Item Search

NameAudit NamePluginCategory
2.11 Implement Connection Delays to Limit Failed Login Attempts - connection_control_failed_connections_thresholdCIS MySQL 5.6 Community Database L1 v2.0.0MySQLDB

ACCESS CONTROL

2.13 Ensure that authorization for Docker client commands is enabledCIS Docker v1.8.0 L2 OS LinuxUnix

ACCESS CONTROL

2.15 Implement Connection Delays to Limit Failed Login Attempts - CONNECTION_CONTROLCIS MySQL 5.7 Enterprise Database L1 v2.0.0MySQLDB

ACCESS CONTROL

2.15 Implement Connection Delays to Limit Failed Login Attempts - connection_control_failed_connections_thresholdCIS MySQL 5.7 Community Database L1 v2.0.0MySQLDB

ACCESS CONTROL

2.15 Implement Connection Delays to Limit Failed Login Attempts - CONNECTION_CONTROL_FAILED_LOGIN_ATTEMPTSCIS MySQL 5.7 Enterprise Database L1 v2.0.0MySQLDB

ACCESS CONTROL

2.15 Implement Connection Delays to Limit Failed Login Attempts - CONNECTION_CONTROL_FAILED_LOGIN_ATTEMPTSCIS MySQL 5.7 Community Database L1 v2.0.0MySQLDB

ACCESS CONTROL

2.18 Implement Connection Delays to Limit Failed Login AttemptsCIS Oracle MySQL Community Server 8.0 v1.2.0 L1 MySQL RDBMS on Linux MySQLDBMySQLDB

ACCESS CONTROL

2.18 Implement Connection Delays to Limit Failed Login AttemptsCIS Oracle MySQL Enterprise Edition 8.0 v1.5.0 L1 MySQL RDBMS MySQLDBMySQLDB

ACCESS CONTROL

2.18 Implement Connection Delays to Limit Failed Login AttemptsCIS Oracle MySQL Enterprise Edition 8.4 v1.1.0 L1 MySQL RDBMS on Linux MySQLDBMySQLDB

ACCESS CONTROL

2.18 Implement Connection Delays to Limit Failed Login AttemptsCIS Oracle MySQL Community Server 8.0 v1.2.0 L1 MySQL RDBMS MySQLDBMySQLDB

ACCESS CONTROL

2.18 Implement Connection Delays to Limit Failed Login AttemptsCIS Oracle MySQL Enterprise Edition 8.0 v1.5.0 L1 MySQL RDBMS on Linux MySQLDBMySQLDB

ACCESS CONTROL

3.2.1.26 Ensure 'Allow proximity based password sharing requests' is set to 'Disabled'MobileIron - CIS Apple iOS 14 and iPadOS 14 Institution Owned L1MDM

