationUnix

ACCESS CONTROL

3.7 Ensure 'cookies' are set with HttpOnly attribute - DefaultCIS IIS 7 L2 v1.8.0Windows

ACCESS CONTROL

4.1 Create a user for the containerCIS Docker 1.11.0 v1.0.0 L1 DockerUnix

ACCESS CONTROL

4.2 Restrict access to $CATALINA_BASECIS Apache Tomcat 7 L1 v1.1.0Unix

ACCESS CONTROL

4.3 Restrict access to Tomcat configuration directoryCIS Apache Tomcat 7 L1 v1.1.0Unix

ACCESS CONTROL

4.3 Restrict access to Tomcat configuration directoryCIS Apache Tomcat 7 L1 v1.1.0 MiddlewareUnix

ACCESS CONTROL

4.8 Ensure Handler is not granted Write and Script/ExecuteCIS IIS 8.0 v1.5.1 Level 1Windows

ACCESS CONTROL

4.8 Ensure Handler is not granted Write and Script/Execute - ApplicationsCIS IIS 7 L1 v1.8.0Windows

ACCESS CONTROL

4.10 Restrict access to Tomcat context.xmlCIS Apache Tomcat 7 L1 v1.1.0 MiddlewareUnix

ACCESS CONTROL

5.7 Do not enable the 'root' accountCIS Apple macOS 10.13 L1 v1.1.0Unix

ACCESS CONTROL

6.2 Restrict Access to SYSCAT.AUDITUSECIS IBM DB2 v10 v1.1.0 Database Level 1IBM_DB2DB

ACCESS CONTROL

6.6 Restrict Access to SYSCAT.EVENTTABLESCIS IBM DB2 v10 v1.1.0 Database Level 2IBM_DB2DB

ACCESS CONTROL

6.6 Restrict Access to SYSCAT.EVENTTABLESCIS IBM DB2 9 Benchmark v3.0.1 Level 1 DBIBM_DB2DB

ACCESS CONTROL

6.7 Restrict Access to SYSCAT.ROUTINESCIS IBM DB2 9 Benchmark v3.0.1 Level 2 DBIBM_DB2DB

ACCESS CONTROL

6.9 Restrict Access to SYSCAT.PACKAGEAUTHCIS IBM DB2 9 Benchmark v3.0.1 Level 1 DBIBM_DB2DB

ACCESS CONTROL

6.10 Restrict Access to SYSCAT.PACKAGESCIS IBM DB2 v10 v1.1.0 Database Level 2IBM_DB2DB

ACCESS CONTROL

6.11 Restrict Access to SYSCAT.PASSTHRUAUTHCIS IBM DB2 v10 v1.1.0 Database Level 2IBM_DB2DB

ACCESS CONTROL

6.11 Restrict Access to SYSCAT.PASSTHRUAUTHCIS IBM DB2 9 Benchmark v3.0.1 Level 1 DBIBM_DB2DB

ACCESS CONTROL

6.12 Restrict Access to SYSCAT.SECURITYPOLICIESCIS IBM DB2 v10 v1.1.0 Database Level 2IBM_DB2DB

ACCESS CONTROL

6.14 Restrict Access to SYSCAT.SECURITYLABELCOMPONENTSCIS IBM DB2 9 Benchmark v3.0.1 Level 1 DBIBM_DB2DB

ACCESS CONTROL

6.15 Restrict Access to SYSCAT.ROLEAUTHCIS IBM DB2 v10 v1.1.0 Database Level 1IBM_DB2DB

ACCESS CONTROL

6.18 Restrict Access to SYSCAT.SCHEMAAUTHCIS IBM DB2 v10 v1.1.0 Database Level 1IBM_DB2DB

ACCESS CONTROL

6.18 Restrict Access to SYSCAT.SECURITYPOLICYEXEMPTIONSCIS IBM DB2 9 Benchmark v3.0.1 Level 1 DBIBM_DB2DB

ACCESS CONTROL

6.19 Restrict Access to SYSCAT.SCHEMATACIS IBM DB2 v10 v1.1.0 Database Level 2IBM_DB2DB

ACCESS CONTROL

6.24 Restrict Access to TablespacesCIS IBM DB2 v10 v1.1.0 Database Level 1IBM_DB2DB

ACCESS CONTROL

6.26 Restrict Access to SYSCAT.VARIABLEAUTHCIS IBM DB2 v10 v1.1.0 Database Level 2IBM_DB2DB

ACCESS CONTROL

6.27 Restrict Access to SYSCAT.PROCEDURESCIS IBM DB2 9 Benchmark v3.0.1 Level 1 DBIBM_DB2DB

ACCESS CONTROL

6.28 Restrict Access to SYSCAT.XSROBJECTAUTHCIS IBM DB2 v10 v1.1.0 Database Level 2IBM_DB2DB

ACCESS CONTROL

6.29 Restrict Access to SYSCAT.TBSPACEAUTHCIS IBM DB2 9 Benchmark v3.0.1 Level 2 DBIBM_DB2DB

ACCESS CONTROL

6.36 Restrict Access to SYSIBMADM.PRIVILEGESCIS IBM DB2 9 Benchmark v3.0.1 Level 2 DBIBM_DB2DB

ACCESS CONTROL

7.1 Disable System Accounts - Ensure account 'gdm' is locked.CIS Solaris 10 L1 v5.2Unix

ACCESS CONTROL

7.1 Disable System Accounts - Ensure account 'sys' disallows password loginCIS Solaris 10 L1 v5.2Unix

ACCESS CONTROL

7.1 Disable System Accounts - should pass if the default shell for 'lp' is set to /usr/bin/false.CIS Solaris 10 L1 v5.2Unix

ACCESS CONTROL

7.1 Disable System Accounts - should pass if the default shell for 'uucp' is set to /usr/bin/false.CIS Solaris 10 L1 v5.2Unix

ACCESS CONTROL

8.1 Restrict runtime access to sensitive packagesCIS Apache Tomcat 7 L1 v1.1.0Unix

ACCESS CONTROL

8.2 Restrict access to starting and stopping the DB2 administration serverCIS IBM DB2 9 Benchmark v3.0.1 Level 2 OS WindowsWindows

ACCESS CONTROL

8.5.2 Ensure anonymous users and dial-in callers can't start a meetingCIS Microsoft 365 Foundations E3 L1 v3.1.0microsoft_azure

ACCESS CONTROL

9.22 Find World Writable FilesCIS Solaris 10 L1 v5.2Unix

ACCESS CONTROL

10.14 Do not allow symbolic linkingCIS Apache Tomcat 7 L1 v1.1.0Unix

ACCESS CONTROL

12.7 Find World Writable FilesCIS Debian Linux 7 L1 v1.0.0Unix

ACCESS CONTROL

20.29 Ensure 'FTP servers are configured to prevent access to the system drive' (STIG only)CIS Microsoft Windows Server 2022 STIG v2.0.0 STIG DCWindows

ACCESS CONTROL

20.29 Ensure 'FTP servers are configured to prevent access to the system drive' (STIG only)CIS Microsoft Windows Server 2022 STIG v2.0.0 STIG MSWindows

ACCESS CONTROL

20.51 Ensure 'Permissions for the system drive root directory must conform to minimum requirements'CIS Microsoft Windows Server 2019 STIG v3.0.0 STIG DCWindows

ACCESS CONTROL