1.2.2 Ensure that the --basic-auth-file argument is not set | CIS Red Hat OpenShift Container Platform v1.7.0 L1 | OpenShift | CONFIGURATION MANAGEMENT, MAINTENANCE |
1.2.2 Ensure that the --token-auth-file parameter is not set | CIS Kubernetes v1.24 Benchmark v1.0.0 L1 Master | Unix | CONFIGURATION MANAGEMENT, MAINTENANCE |
1.2.3 Ensure that the --token-auth-file parameter is not set | CIS Red Hat OpenShift Container Platform v1.7.0 L1 | OpenShift | CONFIGURATION MANAGEMENT, MAINTENANCE |
2.8 Ensure 'credentials' are not stored in configuration files - Default | CIS IIS 10 v1.2.1 Level 2 | Windows | IDENTIFICATION AND AUTHENTICATION |
3.2.2 Ensure authentication-type is set to MD5 | CIS Juniper OS Benchmark v2.1.0 L2 | Juniper | IDENTIFICATION AND AUTHENTICATION |
4.1.1 Ensure peer authentication is set to MD5 | CIS Juniper OS Benchmark v2.1.0 L1 | Juniper | IDENTIFICATION AND AUTHENTICATION |
4.2.1 Ensure IS-IS neighbor authentication is set to MD5 | CIS Juniper OS Benchmark v2.1.0 L1 | Juniper | IDENTIFICATION AND AUTHENTICATION |
4.2.2 Ensure IS-IS neighbor authentication is set to SHA1 | CIS Juniper OS Benchmark v2.1.0 L2 | Juniper | IDENTIFICATION AND AUTHENTICATION |
4.2.3 Ensure authentication check is not suppressed | CIS Juniper OS Benchmark v2.1.0 L1 | Juniper | IDENTIFICATION AND AUTHENTICATION |
4.2.4 Ensure loose authentication check is not configured | CIS Juniper OS Benchmark v2.1.0 L1 | Juniper | IDENTIFICATION AND AUTHENTICATION |
4.2.5 Ensure IS-IS Hello authentication check is not suppressed | CIS Juniper OS Benchmark v2.1.0 L1 | Juniper | IDENTIFICATION AND AUTHENTICATION |
4.4.1 Ensure OSPFv3 authentication is set to IPSEC SA - md5 | CIS Juniper OS Benchmark v2.1.0 L1 | Juniper | IDENTIFICATION AND AUTHENTICATION |
4.7.1 Ensure authentication is set to MD5 | CIS Juniper OS Benchmark v2.1.0 L1 | Juniper | IDENTIFICATION AND AUTHENTICATION |
4.7.2 Ensure authentication is set to AES-CMAC | CIS Juniper OS Benchmark v2.1.0 L2 | Juniper | IDENTIFICATION AND AUTHENTICATION |
4.8.1 Ensure authentication is set to MD5 | CIS Juniper OS Benchmark v2.1.0 L1 | Juniper | IDENTIFICATION AND AUTHENTICATION |
5.1.8.1 (L1) Ensure that password hash sync is enabled for hybrid deployments | CIS Microsoft 365 Foundations v4.0.0 L1 E3 | microsoft_azure | ACCESS CONTROL |
5.1.8.1 (L1) Ensure that password hash sync is enabled for hybrid deployments | CIS Microsoft 365 Foundations v4.0.0 L1 E5 | microsoft_azure | ACCESS CONTROL |
5.3.3 Ensure password hashing algorithm is SHA-512 | CIS Fedora 19 Family Linux Server L1 v1.0.0 | Unix | IDENTIFICATION AND AUTHENTICATION |
5.3.4 Ensure password hashing algorithm is SHA-512 | CIS Debian 9 Workstation L1 v1.0.1 | Unix | IDENTIFICATION AND AUTHENTICATION |
5.3.4 Ensure password hashing algorithm is SHA-512 | CIS Debian Family Server L1 v1.0.0 | Unix | IDENTIFICATION AND AUTHENTICATION |
5.3.4 Ensure password hashing algorithm is SHA-512 | CIS Debian Family Workstation L1 v1.0.0 | Unix | IDENTIFICATION AND AUTHENTICATION |
5.3.4 Ensure password hashing algorithm is SHA-512 - password-auth | CIS Aliyun Linux 2 L1 v1.0.0 | Unix | IDENTIFICATION AND AUTHENTICATION |
5.4.4 Ensure password hashing algorithm is SHA-512 | CIS Ubuntu Linux 16.04 LTS Server L1 v2.0.0 | Unix | IDENTIFICATION AND AUTHENTICATION |
6.1 Setup Client-cert Authentication | CIS Apache Tomcat 8 L2 v1.1.0 | Unix | IDENTIFICATION AND AUTHENTICATION |
6.1 Setup Client-cert Authentication | CIS Apache Tomcat 8 L2 v1.1.0 Middleware | Unix | IDENTIFICATION AND AUTHENTICATION |
