Item Search

NameAudit NamePluginCategory
2.1 Secure DB2 Runtime LibraryCIS IBM DB2 v10 v1.1.0 Windows OS Level 2Windows
2.1 Secure DB2 Runtime LibraryCIS IBM DB2 v10 v1.1.0 Linux OS Level 2Unix
2.1 Secure the DB2 Runtime LibraryCIS IBM DB2 9 Benchmark v3.0.1 Level 1 OS LinuxUnix
2.2 Secure the database container directoryCIS IBM DB2 v10 v1.1.0 Windows OS Level 2Windows
2.2 Secure the database container directoryCIS IBM DB2 v10 v1.1.0 Linux OS Level 1Unix
2.2 Secure the database container directoryCIS IBM DB2 v10 v1.1.0 Windows OS Level 1Windows
3.1 Restrict Core Dumps to Protected Directory - /var/share/coresCIS Solaris 11.2 L1 v1.1.0Unix
3.1.5 Secure permissions for default database file pathCIS IBM DB2 v10 v1.1.0 Linux OS Level 1Unix
3.1.7 Secure permissions for all diagnostic logsCIS IBM DB2 v10 v1.1.0 Windows OS Level 2Windows
3.1.9 Require instance name for discovery requestsCIS IBM DB2 9 Benchmark v3.0.1 Level 2 DBIBM_DB2DB
3.1.13 Retain fenced model processesCIS IBM DB2 9 Benchmark v3.0.1 Level 2 DBIBM_DB2DB
3.1.17 Secure permissions for the primary archive log location - LOGARCHMETH1 OS PermissionsCIS IBM DB2 v10 v1.1.0 Linux OS Level 2Unix
3.1.18 Secure permissions for the secondary archive log location - LOGARCHMETH2 OS PermissionCIS IBM DB2 v10 v1.1.0 Linux OS Level 1Unix
3.1.19 Secure permissions for the tertiary archive log location - FAILARCHPATH OS PermissionCIS IBM DB2 v10 v1.1.0 Linux OS Level 2Unix
3.1.19 Secure permissions for the tertiary archive log location - FAILARCHPATH OS PermissionsCIS IBM DB2 v10 v1.1.0 Windows OS Level 1Windows
3.1.19 Secure permissions for the tertiary archive log location - FAILARCHPATH OS PermissionsCIS IBM DB2 v10 v1.1.0 Windows OS Level 2Windows
3.1.20 Secure permissions for the log mirror location - MIRROLOGPATH OS PermissionCIS IBM DB2 v10 v1.1.0 Linux OS Level 2Unix
3.2.1 Set failed archive retry delayCIS IBM DB2 9 Benchmark v3.0.1 Level 2 DBIBM_DB2DB
3.2.2 Set the database instance to auto-restart after abnormal terminationCIS IBM DB2 9 Benchmark v3.0.1 Level 2 DBIBM_DB2DB
3.2.2 SSL service name - ssl_svcenameCIS IBM DB2 v10 v1.1.0 Database Level 2IBM_DB2DB
3.2.3 Disable database discoveryCIS IBM DB2 9 Benchmark v3.0.1 Level 2 DBIBM_DB2DB
3.2.6 Secure permissions for the tertiary archive log location - FILE_PERMISSIONSCIS IBM DB2 9 Benchmark v3.0.1 Level 1 OS WindowsWindows
3.2.9 Set archive log failover retry limitCIS IBM DB2 9 Benchmark v3.0.1 Level 2 DBIBM_DB2DB
3.3.5 Secure the JDK 32-bit runtime library - FILE_PERMISSIONSCIS IBM DB2 9 Benchmark v3.0.1 Level 2 OS WindowsWindows
3.4 Control access to audit records - /etc/security/audit_controlCIS Apple macOS 10.12 L1 v1.2.0Unix
3.15 Verify that /etc/docker directory ownership is set to root:rootCIS Docker 1.6 v1.0.0 L1 DockerUnix
3.16 Verify that /etc/docker directory permissions are set to 755 or more restrictiveCIS Docker 1.6 v1.0.0 L1 DockerUnix
5.3 Enable automatic database maintenanceCIS IBM DB2 9 Benchmark v3.0.1 Level 1 DBIBM_DB2DB
5.3 Enable automatic database maintenanceCIS IBM DB2 9 Benchmark v3.0.1 Level 2 DBIBM_DB2DB
7.5 Change Home Directory for root Account - Check /root permissions.CIS Solaris 10 L1 v5.2Unix
8 - Management IP - .htacess existsTNS Best Practice Jetty 9 LinuxUnix
8.8 Secure the permissions of the SSLconfig.ini fileCIS IBM DB2 9 Benchmark v3.0.1 Level 1 OS WindowsWindows
8.8 Secure the permissions of the SSLconfig.ini fileCIS IBM DB2 9 Benchmark v3.0.1 Level 1 OS LinuxUnix
9.6 Secure the permission of the IBMLDAPSecurity.ini fileCIS IBM DB2 v10 v1.1.0 Linux OS Level 1Unix
9.6 Secure the permission of the IBMLDAPSecurity.ini fileCIS IBM DB2 v10 v1.1.0 Windows OS Level 1Windows
9.7 Secure the permission of the SSLconfig.ini fileCIS IBM DB2 v10 v1.1.0 Linux OS Level 1Unix
9.7 Secure the permission of the SSLconfig.ini fileCIS IBM DB2 v10 v1.1.0 Windows OS Level 1Windows
9.8 Check User Dot File Permissions. Please audit the results of this check and take action in accordance with corporate policy.CIS Solaris 10 L1 v5.2Unix
9.9 Secure plug-in library locations - groupCIS IBM DB2 v10 v1.1.0 Windows OS Level 1Windows
9.9 Secure plug-in library locations - groupCIS IBM DB2 v10 v1.1.0 Windows OS Level 2Windows
9.9 Secure plug-in library locations - serverCIS IBM DB2 v10 v1.1.0 Windows OS Level 2Windows
9.11 Ensure permissions on communication exit library locationsCIS IBM DB2 v10 v1.1.0 Windows OS Level 2Windows
9.11 Ensure permissions on communication exit library locationsCIS IBM DB2 v10 v1.1.0 Linux OS Level 2Unix
10.1 Enable process accounting at boot timeCIS Solaris 10 L2 v5.2Unix
11.6 Samba: Set Secure smb.conf File Options - permissionsCIS Solaris 10 L2 v5.2Unix
11.7 sendmail: Set Secure Logfile Ownership to the root UserCIS Solaris 10 L2 v5.2Unix
Configuration files should be secured against unauthorized access.TNS IBM HTTP Server Best Practice MiddlewareUnix
File permissions in the root document should only be accessible by administratorTNS IBM HTTP Server Best PracticeWindows
File permissions in the root document should only be accessible by administratorTNS IBM HTTP Server Best Practice MiddlewareUnix
XenServer - Use a static IP on the storage network interfaceTNS Citrix XenServerUnix