Item Search

NameAudit NamePluginCategory
5.3.4 Ensure password hashing algorithm is SHA-512CIS Debian 8 Server L1 v2.0.2Unix

IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

6.1.1 Ensure permissions on /etc/passwd are configuredCIS Amazon Linux 2023 Server L1 v1.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

6.1.2 Ensure permissions on /etc/passwd are configuredCIS Amazon Linux 2023 Server L1 v1.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

6.1.3 Ensure permissions on /etc/group are configuredCIS Google Container-Optimized OS v1.2.0 L1 ServerUnix

ACCESS CONTROL, MEDIA PROTECTION

6.1.3 Ensure permissions on /etc/passwd are configuredCIS CentOS Linux 8 Server L1 v2.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

6.1.3 Ensure permissions on /etc/passwd are configuredCIS CentOS Linux 8 Workstation L1 v2.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

6.1.3 Ensure permissions on /etc/passwd are configuredCIS Fedora 28 Family Linux Server L1 v2.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

6.1.3 Ensure permissions on /etc/passwd- are configuredCIS Amazon Linux 2023 Server L1 v1.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

6.1.4 Ensure permissions on /etc/gshadow are configuredCIS Google Container-Optimized OS v1.2.0 L1 ServerUnix

ACCESS CONTROL, MEDIA PROTECTION

6.1.4 Ensure permissions on /etc/shadow are configuredCIS CentOS Linux 8 Server L1 v2.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

6.1.4 Ensure permissions on /etc/shadow are configuredCIS Fedora 28 Family Linux Server L1 v2.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

6.1.5 Ensure permissions on /etc/group are configuredCIS Fedora 28 Family Linux Server L1 v2.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

6.1.5 Ensure permissions on /etc/group are configuredCIS CentOS Linux 8 Server L1 v2.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

6.1.5 Ensure permissions on /etc/group are configuredCIS Fedora 28 Family Linux Workstation L1 v2.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

6.1.5 Ensure permissions on /etc/passwd- are configuredCIS Google Container-Optimized OS v1.2.0 L2 ServerUnix

ACCESS CONTROL, MEDIA PROTECTION

6.1.6 Ensure permissions on /etc/gshadow are configuredCIS Fedora 28 Family Linux Workstation L1 v2.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

6.1.6 Ensure permissions on /etc/gshadow- are configuredCIS Amazon Linux 2 STIG v2.0.0 L1 ServerUnix

ACCESS CONTROL, MEDIA PROTECTION

6.1.6 Ensure permissions on /etc/gshadow- are configuredCIS Amazon Linux 2 STIG v2.0.0 L1 WorkstationUnix

ACCESS CONTROL, MEDIA PROTECTION

6.1.6 Ensure permissions on /etc/gshadow- are configuredCIS Red Hat Enterprise Linux 7 STIG v2.0.0 L1 WorkstationUnix

ACCESS CONTROL, MEDIA PROTECTION

6.1.6 Ensure permissions on /etc/shadow are configuredCIS Amazon Linux 2023 Server L1 v1.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

6.1.7 Ensure permissions on /etc/group- are configuredCIS Google Container-Optimized OS v1.2.0 L1 ServerUnix

ACCESS CONTROL, MEDIA PROTECTION

6.1.7 Ensure permissions on /etc/gshadow are configuredCIS Oracle Linux 7 v4.0.0 L1 WorkstationUnix

ACCESS CONTROL, MEDIA PROTECTION

6.1.7 Ensure permissions on /etc/gshadow are configuredCIS Amazon Linux 2 v3.0.0 L1Unix

ACCESS CONTROL, MEDIA PROTECTION

6.1.7 Ensure permissions on /etc/gshadow are configuredCIS CentOS Linux 7 v4.0.0 L1 WorkstationUnix

ACCESS CONTROL, MEDIA PROTECTION

6.1.7 Ensure permissions on /etc/passwd- are configuredCIS CentOS Linux 8 Workstation L1 v2.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

