Item Search

NameAudit NamePluginCategory
1.1.11 Ensure that the admission control plugin AlwaysPullImages is setCIS Kubernetes 1.13 Benchmark v1.4.1 L1Unix

ACCESS CONTROL

1.6.1.1 Ensure SELinux is installedCIS Red Hat 6 Workstation L1 v3.0.0Unix

ACCESS CONTROL

1.7.6 Ensure permissions on /etc/issue.net are configuredCIS Oracle Linux 6 Workstation L1 v2.0.0Unix

ACCESS CONTROL

2.3.15.2 (L1) Ensure 'System objects: Strengthen default permissions of internal system objects (e.g. Symbolic Links)' is set to 'Enabled'CIS Microsoft Windows 8.1 v2.4.1 L1 BitlockerWindows

ACCESS CONTROL

2.7 Set Group Read-Only for BIND Files and Non-Runtime Directories - directoriesCIS BIND DNS v1.0.0 L1 Authoritative Name ServerUnix

ACCESS CONTROL

2.7 Set Group Read-Only for BIND Files and Non-Runtime Directories - filesCIS BIND DNS v1.0.0 L1 Caching Only Name ServerUnix

ACCESS CONTROL

2.8 Set Other Permissions Read-Only for All BIND Directories and Files - directoriesCIS BIND DNS v1.0.0 L1 Caching Only Name ServerUnix

ACCESS CONTROL

3.1 Ensure the Apache Web Server Runs As a Non-Root User - 'apache account is configured'CIS Apache HTTP Server 2.2 L1 v3.6.0Unix

ACCESS CONTROL

3.1 Ensure the Apache Web Server Runs As a Non-Root User - 'httpd services are running as apache user'CIS Apache HTTP Server 2.2 L1 v3.6.0Unix

ACCESS CONTROL

3.1 Ensure the Apache Web Server Runs As a Non-Root User - 'httpd.conf Group = apache'CIS Apache HTTP Server 2.2 L1 v3.6.0Unix

ACCESS CONTROL

3.4.5 Ensure permissions on /etc/hosts.deny are configuredCIS Red Hat 6 Workstation L1 v3.0.0Unix

ACCESS CONTROL

3.5 Ensure the Group Is Set Correctly on Apache Directories and FilesCIS Apache HTTP Server 2.2 L1 v3.6.0Unix

ACCESS CONTROL

3.8 Ensure the Lock File Is Secured - 'LockFile permissions'CIS Apache HTTP Server 2.2 L1 v3.6.0 MiddlewareUnix

ACCESS CONTROL

3.9 Ensure the Pid File Is SecuredCIS Apache HTTP Server 2.2 L1 v3.6.0Unix

ACCESS CONTROL

3.9 Ensure the Pid File Is SecuredCIS Apache HTTP Server 2.2 L2 v3.6.0Unix

ACCESS CONTROL

3.9 Secure the Pid File - 'PidFile directory'CIS Apache HTTP Server 2.2 L1 v3.6.0 MiddlewareUnix

ACCESS CONTROL

3.11 Ensure Group Write Access for the Apache Directories and Files Is Properly RestrictedCIS Apache HTTP Server 2.2 L2 v3.6.0Unix

ACCESS CONTROL

3.12 Ensure Group Write Access for the Document Root Directories and Files Is Properly RestrictedCIS Apache HTTP Server 2.2 L1 v3.6.0Unix

ACCESS CONTROL

4.1 Ensure Access to OS Root Directory Is Denied By Default - 'httpd.conf Deny = from allCIS Apache HTTP Server 2.2 L1 v3.6.0 MiddlewareUnix

ACCESS CONTROL

4.1 Ensure Access to OS Root Directory Is Denied By Default - 'httpd.conf Deny = from allCIS Apache HTTP Server 2.2 L2 v3.6.0Unix

ACCESS CONTROL

4.1 Ensure Access to OS Root Directory Is Denied By Default - 'httpd.conf no Deny directives exist'CIS Apache HTTP Server 2.2 L1 v3.6.0Unix

ACCESS CONTROL

4.1 Ensure Access to OS Root Directory Is Denied By Default - 'httpd.conf Order = Deny,AllowCIS Apache HTTP Server 2.2 L1 v3.6.0 MiddlewareUnix

