1.1.11 Ensure that the admission control plugin AlwaysPullImages is set | CIS Kubernetes 1.13 Benchmark v1.4.1 L1 | Unix | ACCESS CONTROL |
1.6.1.1 Ensure SELinux is installed | CIS Red Hat 6 Workstation L1 v3.0.0 | Unix | ACCESS CONTROL |
1.7.6 Ensure permissions on /etc/issue.net are configured | CIS Oracle Linux 6 Workstation L1 v2.0.0 | Unix | ACCESS CONTROL |
2.3.15.2 (L1) Ensure 'System objects: Strengthen default permissions of internal system objects (e.g. Symbolic Links)' is set to 'Enabled' | CIS Microsoft Windows 8.1 v2.4.1 L1 Bitlocker | Windows | ACCESS CONTROL |
2.7 Set Group Read-Only for BIND Files and Non-Runtime Directories - directories | CIS BIND DNS v1.0.0 L1 Authoritative Name Server | Unix | ACCESS CONTROL |
2.7 Set Group Read-Only for BIND Files and Non-Runtime Directories - files | CIS BIND DNS v1.0.0 L1 Caching Only Name Server | Unix | ACCESS CONTROL |
2.8 Set Other Permissions Read-Only for All BIND Directories and Files - directories | CIS BIND DNS v1.0.0 L1 Caching Only Name Server | Unix | ACCESS CONTROL |
3.1 Ensure the Apache Web Server Runs As a Non-Root User - 'apache account is configured' | CIS Apache HTTP Server 2.2 L1 v3.6.0 | Unix | ACCESS CONTROL |
3.1 Ensure the Apache Web Server Runs As a Non-Root User - 'httpd services are running as apache user' | CIS Apache HTTP Server 2.2 L1 v3.6.0 | Unix | ACCESS CONTROL |
3.1 Ensure the Apache Web Server Runs As a Non-Root User - 'httpd.conf Group = apache' | CIS Apache HTTP Server 2.2 L1 v3.6.0 | Unix | ACCESS CONTROL |
3.4.5 Ensure permissions on /etc/hosts.deny are configured | CIS Red Hat 6 Workstation L1 v3.0.0 | Unix | ACCESS CONTROL |
3.5 Ensure the Group Is Set Correctly on Apache Directories and Files | CIS Apache HTTP Server 2.2 L1 v3.6.0 | Unix | ACCESS CONTROL |
3.8 Ensure the Lock File Is Secured - 'LockFile permissions' | CIS Apache HTTP Server 2.2 L1 v3.6.0 Middleware | Unix | ACCESS CONTROL |
3.9 Ensure the Pid File Is Secured | CIS Apache HTTP Server 2.2 L1 v3.6.0 | Unix | ACCESS CONTROL |
3.9 Ensure the Pid File Is Secured | CIS Apache HTTP Server 2.2 L2 v3.6.0 | Unix | ACCESS CONTROL |
3.9 Secure the Pid File - 'PidFile directory' | CIS Apache HTTP Server 2.2 L1 v3.6.0 Middleware | Unix | ACCESS CONTROL |
3.11 Ensure Group Write Access for the Apache Directories and Files Is Properly Restricted | CIS Apache HTTP Server 2.2 L2 v3.6.0 | Unix | ACCESS CONTROL |
3.12 Ensure Group Write Access for the Document Root Directories and Files Is Properly Restricted | CIS Apache HTTP Server 2.2 L1 v3.6.0 | Unix | ACCESS CONTROL |
4.1 Ensure Access to OS Root Directory Is Denied By Default - 'httpd.conf Deny = from all | CIS Apache HTTP Server 2.2 L1 v3.6.0 Middleware | Unix | ACCESS CONTROL |
4.1 Ensure Access to OS Root Directory Is Denied By Default - 'httpd.conf Deny = from all | CIS Apache HTTP Server 2.2 L2 v3.6.0 | Unix | ACCESS CONTROL |
4.1 Ensure Access to OS Root Directory Is Denied By Default - 'httpd.conf no Deny directives exist' | CIS Apache HTTP Server 2.2 L1 v3.6.0 | Unix | ACCESS CONTROL |
4.1 Ensure Access to OS Root Directory Is Denied By Default - 'httpd.conf Order = Deny,Allow | CIS Apache HTTP Server 2.2 L1 v3.6.0 Middleware | Unix | ACCESS CONTROL |
4.1 Ensure Access to OS Root Directory Is Denied By Default - 'httpd.conf Require all denied | CIS Apache HTTP Server 2.2 L2 v3.6.0 | Unix | ACCESS CONTROL |