ACCESS CONTROL

4.6 Ensure the maximum failed login attempts is set to 3CIS VMware ESXi 6.5 v1.0.0 Level 1VMware

ACCESS CONTROL

5.1.8 Ensure cron is restricted to authorized users - cron.allowCIS Fedora 19 Family Linux Workstation L1 v1.0.0Unix

ACCESS CONTROL

5.1.9 Ensure at is restricted to authorized users - at.allowCIS Fedora 19 Family Linux Workstation L1 v1.0.0Unix

ACCESS CONTROL

5.1.9 Ensure at is restricted to authorized users - at.denyCIS Fedora 19 Family Linux Server L1 v1.0.0Unix

ACCESS CONTROL

5.3.3 Ensure password reuse is limitedCIS Debian 9 Workstation L1 v1.0.1Unix

ACCESS CONTROL

5.3.4 Ensure password reuse is limitedCIS Fedora 19 Family Linux Workstation L1 v1.0.0Unix

ACCESS CONTROL

5.4.2 Ensure system accounts are non-loginCIS Debian 9 Server L1 v1.0.1Unix

ACCESS CONTROL

5.4.2 Ensure system accounts are secured - lock not rootCIS Fedora 19 Family Linux Workstation L1 v1.0.0Unix

ACCESS CONTROL

5.4.2 Ensure system accounts are secured - lock not rootCIS Fedora 19 Family Linux Server L1 v1.0.0Unix

ACCESS CONTROL

5.4.3 Ensure password reuse is limitedCIS Ubuntu Linux 16.04 LTS Workstation L1 v2.0.0Unix

ACCESS CONTROL

5.5.2 Ensure system accounts are securedCIS Ubuntu Linux 16.04 LTS Server L1 v2.0.0Unix

ACCESS CONTROL

5.5.2 Ensure system accounts are securedCIS Ubuntu Linux 16.04 LTS Workstation L1 v2.0.0Unix

ACCESS CONTROL

6.2.13 Ensure all groups in /etc/passwd exist in /etc/groupCIS Fedora 19 Family Linux Server L1 v1.0.0Unix

ACCESS CONTROL

6.2.13 Ensure no duplicate UIDs existCIS Debian Family Workstation L1 v1.0.0Unix

ACCESS CONTROL

6.2.13 Ensure no duplicate UIDs existCIS Ubuntu Linux 16.04 LTS Server L1 v2.0.0Unix

ACCESS CONTROL

6.2.14 Ensure no duplicate GIDs existCIS Debian Family Workstation L1 v1.0.0Unix

ACCESS CONTROL

6.2.14 Ensure no duplicate GIDs existCIS Ubuntu Linux 16.04 LTS Server L1 v2.0.0Unix

ACCESS CONTROL

6.2.14 Ensure no duplicate GIDs existCIS Debian Family Server L1 v1.0.0Unix

ACCESS CONTROL

6.2.14 Ensure no duplicate UIDs existCIS Fedora 19 Family Linux Server L1 v1.0.0Unix

ACCESS CONTROL

6.2.15 Ensure no duplicate GIDs existCIS Fedora 19 Family Linux Workstation L1 v1.0.0Unix

ACCESS CONTROL

6.2.15 Ensure no duplicate user names existCIS Ubuntu Linux 16.04 LTS Workstation L1 v2.0.0Unix

ACCESS CONTROL

6.2.15 Ensure no duplicate user names existCIS Debian Family Server L1 v1.0.0Unix

ACCESS CONTROL

6.2.15 Ensure no duplicate user names existCIS Ubuntu Linux 16.04 LTS Server L1 v2.0.0Unix

ACCESS CONTROL

6.2.16 Ensure no duplicate group names existCIS Ubuntu Linux 16.04 LTS Server L1 v2.0.0Unix

ACCESS CONTROL

6.2.16 Ensure no duplicate UIDs existCIS SUSE Linux Enterprise Server 11 L1 v2.1.1Unix

ACCESS CONTROL

6.2.16 Ensure no duplicate user names existCIS Fedora 19 Family Linux Workstation L1 v1.0.0Unix

ACCESS CONTROL

6.2.17 Ensure no duplicate GIDs existCIS SUSE Linux Enterprise Server 11 L1 v2.1.1Unix

ACCESS CONTROL

6.2.17 Ensure no duplicate GIDs existCIS SUSE Linux Enterprise Workstation 11 L1 v2.1.1Unix

ACCESS CONTROL

6.2.17 Ensure no duplicate group names existCIS Fedora 19 Family Linux Workstation L1 v1.0.0Unix

ACCESS CONTROL

6.2.18 Ensure no duplicate user names existCIS SUSE Linux Enterprise Server 11 L1 v2.1.1Unix

ACCESS CONTROL

6.2.18 Ensure no duplicate user names existCIS Debian 9 Server L1 v1.0.1Unix

ACCESS CONTROL

6.2.18 Ensure no duplicate user names existCIS Debian 9 Workstation L1 v1.0.1Unix

ACCESS CONTROL

6.2.19 Ensure no duplicate group names existCIS SUSE Linux Enterprise Workstation 11 L1 v2.1.1Unix

ACCESS CONTROL

6.2.19 Ensure no duplicate group names existCIS Debian 9 Workstation L1 v1.0.1Unix

ACCESS CONTROL

6.6.1.2 Ensure Max Login Backoff Threshold of 2CIS Juniper OS Benchmark v2.1.0 L1Juniper

ACCESS CONTROL

6.6.6 Ensure Predefined Login Classes are not usedCIS Juniper OS Benchmark v2.1.0 L1Juniper

ACCESS CONTROL

7.9 FileVault and Local Account Password Reset using AppleIDCIS Apple macOS 10.12 L2 v1.2.0Unix

ACCESS CONTROL

7.13 Apple Watch features with macOSCIS Apple macOS 10.13 L1 v1.1.0Unix

ACCESS CONTROL