Item Search

NameAudit NamePluginCategory
1.1 Ensure that Corporate Login Credentials are UsedCIS Google Cloud Platform v3.0.0 L1GCP

ACCESS CONTROL

1.1.1 Enable 'aaa new-model'CIS Cisco IOS 17 L1 v2.0.0Cisco

ACCESS CONTROL

1.1.1 Ensure 'Enforce password history' is set to '24 or more password(s)'CIS Microsoft Windows Server 2019 STIG DC L1 v1.0.1Windows

ACCESS CONTROL

1.1.1.2 RADIUSCIS Cisco IOS XR 7.x v1.0.0 L2Cisco

ACCESS CONTROL

1.1.3 Enable 'aaa authentication enable default'CIS Cisco IOS 16 L1 v2.0.0Cisco

ACCESS CONTROL

1.1.3 Enable 'aaa authentication enable default'CIS Cisco IOS 17 L1 v2.0.0Cisco

ACCESS CONTROL

1.1.4 Set 'login authentication for 'line vty'CIS Cisco IOS 17 L1 v2.0.0Cisco

ACCESS CONTROL

1.1.5 Set 'login authentication for 'ip http' - http secure-serverCIS Cisco IOS 17 L1 v2.0.0Cisco

ACCESS CONTROL

1.1.7 Set 'aaa accounting connection'CIS Cisco IOS 17 L2 v2.0.0Cisco

ACCESS CONTROL

1.21 Ensure IAM users are managed centrally via identity federation or AWS Organizations for multi-account environmentsCIS Amazon Web Services Foundations L2 3.0.0amazon_aws

ACCESS CONTROL

2.1.6 Key chainsCIS Cisco IOS XR 7.x v1.0.0 L2Cisco

ACCESS CONTROL

2.3.1.1 (L1) Ensure 'Accounts: Block Microsoft accounts' is set to 'Users can't add or log on with Microsoft accounts'CIS Microsoft Windows Server 2022 v3.0.0 L1 Domain ControllerWindows

ACCESS CONTROL

2.3.1.1 (L1) Ensure 'Accounts: Block Microsoft accounts' is set to 'Users can't add or log on with Microsoft accounts'CIS Microsoft Windows Server 2016 v3.0.0 L1 DCWindows

ACCESS CONTROL

2.3.1.1 (L1) Ensure 'Accounts: Block Microsoft accounts' is set to 'Users can't add or log on with Microsoft accounts'CIS Microsoft Windows Server 2016 v3.0.0 L1 MSWindows

ACCESS CONTROL

2.3.1.1 (L1) Ensure 'Accounts: Block Microsoft accounts' is set to 'Users can't add or log on with Microsoft accounts'CIS Microsoft Windows 10 Stand-alone v3.0.0 L1 NGWindows

ACCESS CONTROL

2.3.1.1 (L1) Ensure 'Accounts: Block Microsoft accounts' is set to 'Users can't add or log on with Microsoft accounts'CIS Microsoft Windows 10 Enterprise v3.0.0 L1 + BL + NGWindows

ACCESS CONTROL

2.3.1.1 (L1) Ensure 'Accounts: Block Microsoft accounts' is set to 'Users can't add or log on with Microsoft accounts'CIS Microsoft Windows 10 Enterprise v3.0.0 L1 + NGWindows

ACCESS CONTROL

2.3.1.1 (L1) Ensure 'Accounts: Block Microsoft accounts' is set to 'Users can't add or log on with Microsoft accounts'CIS Microsoft Windows 10 Stand-alone v3.0.0 L1Windows

ACCESS CONTROL

2.3.1.1 Ensure 'Accounts: Block Microsoft accounts' is set to 'Blocked'CIS Microsoft Intune for Windows 11 v2.0.0 L1 + NGWindows

ACCESS CONTROL

2.3.1.2 Ensure 'Accounts: Block Microsoft accounts' is set to 'Users can't add or log on with Microsoft accounts'CIS Microsoft Windows Server 2016 STIG DC L1 v1.1.0Windows

ACCESS CONTROL

2.3.1.2 Ensure 'Accounts: Block Microsoft accounts' is set to 'Users can't add or log on with Microsoft accounts'CIS Microsoft Windows Server 2019 STIG DC L1 v1.0.1Windows

ACCESS CONTROL

2.3.9.4 Ensure 'Microsoft network server: Disconnect clients when logon hours expire' is set to 'Enabled'CIS Azure Compute Microsoft Windows Server 2022 v1.0.0 L1 DCWindows

ACCESS CONTROL

2.3.9.4 Ensure 'Microsoft network server: Disconnect clients when logon hours expire' is set to 'Enabled'CIS Microsoft Windows Server 2019 MS Standalone L1 v1.0.0Windows

ACCESS CONTROL

2.3.9.4 Ensure 'Microsoft network server: Disconnect clients when logon hours expire' is set to 'Enabled'CIS Windows Server 2012 R2 MS L1 v3.0.0Windows

ACCESS CONTROL

2.3.9.4 Ensure 'Microsoft network server: Disconnect clients when logon hours expire' is set to 'Enabled'CIS Microsoft Windows Server 2008 Member Server Level 1 v3.3.0Windows