4.2 Ensure Appropriate Access to Web Content Is Allowed - 'httpd.conf Deny is configured' | CIS Apache HTTP Server 2.2 L2 v3.6.0 | Unix | ACCESS CONTROL |
4.2 Ensure Appropriate Access to Web Content Is Allowed - 'No Order/Deny/Allow' | CIS Apache HTTP Server 2.2 L1 v3.6.0 | Unix | ACCESS CONTROL |
4.2.2 Ensure permissions on all logfiles are configured | CIS Red Hat 6 Server L1 v3.0.0 | Unix | ACCESS CONTROL |
4.4 Ensure OverRide Is Disabled for All Directories | CIS Apache HTTP Server 2.2 L1 v3.6.0 Middleware | Unix | ACCESS CONTROL |
4.4 Restrict Access to All Key Files - group root/named | CIS BIND DNS v1.0.0 L1 Authoritative Name Server | Unix | ACCESS CONTROL |
4.4 Restrict Access to All Key Files - permissions | CIS BIND DNS v1.0.0 L1 Caching Only Name Server | Unix | ACCESS CONTROL |
5.1.2 Ensure permissions on /etc/crontab are configured | CIS Red Hat 6 Workstation L1 v3.0.0 | Unix | ACCESS CONTROL |
5.1.3 Ensure permissions on /etc/cron.hourly are configured | CIS Oracle Linux 6 Workstation L1 v2.0.0 | Unix | ACCESS CONTROL |
5.1.3 Ensure permissions on /etc/cron.hourly are configured | CIS Red Hat 6 Workstation L1 v3.0.0 | Unix | ACCESS CONTROL |
5.1.4 Ensure permissions on /etc/cron.daily are configured | CIS Oracle Linux 6 Workstation L1 v2.0.0 | Unix | ACCESS CONTROL |
5.1.7 Ensure permissions on /etc/cron.d are configured | CIS Red Hat 6 Server L1 v3.0.0 | Unix | ACCESS CONTROL |
5.3.1 Ensure permissions on /etc/ssh/sshd_config are configured | CIS Red Hat 6 Workstation L1 v3.0.0 | Unix | ACCESS CONTROL |
6.1.1 Audit system file permissions | CIS Red Hat 6 Server L2 v3.0.0 | Unix | ACCESS CONTROL |
6.1.5 Set User/Group Owner and Permission on /etc/cron.hourly | CIS Red Hat Enterprise Linux 5 L1 v2.2.1 | Unix | ACCESS CONTROL |
6.1.6 Set User/Group Owner and Permission on /etc/cron.daily | CIS Red Hat Enterprise Linux 5 L1 v2.2.1 | Unix | ACCESS CONTROL |
6.1.10 Ensure no world writable files exist | CIS Oracle Linux 6 Workstation L1 v2.0.0 | Unix | ACCESS CONTROL |
6.1.10 Restrict at/cron to Authorized Users - cron.allow | CIS Red Hat Enterprise Linux 5 L1 v2.2.1 | Unix | ACCESS CONTROL |
6.1.11 Ensure no unowned files or directories exist | CIS Oracle Linux 6 Workstation L1 v2.0.0 | Unix | ACCESS CONTROL |
6.1.11 Ensure no unowned files or directories exist | CIS Red Hat 6 Server L1 v3.0.0 | Unix | ACCESS CONTROL |
6.1.13 Audit SUID executables | CIS Oracle Linux 6 Workstation L1 v2.0.0 | Unix | ACCESS CONTROL |
6.1.13 Audit SUID executables | CIS Red Hat 6 Workstation L1 v3.0.0 | Unix | ACCESS CONTROL |
6.1.14 Audit SGID executables | CIS Oracle Linux 6 Server L1 v2.0.0 | Unix | ACCESS CONTROL |
6.1.14 Audit SGID executables | CIS Oracle Linux 6 Workstation L1 v2.0.0 | Unix | ACCESS CONTROL |
6.2.6 Ensure root is the only UID 0 account | CIS Oracle Linux 6 Workstation L1 v2.0.0 | Unix | ACCESS CONTROL |
6.2.10 Ensure users' home directories permissions are 750 or more restrictive | CIS Red Hat 6 Workstation L1 v3.0.0 | Unix | ACCESS CONTROL |
6.2.13 Ensure no users have .netrc files | CIS Red Hat 6 Server L1 v3.0.0 | Unix | ACCESS CONTROL |
9.1.5 Verify Permissions on /etc/group | CIS Red Hat Enterprise Linux 5 L1 v2.2.1 | Unix | ACCESS CONTROL |