6.1.3 Ensure permissions on /etc/passwd- are configured | CIS Ubuntu Linux 16.04 LTS Workstation L1 v2.0.0 | Unix | IDENTIFICATION AND AUTHENTICATION |
6.1.3 Ensure permissions on /etc/passwd- are configured | CIS Ubuntu Linux 16.04 LTS Server L1 v2.0.0 | Unix | IDENTIFICATION AND AUTHENTICATION |
6.1.5 Ensure permissions on /etc/group- are configured | CIS Ubuntu Linux 16.04 LTS Workstation L1 v2.0.0 | Unix | IDENTIFICATION AND AUTHENTICATION |
6.1.6 Ensure permissions on /etc/shadow are configured | CIS Ubuntu Linux 16.04 LTS Server L1 v2.0.0 | Unix | IDENTIFICATION AND AUTHENTICATION |
6.1.8 Ensure permissions on /etc/gshadow are configured | CIS Ubuntu Linux 16.04 LTS Server L1 v2.0.0 | Unix | IDENTIFICATION AND AUTHENTICATION |
6.1.9 Ensure permissions on /etc/gshadow- are configured | CIS Fedora 19 Family Linux Workstation L1 v1.0.0 | Unix | IDENTIFICATION AND AUTHENTICATION |
6.1.9 Ensure permissions on /etc/gshadow- are configured | CIS Fedora 19 Family Linux Server L1 v1.0.0 | Unix | IDENTIFICATION AND AUTHENTICATION |
6.2.1 Ensure accounts in /etc/passwd use shadowed passwords | CIS CentOS 6 Server L1 v3.0.0 | Unix | IDENTIFICATION AND AUTHENTICATION |
6.2.1 Ensure accounts in /etc/passwd use shadowed passwords | CIS CentOS 6 Workstation L1 v3.0.0 | Unix | IDENTIFICATION AND AUTHENTICATION |
6.2.2 Ensure /etc/shadow password fields are not empty | CIS Oracle Linux 6 Workstation L1 v2.0.0 | Unix | IDENTIFICATION AND AUTHENTICATION |
6.2.2 Ensure /etc/shadow password fields are not empty | CIS CentOS 6 Workstation L1 v3.0.0 | Unix | IDENTIFICATION AND AUTHENTICATION |
6.2.10 Ensure no users have .netrc files | CIS SUSE Linux Enterprise 12 v3.2.1 L1 Workstation | Unix | CONFIGURATION MANAGEMENT, MAINTENANCE |
6.2.10 Ensure no users have .netrc files | CIS Fedora 19 Family Linux Workstation L1 v1.0.0 | Unix | IDENTIFICATION AND AUTHENTICATION |
6.2.12 Ensure no users have .netrc files | CIS Aliyun Linux 2 L1 v1.0.0 | Unix | IDENTIFICATION AND AUTHENTICATION |
6.2.12 Ensure no users have .rhosts files | CIS Fedora 19 Family Linux Server L1 v1.0.0 | Unix | IDENTIFICATION AND AUTHENTICATION |
6.2.14 Ensure no users have .rhosts files | CIS SUSE Linux Enterprise Server 11 L1 v2.1.1 | Unix | IDENTIFICATION AND AUTHENTICATION |
6.2.14 Ensure no users have .rhosts files | CIS Debian 9 Server L1 v1.0.1 | Unix | IDENTIFICATION AND AUTHENTICATION |
6.2.14 Ensure no users have .rhosts files | CIS Debian 9 Workstation L1 v1.0.1 | Unix | IDENTIFICATION AND AUTHENTICATION |
6.2.14 Ensure no users have .rhosts files | CIS SUSE Linux Enterprise Workstation 11 L1 v2.1.1 | Unix | IDENTIFICATION AND AUTHENTICATION |
6.2.16 Ensure no users have .netrc files | CIS Red Hat Enterprise Linux 7 STIG v2.0.0 L1 Server | Unix | CONFIGURATION MANAGEMENT, MAINTENANCE |
6.2.16 Ensure no users have .netrc files | CIS Amazon Linux 2 STIG v2.0.0 L1 Workstation | Unix | CONFIGURATION MANAGEMENT, MAINTENANCE |
7.1 Ensure appropriate key file permissions are set - CAFile | CIS MongoDB 4 L1 OS Linux v1.0.0 | Unix | IDENTIFICATION AND AUTHENTICATION |
7.1 Ensure appropriate key file permissions are set - keyFile | CIS MongoDB 4 L1 OS Linux v1.0.0 | Unix | IDENTIFICATION AND AUTHENTICATION |
7.1 Ensure appropriate key file permissions are set - PEMKeyFile | CIS MongoDB 4 L1 OS Linux v1.0.0 | Unix | IDENTIFICATION AND AUTHENTICATION |
18.8.4.1 (L1) Ensure 'Encryption Oracle Remediation' is set to 'Enabled: Force Updated Clients' | CIS Microsoft Windows 8.1 v2.4.1 L1 Bitlocker | Windows | IDENTIFICATION AND AUTHENTICATION |