ACCESS CONTROL

4.1 Ensure Access to OS Root Directory Is Denied By Default - 'httpd.conf Require all deniedCIS Apache HTTP Server 2.2 L2 v3.6.0Unix

ACCESS CONTROL

4.2 Ensure Appropriate Access to Web Content Is Allowed - 'httpd.conf Deny is configured'CIS Apache HTTP Server 2.2 L2 v3.6.0Unix

ACCESS CONTROL

4.2 Ensure Appropriate Access to Web Content Is Allowed - 'No Order/Deny/Allow'CIS Apache HTTP Server 2.2 L1 v3.6.0Unix

ACCESS CONTROL

4.2.2 Ensure permissions on all logfiles are configuredCIS Red Hat 6 Server L1 v3.0.0Unix

ACCESS CONTROL

4.4 Ensure OverRide Is Disabled for All DirectoriesCIS Apache HTTP Server 2.2 L1 v3.6.0 MiddlewareUnix

ACCESS CONTROL

4.4 Restrict Access to All Key Files - group root/namedCIS BIND DNS v1.0.0 L1 Authoritative Name ServerUnix

ACCESS CONTROL

4.4 Restrict Access to All Key Files - permissionsCIS BIND DNS v1.0.0 L1 Caching Only Name ServerUnix

ACCESS CONTROL

5.1.2 Ensure permissions on /etc/crontab are configuredCIS Red Hat 6 Workstation L1 v3.0.0Unix

ACCESS CONTROL

5.1.3 Ensure permissions on /etc/cron.hourly are configuredCIS Oracle Linux 6 Workstation L1 v2.0.0Unix

ACCESS CONTROL

5.1.3 Ensure permissions on /etc/cron.hourly are configuredCIS Red Hat 6 Workstation L1 v3.0.0Unix

ACCESS CONTROL

5.1.4 Ensure permissions on /etc/cron.daily are configuredCIS Oracle Linux 6 Workstation L1 v2.0.0Unix

ACCESS CONTROL

5.1.7 Ensure permissions on /etc/cron.d are configuredCIS Red Hat 6 Server L1 v3.0.0Unix

ACCESS CONTROL

5.3.1 Ensure permissions on /etc/ssh/sshd_config are configuredCIS Red Hat 6 Workstation L1 v3.0.0Unix

ACCESS CONTROL

6.1.1 Audit system file permissionsCIS Red Hat 6 Server L2 v3.0.0Unix

ACCESS CONTROL

6.1.5 Set User/Group Owner and Permission on /etc/cron.hourlyCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

ACCESS CONTROL

6.1.6 Set User/Group Owner and Permission on /etc/cron.dailyCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

ACCESS CONTROL

6.1.10 Ensure no world writable files existCIS Oracle Linux 6 Workstation L1 v2.0.0Unix

ACCESS CONTROL

6.1.10 Restrict at/cron to Authorized Users - cron.allowCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

ACCESS CONTROL

6.1.11 Ensure no unowned files or directories existCIS Oracle Linux 6 Workstation L1 v2.0.0Unix

ACCESS CONTROL

6.1.11 Ensure no unowned files or directories existCIS Red Hat 6 Server L1 v3.0.0Unix

ACCESS CONTROL

6.1.13 Audit SUID executablesCIS Oracle Linux 6 Workstation L1 v2.0.0Unix

ACCESS CONTROL

6.1.13 Audit SUID executablesCIS Red Hat 6 Workstation L1 v3.0.0Unix

ACCESS CONTROL

6.1.14 Audit SGID executablesCIS Oracle Linux 6 Server L1 v2.0.0Unix

ACCESS CONTROL

6.1.14 Audit SGID executablesCIS Oracle Linux 6 Workstation L1 v2.0.0Unix

ACCESS CONTROL

6.2.6 Ensure root is the only UID 0 accountCIS Oracle Linux 6 Workstation L1 v2.0.0Unix

ACCESS CONTROL

6.2.10 Ensure users' home directories permissions are 750 or more restrictiveCIS Red Hat 6 Workstation L1 v3.0.0Unix

ACCESS CONTROL

6.2.13 Ensure no users have .netrc filesCIS Red Hat 6 Server L1 v3.0.0Unix

ACCESS CONTROL

9.1.5 Verify Permissions on /etc/groupCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

ACCESS CONTROL