1.3.1.8 Ensure SETroubleshoot is not installed | CIS Red Hat Enterprise Linux 9 v2.0.0 L1 Server | Unix | CONFIGURATION MANAGEMENT |
1.5 Ensure Data Cluster Initialized Successfully | CIS PostgreSQL 11 OS v1.0.0 | Unix | ACCESS CONTROL |
1.5.1.8 Ensure SETroubleshoot is not installed | CIS CentOS Linux 7 v4.0.0 L1 Server | Unix | CONFIGURATION MANAGEMENT |
1.5.1.8 Ensure SETroubleshoot is not installed | CIS Oracle Linux 7 v4.0.0 L1 Server | Unix | CONFIGURATION MANAGEMENT |
1.5.1.8 Ensure SETroubleshoot is not installed | CIS Red Hat Enterprise Linux 7 v4.0.0 L1 Server | Unix | CONFIGURATION MANAGEMENT |
1.5.2 Set Permissions on /etc/grub.conf | CIS Red Hat Enterprise Linux 5 L1 v2.2.1 | Unix | ACCESS CONTROL |
1.6.1.1 Ensure SELinux is installed | CIS Red Hat 6 Server L1 v3.0.0 | Unix | ACCESS CONTROL |
1.6.1.1 Ensure SELinux is installed | CIS Oracle Linux 6 Server L1 v2.0.0 | Unix | ACCESS CONTROL |
1.6.1.1 Ensure SELinux is installed | CIS Oracle Linux 6 Workstation L1 v2.0.0 | Unix | ACCESS CONTROL |
1.6.1.2 Ensure SELinux is not disabled in bootloader configuration - enforcing=0 | CIS Oracle Linux 6 Server L1 v2.0.0 | Unix | ACCESS CONTROL |
1.6.1.7 Ensure SETroubleshoot is not installed | CIS Red Hat Enterprise Linux 7 STIG v2.0.0 L1 Server | Unix | CONFIGURATION MANAGEMENT |
1.7.6 Ensure permissions on /etc/issue.net are configured | CIS Red Hat 6 Server L1 v3.0.0 | Unix | ACCESS CONTROL |
2.2 Ensure the PostgreSQL pg_wheel group membership is correct - /etc/group | CIS PostgreSQL 10 OS v1.0.0 | Unix | ACCESS CONTROL |
2.2.7 Ensure that the certificate authorities file permissions are set to 644 or more restrictive | CIS Kubernetes 1.13 Benchmark v1.4.1 L1 | Unix | ACCESS CONTROL |
2.3.10.9 Ensure 'Network access: Restrict anonymous access to Named Pipes and Shares' is set to 'Enabled' | CIS Microsoft Windows 8.1 v2.4.1 L1 | Windows | ACCESS CONTROL |
2.3.10.10 Ensure 'Network access: Shares that can be accessed anonymously' is set to 'None' | CIS Microsoft Windows 8.1 v2.4.1 L1 | Windows | ACCESS CONTROL |
3.1.6 Ensure the log file permissions are set correctly | CIS PostgreSQL 11 DB v1.0.0 | PostgreSQLDB | ACCESS CONTROL |
3.3.1 (L1) Ensure Information Protection sensitivity label policies are published | CIS Microsoft 365 Foundations v5.0.0 L1 E5 | microsoft_azure | RISK ASSESSMENT |
3.4.5 Ensure permissions on /etc/hosts.deny are configured | CIS Oracle Linux 6 Server L1 v2.0.0 | Unix | ACCESS CONTROL |
4.2.2 Ensure permissions on all logfiles are configured | CIS Oracle Linux 6 Workstation L1 v2.0.0 | Unix | ACCESS CONTROL |
4.5 Ensure Row Level Security (RLS) is configured correctly | CIS PostgreSQL 9.6 DB v1.0.0 | PostgreSQLDB | ACCESS CONTROL |
5.1.2 Create and Set Permissions on syslog Log Files - /var/log/messages | CIS Red Hat Enterprise Linux 5 L1 v2.2.1 | Unix | ACCESS CONTROL |
5.1.2 Ensure permissions on /etc/crontab are configured | CIS Red Hat 6 Server L1 v3.0.0 | Unix | ACCESS CONTROL |
5.1.3 Ensure permissions on /etc/cron.hourly are configured | CIS Red Hat 6 Server L1 v3.0.0 | Unix | ACCESS CONTROL |
5.1.6 Ensure permissions on /etc/cron.monthly are configured | CIS Red Hat 6 Workstation L1 v3.0.0 | Unix | ACCESS CONTROL |
