2.3.17.1 Ensure 'User Account Control: Admin Approval Mode for the Built-in Administrator account' is set to 'Enabled' | CIS Windows 7 Workstation Level 1 + Bitlocker v3.2.0 | Windows | ACCESS CONTROL |
2.8 Ensure an IAM policy that allows admin privileges for all services used is created - Review Policy Document | CIS Amazon Web Services Three-tier Web Architecture L1 1.0.0 | amazon_aws | ACCESS CONTROL |
3.1.3 Require explicit authorization for cataloging | CIS IBM DB2 v10 v1.1.0 Linux OS Level 1 | Unix | ACCESS CONTROL |
3.1.3 Require explicit authorization for cataloging | CIS IBM DB2 v10 v1.1.0 Windows OS Level 1 | Windows | ACCESS CONTROL |
3.1.3 Require explicit authorization for cataloging | CIS IBM DB2 v10 v1.1.0 Linux OS Level 2 | Unix | ACCESS CONTROL |
3.4 Ensure that each role for each MongoDB database is needed and grants only the necessary privileges | CIS MongoDB Database Audit L2 v1.0.0 | MongoDB | ACCESS CONTROL |
3.5 Review User-Defined Roles | CIS MongoDB 3.2 Database Audit L2 v1.0.0 | MongoDB | ACCESS CONTROL |
3.5 Review User-Defined Roles | CIS MongoDB 3.4 Database Audit L2 v1.0.0 | MongoDB | ACCESS CONTROL |
3.6 Review Superuser/Admin Roles - clusterAdmin | CIS MongoDB Database Audit L2 v1.0.0 | MongoDB | ACCESS CONTROL |
3.6 Review Superuser/Admin Roles - dbAdminAnyDatabase | CIS MongoDB Database Audit L2 v1.0.0 | MongoDB | ACCESS CONTROL |
3.6 Review Superuser/Admin Roles - dbOwner | CIS MongoDB Database Audit L2 v1.0.0 | MongoDB | ACCESS CONTROL |
3.6 Review Superuser/Admin Roles - hostManager | CIS MongoDB Database Audit L2 v1.0.0 | MongoDB | ACCESS CONTROL |
3.6 Review Superuser/Admin Roles - readWriteAnyDatabase | CIS MongoDB Database Audit L2 v1.0.0 | MongoDB | ACCESS CONTROL |
5.4.2.1 Ensure root is the only UID 0 account | CIS Oracle Linux 9 v2.0.0 L1 Server | Unix | ACCESS CONTROL |
5.4.2.1 Ensure root is the only UID 0 account | CIS Ubuntu Linux 24.04 LTS v1.0.0 L1 Workstation | Unix | ACCESS CONTROL |
5.4.2.1 Ensure root is the only UID 0 account | CIS Rocky Linux 9 v2.0.0 L1 Server | Unix | ACCESS CONTROL |
5.4.2.1 Ensure root is the only UID 0 account | CIS Rocky Linux 9 v2.0.0 L1 Workstation | Unix | ACCESS CONTROL |
5.4.2.1 Ensure root is the only UID 0 account | CIS SUSE Linux Enterprise 15 v2.0.0 L1 Server | Unix | ACCESS CONTROL |
5.4.2.1 Ensure root is the only UID 0 account | CIS Ubuntu Linux 24.04 LTS v1.0.0 L1 Server | Unix | ACCESS CONTROL |
6.2.5 Ensure root is the only UID 0 account | CIS Ubuntu Linux 14.04 LTS Server L1 v2.1.0 | Unix | ACCESS CONTROL |
6.2.5 Ensure root is the only UID 0 account | CIS Amazon Linux v2.1.0 L1 | Unix | ACCESS CONTROL |
6.2.9 Ensure root is the only UID 0 account | CIS CentOS Linux 7 v4.0.0 L1 Server | Unix | ACCESS CONTROL |
6.2.9 Ensure root is the only UID 0 account | CIS Oracle Linux 7 v4.0.0 L1 Server | Unix | ACCESS CONTROL |
6.34 Ensure RDS Database is configured to use the Data Tier Security Group | CIS Amazon Web Services Three-tier Web Architecture L1 1.0.0 | amazon_aws | ACCESS CONTROL |
