1.1 Ensure that Corporate Login Credentials are Used | CIS Google Cloud Platform v3.0.0 L1 | GCP | ACCESS CONTROL |
1.1.1 Enable 'aaa new-model' | CIS Cisco IOS 15 L1 v4.1.1 | Cisco | ACCESS CONTROL |
1.1.2 Enable 'aaa authentication login' | CIS Cisco IOS XE 16.x v2.1.0 L1 | Cisco | ACCESS CONTROL |
1.1.2.1 console authentication | CIS Cisco IOS XR 7.x v1.0.0 L1 | Cisco | ACCESS CONTROL |
1.1.4 Set 'login authentication for 'line vty' | CIS Cisco IOS XE 16.x v2.1.0 L1 | Cisco | ACCESS CONTROL |
1.1.5 Set 'login authentication for 'line tty' | CIS Cisco IOS 15 L1 v4.1.1 | Cisco | ACCESS CONTROL |
1.1.8 Set 'aaa accounting connection' | CIS Cisco IOS 15 L2 v4.1.1 | Cisco | ACCESS CONTROL |
1.3.1 Ensure sudo is installed | CIS Ubuntu Linux 18.04 LXD Host L1 Server v1.0.0 | Unix | ACCESS CONTROL |
1.3.2 Ensure sudo commands use pty | CIS Debian Family Workstation L1 v1.0.0 | Unix | ACCESS CONTROL |
1.3.2 Ensure sudo commands use pty | CIS Ubuntu Linux 18.04 LXD Host L1 Workstation v1.0.0 | Unix | ACCESS CONTROL |
1.3.7 Ensure 'Required Password Change Period' is less than or equal to 90 days | CIS Palo Alto Firewall 10 v1.2.0 L1 | Palo_Alto | ACCESS CONTROL |
1.3.7 Ensure 'Required Password Change Period' is less than or equal to 90 days | CIS Palo Alto Firewall 11 v1.1.0 L1 | Palo_Alto | ACCESS CONTROL |
1.4.3.5 Ensure 'aaa authentication ssh console' is configured correctly | CIS Cisco Firewall ASA 9 L1 v4.1.0 | Cisco | ACCESS CONTROL |
1.4.4.2 Ensure 'aaa authorization exec' is configured correctly | CIS Cisco Firewall v8.x L1 v4.2.0 | Cisco | ACCESS CONTROL |
2.2.6 Ensure 'REMOTE_LOGIN_PASSWORDFILE' Is Set to 'NONE' | CIS Oracle Server 19c DB Traditional Auditing v1.2.0 | OracleDB | ACCESS CONTROL |
2.2.7 Ensure 'REMOTE_OS_AUTHENT' Is Set to 'FALSE' | CIS Oracle Server 19c DB Unified Auditing v1.2.0 | OracleDB | ACCESS CONTROL |
2.7 Ensure that a unique Certificate Authority is used for etcd | CIS Kubernetes v1.20 Benchmark v1.0.1 L2 Master | Unix | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION |
2.13 Ensure the 'sa' Login Account is set to 'Disabled' | CIS SQL Server 2017 Database L1 AWS RDS v1.3.0 | MS_SQLDB | ACCESS CONTROL |
2.13 Ensure the 'sa' Login Account is set to 'Disabled' | CIS SQL Server 2017 Database L1 DB v1.3.0 | MS_SQLDB | ACCESS CONTROL |
2.13 Ensure the 'sa' Login Account is set to 'Disabled' | CIS SQL Server 2022 Database L1 AWS RDS v1.1.0 | MS_SQLDB | ACCESS CONTROL |
3.1 Ensure 'Server Authentication' Property is set to 'Windows Authentication Mode' | CIS SQL Server 2016 Database L1 DB v1.4.0 | MS_SQLDB | ACCESS CONTROL |
3.3 Ensure 'Orphaned Users' are Dropped From SQL Server Databases | CIS SQL Server 2017 Database L1 AWS RDS v1.3.0 | MS_SQLDB | ACCESS CONTROL |
3.3 Ensure 'Orphaned Users' are Dropped From SQL Server Databases | CIS Microsoft SQL Server 2019 v1.4.0 L1 AWS RDS | MS_SQLDB | ACCESS CONTROL |
3.4 Ensure SQL Authentication is not used in contained databases | CIS SQL Server 2016 Database L1 DB v1.4.0 | MS_SQLDB | ACCESS CONTROL |
3.4 Ensure SQL Authentication is not used in contained databases | CIS Microsoft SQL Server 2019 v1.4.0 L1 AWS RDS | MS_SQLDB | ACCESS CONTROL |
3.4 Ensure SQL Authentication is not used in contained databases | CIS SQL Server 2022 Database L1 AWS RDS v1.1.0 | MS_SQLDB | ACCESS CONTROL |