ACCESS CONTROL

2.3.9.4 Ensure 'Microsoft network server: Disconnect clients when logon hours expire' is set to 'Enabled'CIS Microsoft Windows Server 2008 Domain Controller Level 1 v3.3.1Windows

ACCESS CONTROL

2.3.11.6 Ensure 'Network security: Force logoff when logon hours expire' is set to 'Enabled'CIS Microsoft Windows Server 2008 R2 Domain Controller Level 1 v3.3.1Windows

ACCESS CONTROL

2.3.11.6 Ensure 'Network security: Force logoff when logon hours expire' is set to 'Enabled'CIS Microsoft Windows Server 2019 STIG MS L1 v1.0.1Windows

ACCESS CONTROL

2.3.11.6 Ensure 'Network security: Force logoff when logon hours expire' is set to 'Enabled'CIS Microsoft Windows Server 2019 Standalone DC L1 vCIS Microsoft Windows Server 2019 Standalone DC L1 v1.0.0Windows

ACCESS CONTROL

2.3.11.6 Ensure 'Network security: Force logoff when logon hours expire' is set to 'Enabled'CIS Windows Server 2012 R2 MS L1 v3.0.0Windows

ACCESS CONTROL

2.3.11.6 Ensure 'Network security: Force logoff when logon hours expire' is set to 'Enabled'CIS Microsoft Windows Server 2016 STIG DC L1 v1.1.0Windows

ACCESS CONTROL

3.4 Ensure SQL Authentication is not used in contained databasesCIS SQL Server 2019 Database L1 AWS RDS v1.3.0MS_SQLDB

ACCESS CONTROL

3.4 Ensure SQL Authentication is not used in contained databasesCIS SQL Server 2019 Database L1 DB v1.3.0MS_SQLDB

ACCESS CONTROL

3.4 Ensure SQL Authentication is not used in contained databasesCIS SQL Server 2022 Database L1 AWS RDS v1.1.0MS_SQLDB

ACCESS CONTROL

3.11.3.1 (L1) Ensure 'Allow Microsoft accounts to be optional' is set to 'Enabled'CIS Microsoft Intune for Windows 10 v3.0.1 L1Windows

ACCESS CONTROL

4.1.4 Ensure that Microsoft Entra authentication is Configured for SQL ServersCIS Microsoft Azure Foundations v2.1.0 L1microsoft_azure

ACCESS CONTROL

4.3 Ensure 'DBA_USERS.AUTHENTICATION_TYPE' Is Not Set to 'EXTERNAL' for Any UserCIS Oracle Server 19c DB Unified Auditing v1.2.0OracleDB

ACCESS CONTROL

5.5 (L1) Ensure Normal Lockdown mode is enabledCIS VMware ESXi 7.0 v1.4.0 L1VMware

ACCESS CONTROL

5.6 Database Manager Configuration Parameter: FED_NOAUTHCIS IBM DB2 11 v1.1.0 Linux OS Level 1Unix

ACCESS CONTROL

5.6 Ensure Lockdown mode is enabledCIS VMware ESXi 6.7 v1.3.0 Level 1VMware

ACCESS CONTROL

5.11 DB2CHGPWD_EEE Registry VariableCIS IBM DB2 11 v1.1.0 Linux OS Level 1Unix

ACCESS CONTROL

6.2.2 Ensure no legacy '+' entries exist in /etc/passwd - + entries exist in /etc/passwdCIS Google Container-Optimized OS L1 Server v1.1.0Unix

ACCESS CONTROL

18.9.6.1 (L1) Ensure 'Allow Microsoft accounts to be optional' is set to 'Enabled'CIS Azure Compute Microsoft Windows Server 2019 v1.0.0 L1 MSWindows

ACCESS CONTROL

18.9.6.1 Ensure 'Allow Microsoft accounts to be optional' is set to 'Enabled'CIS Microsoft Windows Server 2016 STIG MS L1 v1.1.0Windows

ACCESS CONTROL

18.10.5.1 Ensure 'Allow Microsoft accounts to be optional' is set to 'Enabled'CIS Microsoft Intune for Windows 11 v2.0.0 L1 + BL + NGWindows

ACCESS CONTROL

18.10.41.1 (L1) Ensure 'Block all consumer Microsoft account user authentication' is set to 'Enabled'CIS Microsoft Windows 10 Enterprise v3.0.0 L1Windows

ACCESS CONTROL

18.10.41.1 (L1) Ensure 'Block all consumer Microsoft account user authentication' is set to 'Enabled'CIS Microsoft Windows 10 Stand-alone v3.0.0 L1Windows

ACCESS CONTROL

18.10.41.1 (L1) Ensure 'Block all consumer Microsoft account user authentication' is set to 'Enabled'CIS Microsoft Windows 10 Stand-alone v3.0.0 L1 BLWindows

ACCESS CONTROL

18.10.42.1 Ensure 'Block all consumer Microsoft account user authentication' is set to 'Enabled'CIS Microsoft Windows 10 EMS Gateway v2.0.0 L1Windows

ACCESS CONTROL

45.1 (L1) Ensure 'Accounts: Block Microsoft accounts' is set to 'Users can't add or log on with Microsoft accounts'CIS Microsoft Intune for Windows 11 v3.0.1 L1Windows

ACCESS CONTROL