7.1 Secure SYSADM authority - SYSADM Group | CIS IBM DB2 v10 v1.1.0 Linux OS Level 2 | Unix | ACCESS CONTROL |
7.1 Secure SYSADM authority - SYSADM Group | CIS IBM DB2 v10 v1.1.0 Windows OS Level 2 | Windows | ACCESS CONTROL |
7.1 Secure SYSADM authority - SYSADM Group Members | CIS IBM DB2 v10 v1.1.0 Linux OS Level 2 | Unix | ACCESS CONTROL |
7.2 Establish a system control group | CIS IBM DB2 9 Benchmark v3.0.1 Level 2 OS Linux | Unix | ACCESS CONTROL |
7.2 Secure SYSCTRL authority - SYSCTRL Group | CIS IBM DB2 v10 v1.1.0 Windows OS Level 2 | Windows | ACCESS CONTROL |
7.2 Secure SYSCTRL authority - SYSCTRL Group | CIS IBM DB2 v10 v1.1.0 Linux OS Level 2 | Unix | ACCESS CONTROL |
7.2 Secure SYSCTRL authority - SYSCTRL Group Members | CIS IBM DB2 v10 v1.1.0 Linux OS Level 2 | Unix | ACCESS CONTROL |
7.3 Establish a system maintenance group | CIS IBM DB2 9 Benchmark v3.0.1 Level 1 OS Linux | Unix | ACCESS CONTROL |
7.3 Establish a system maintenance group | CIS IBM DB2 9 Benchmark v3.0.1 Level 1 OS Windows | Windows | ACCESS CONTROL |
7.3 Secure SYSMAINT Authority | CIS IBM DB2 v10 v1.1.0 Linux OS Level 1 | Unix | ACCESS CONTROL |
7.3 Secure SYSMAINT Authority | CIS IBM DB2 v10 v1.1.0 Windows OS Level 1 | Windows | ACCESS CONTROL |
7.3 Secure SYSMAINT Authority | CIS IBM DB2 v10 v1.1.0 Linux OS Level 2 | Unix | ACCESS CONTROL |
7.4 Establish a system monitoring group | CIS IBM DB2 9 Benchmark v3.0.1 Level 1 OS Linux | Unix | ACCESS CONTROL |
7.4 Secure SYSMON Authority | CIS IBM DB2 v10 v1.1.0 Linux OS Level 2 | Unix | ACCESS CONTROL |
9.5 Verify No UID 0 Accounts Exist Other than root | CIS Solaris 11.1 L1 v1.0.0 | Unix | ACCESS CONTROL |
9.5 Verify No UID 0 Accounts Exist Other than root | CIS Solaris 11.2 L1 v1.1.0 | Unix | ACCESS CONTROL |
9.5 Verify that no UID 0 accounts exist other than root | CIS Solaris 10 L1 v5.2 | Unix | ACCESS CONTROL |
Ensure root is the only UID 0 account | Tenable Cisco Firepower Management Center OS Best Practices Audit | Unix | ACCESS CONTROL |
Ensure that database instances do not allow root access | Tenable Best Practices RackSpace v2.0.0 | Rackspace | ACCESS CONTROL |
ESXi : enable-strict-lockdown-mode | VMWare vSphere 6.0 Hardening Guide | VMware | ACCESS CONTROL |
OpenStack Identity - Disable admin token in /etc/keystone/keystone-paste.ini | TNS OpenStack Keystone/Identity Security Guide | Unix | ACCESS CONTROL |
User Account Control: Admin Approval Mode for the Built-in Administrator account | MSCT Windows 10 v22H2 v1.0.0 | Windows | ACCESS CONTROL |
User Account Control: Admin Approval Mode for the Built-in Administrator account | MSCT Windows 10 v1507 v1.0.0 | Windows | ACCESS CONTROL |
User Account Control: Admin Approval Mode for the Built-in Administrator account | MSCT Windows 10 1903 v1.19.9 | Windows | ACCESS CONTROL |
User Account Control: Admin Approval Mode for the Built-in Administrator account | MSCT Windows Server 2019 MS v1.0.0 | Windows | ACCESS CONTROL |
User Account Control: Admin Approval Mode for the Built-in Administrator account | MSCT Windows 10 v20H2 v1.0.0 | Windows | ACCESS CONTROL |