6.1.7 Ensure permissions on /etc/passwd- are configuredCIS Fedora 28 Family Linux Server L1 v2.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

6.1.7 Ensure permissions on /etc/passwd- are configuredCIS CentOS Linux 8 Server L1 v2.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

6.1.7 Ensure permissions on /etc/shadow- are configuredCIS Amazon Linux 2023 Server L1 v1.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

6.1.8 Ensure permissions on /etc/gshadow are configuredCIS Amazon Linux 2023 Server L1 v1.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

6.1.8 Ensure permissions on /etc/gshadow are configuredCIS Rocky Linux 8 Server L1 v2.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

6.1.8 Ensure permissions on /etc/gshadow are configuredCIS Oracle Linux 8 Workstation L1 v3.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

6.1.8 Ensure permissions on /etc/gshadow- are configuredCIS CentOS Linux 7 v4.0.0 L1 ServerUnix

ACCESS CONTROL, MEDIA PROTECTION

6.1.8 Ensure permissions on /etc/gshadow- are configuredCIS Amazon Linux 2 v3.0.0 L1Unix

ACCESS CONTROL, MEDIA PROTECTION

6.1.8 Ensure permissions on /etc/gshadow- are configuredCIS CentOS Linux 7 v4.0.0 L1 WorkstationUnix

ACCESS CONTROL, MEDIA PROTECTION

6.1.8 Ensure permissions on /etc/gshadow- are configuredCIS Google Container-Optimized OS v1.2.0 L2 ServerUnix

ACCESS CONTROL, MEDIA PROTECTION

6.1.8 Ensure permissions on /etc/gshadow- are configuredCIS Oracle Linux 7 v4.0.0 L1 WorkstationUnix

ACCESS CONTROL, MEDIA PROTECTION

6.1.8 Ensure permissions on /etc/shadow- are configuredCIS Fedora 28 Family Linux Workstation L1 v2.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

6.1.9 Ensure permissions on /etc/group- are configuredCIS CentOS Linux 8 Workstation L1 v2.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

6.1.9 Ensure permissions on /etc/group- are configuredCIS Fedora 28 Family Linux Workstation L1 v2.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

6.1.9 Ensure permissions on /etc/gshadow- are configuredCIS AlmaLinux OS 8 Server L1 v3.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

6.1.9 Ensure permissions on /etc/gshadow- are configuredCIS Oracle Linux 8 Server L1 v3.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

6.1.9 Ensure permissions on /etc/gshadow- are configuredCIS Amazon Linux 2023 Server L1 v1.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

6.1.9 Ensure permissions on /etc/gshadow- are configuredCIS AlmaLinux OS 8 Workstation L1 v3.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

6.1.10 Ensure permissions on /etc/gshadow- are configuredCIS CentOS Linux 8 Workstation L1 v2.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

7.1 Ensure authentication file permissions are set correctlyCIS MongoDB 3.6 L1 Unix Audit v1.1.0Unix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

7.1 Ensure authentication file permissions are set correctlyCIS MongoDB 3.6 L1 Windows Audit v1.1.0Windows

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

7.1.7 Ensure permissions on /etc/gshadow are configuredCIS AlmaLinux OS 9 v2.0.0 L1 WorkstationUnix

ACCESS CONTROL, MEDIA PROTECTION

7.1.7 Ensure permissions on /etc/gshadow are configuredCIS Oracle Linux 9 v2.0.0 L1 WorkstationUnix

ACCESS CONTROL, MEDIA PROTECTION

7.1.8 Ensure permissions on /etc/gshadow- are configuredCIS AlmaLinux OS 9 v2.0.0 L1 ServerUnix

ACCESS CONTROL, MEDIA PROTECTION

7.1.8 Ensure permissions on /etc/gshadow- are configuredCIS Oracle Linux 9 v2.0.0 L1 ServerUnix

ACCESS CONTROL, MEDIA PROTECTION