3.9 Ensure 'INACTIVE_ACCOUNT_TIME' Is Less than or Equal to '120' | CIS Oracle Server 19c DB Traditional Auditing v1.2.0 | OracleDB | ACCESS CONTROL |
4.1 Ensure a non-root user account exists for local admin access | CIS VMware ESXi 6.5 v1.0.0 Level 1 Bare Metal | Unix | ACCESS CONTROL |
4.2 Ensure 'CHECK_EXPIRATION' Option is set to 'ON' for All SQL Authenticated Logins Within the Sysadmin Role | CIS SQL Server 2016 Database L1 DB v1.4.0 | MS_SQLDB | ACCESS CONTROL |
4.2 Ensure 'CHECK_EXPIRATION' Option is set to 'ON' for All SQL Authenticated Logins Within the Sysadmin Role | CIS Microsoft SQL Server 2019 v1.4.0 L1 AWS RDS | MS_SQLDB | ACCESS CONTROL |
4.2 Ensure 'CHECK_EXPIRATION' Option is set to 'ON' for All SQL Authenticated Logins Within the Sysadmin Role | CIS Microsoft SQL Server 2019 v1.4.0 L1 Database Engine | MS_SQLDB | ACCESS CONTROL |
4.3 Ensure 'DBA_USERS.AUTHENTICATION_TYPE' Is Not Set to 'EXTERNAL' for Any User | CIS Oracle Server 19c DB Traditional Auditing v1.2.0 | OracleDB | ACCESS CONTROL |
4.6 (L1) Ensure Active Directory is used for local user authentication | CIS VMware ESXi 7.0 v1.4.0 L1 Bare Metal | Unix | ACCESS CONTROL |
5.2.4 Ensure SSH access is limited | CIS Fedora 19 Family Linux Workstation L1 v1.0.0 | Unix | ACCESS CONTROL |
5.2.7 Ensure Password Age Is Configured | CIS Apple macOS 10.15 Catalina v3.0.0 L1 | Unix | ACCESS CONTROL |
5.2.7 Ensure Password Age Is Configured | CIS Apple macOS 11.0 Big Sur v4.0.0 L1 | Unix | ACCESS CONTROL |
5.3.5 Ensure SSH access is limited | CIS CentOS 6 Server L1 v3.0.0 | Unix | ACCESS CONTROL |
5.3.5 Ensure SSH access is limited | CIS Ubuntu Linux 16.04 LTS Server L1 v2.0.0 | Unix | ACCESS CONTROL |
5.4.3 Ensure default group for the root account is GID 0 | CIS Aliyun Linux 2 L1 v1.0.0 | Unix | ACCESS CONTROL |
5.5 Ensure root login is restricted to system console | CIS Debian Family Workstation L1 v1.0.0 | Unix | ACCESS CONTROL |
5.5 Ensure root login is restricted to system console | CIS Amazon Linux 2 STIG v1.0.0 L1 | Unix | ACCESS CONTROL |
5.5.2 Ensure system accounts are secured - non-login shell | CIS CentOS 6 Workstation L1 v3.0.0 | Unix | ACCESS CONTROL |
5.5.2 Ensure system accounts are secured - unlocked non-root | CIS CentOS 6 Server L1 v3.0.0 | Unix | ACCESS CONTROL |
5.5.2 Ensure system accounts are secured - unlocked non-root | CIS CentOS 6 Workstation L1 v3.0.0 | Unix | ACCESS CONTROL |
5.6 Database Manager Configuration Parameter: FED_NOAUTH | CIS IBM DB2 11 v1.1.0 Windows OS Level 1 | Windows | ACCESS CONTROL |
6.2.15 Ensure all groups in /etc/passwd exist in /etc/group | CIS Ubuntu Linux 18.04 LXD Host L1 Workstation v1.0.0 | Unix | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION |
Accounts: Administrator account status | MSCT Windows 10 v1507 v1.0.0 | Windows | ACCESS CONTROL |
Accounts: Guest account status | MSCT Windows 10 1803 v1.0.0 | Windows | ACCESS CONTROL |
Monterey - Disable the Guest Account | NIST macOS Monterey v1.0.0 - 800-53r4 Low | Unix | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
Monterey - Disable the Guest Account | NIST macOS Monterey v1.0.0 - 800-53r5 Low | Unix | ACCESS CONTROL, CONFIGURATION MANAGEMENT |