5.1.7 Ensure permissions on /etc/cron.d are configured | CIS Oracle Linux 6 Server L1 v2.0.0 | Unix | ACCESS CONTROL |
5.10 Securely Define Stored Procedures and Functions DEFINER and INVOKER | CIS MariaDB 10.6 Database L1 v1.1.0 | MySQLDB | PLANNING, SYSTEM AND SERVICES ACQUISITION |
5.10 Securely Define Stored Procedures and Functions DEFINER and INVOKER | CIS MySQL 5.7 Community Database L1 v2.0.0 | MySQLDB | PLANNING, SYSTEM AND SERVICES ACQUISITION |
5.10 Securely Define Stored Procedures and Functions DEFINER and INVOKER | CIS MySQL 8.4 Enterprise v1.0.0 L1 Database | MySQLDB | PLANNING, SYSTEM AND SERVICES ACQUISITION |
5.12 Ensure Proper Use Of ALLOW_NONEXISTENT_DEFINER | CIS Oracle MySQL Enterprise Edition 8.0 v1.4.0 L1 Database | MySQLDB | PLANNING, SYSTEM AND SERVICES ACQUISITION |
5.12 Ensure Proper Use Of ALLOW_NONEXISTENT_DEFINER | CIS Oracle MySQL Community Server 8.4 v1.0.0 L1 Database | MySQLDB | PLANNING, SYSTEM AND SERVICES ACQUISITION |
6.1.1 Audit system file permissions | CIS Oracle Linux 6 Workstation L2 v2.0.0 | Unix | ACCESS CONTROL |
6.1.3 Set User/Group Owner and Permission on /etc/anacrontab | CIS Red Hat Enterprise Linux 5 L1 v2.2.1 | Unix | ACCESS CONTROL |
6.1.4 Set User/Group Owner and Permission on /etc/crontab | CIS Red Hat Enterprise Linux 5 L1 v2.2.1 | Unix | ACCESS CONTROL |
6.1.8 Set User/Group Owner and Permission on /etc/cron.monthly | CIS Red Hat Enterprise Linux 5 L1 v2.2.1 | Unix | ACCESS CONTROL |
6.1.9 Set User/Group Owner and Permission on /etc/cron.d | CIS Red Hat Enterprise Linux 5 L1 v2.2.1 | Unix | ACCESS CONTROL |
6.1.10 Ensure no world writable files exist | CIS Red Hat 6 Server L1 v3.0.0 | Unix | ACCESS CONTROL |
6.1.10 Restrict at/cron to Authorized Users - cron.deny | CIS Red Hat Enterprise Linux 5 L1 v2.2.1 | Unix | ACCESS CONTROL |
6.1.12 Ensure no ungrouped files or directories exist | CIS Red Hat 6 Server L1 v3.0.0 | Unix | ACCESS CONTROL |
6.2.6 Ensure root is the only UID 0 account | CIS Red Hat 6 Workstation L1 v3.0.0 | Unix | ACCESS CONTROL |
6.2.6 Ensure root is the only UID 0 account | CIS Oracle Linux 6 Server L1 v2.0.0 | Unix | ACCESS CONTROL |
6.2.9 Ensure users own their home directories | CIS Red Hat 6 Workstation L1 v3.0.0 | Unix | ACCESS CONTROL |
6.2.9 Ensure users own their home directories | CIS Red Hat 6 Server L1 v3.0.0 | Unix | ACCESS CONTROL |
6.2.11 Ensure users' dot files are not group or world writable | CIS Oracle Linux 6 Server L1 v2.0.0 | Unix | ACCESS CONTROL |
7.2 Ensure appropriate database file permissions are set. | CIS MongoDB 6 v1.2.0 L1 MongoDB | Windows | ACCESS CONTROL |
9.1.8 Verify User/Group Ownership on /etc/gshadow | CIS Red Hat Enterprise Linux 5 L1 v2.2.1 | Unix | ACCESS CONTROL |
9.1.9 Verify User/Group Ownership on /etc/group | CIS Red Hat Enterprise Linux 5 L1 v2.2.1 | Unix | ACCESS CONTROL |
9.2.9 Check Permissions on User .netrc Files | CIS Red Hat Enterprise Linux 5 L1 v2.2.1 | Unix | ACCESS CONTROL |
10.1 Ensure SELinux Is Enabled in Enforcing Mode - config file | CIS BIND DNS v1.0.0 L2 Caching Only Name Server | Unix | ACCESS CONTROL |
18.9.59.3.3.2 Ensure 'Do not allow drive redirection' is set to 'Enabled' | CIS Microsoft Windows 8.1 v2.4.1 L1 | Windows | ACCESS CONTROL |