Item Search

NameAudit NamePluginCategory
1.3.1.8 Ensure SETroubleshoot is not installedCIS Red Hat Enterprise Linux 9 v2.0.0 L1 ServerUnix

CONFIGURATION MANAGEMENT

1.5 Ensure Data Cluster Initialized SuccessfullyCIS PostgreSQL 11 OS v1.0.0Unix

ACCESS CONTROL

1.5.1.8 Ensure SETroubleshoot is not installedCIS CentOS Linux 7 v4.0.0 L1 ServerUnix

CONFIGURATION MANAGEMENT

1.5.1.8 Ensure SETroubleshoot is not installedCIS Oracle Linux 7 v4.0.0 L1 ServerUnix

CONFIGURATION MANAGEMENT

1.5.1.8 Ensure SETroubleshoot is not installedCIS Red Hat Enterprise Linux 7 v4.0.0 L1 ServerUnix

CONFIGURATION MANAGEMENT

1.5.2 Set Permissions on /etc/grub.confCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

ACCESS CONTROL

1.6.1.1 Ensure SELinux is installedCIS Red Hat 6 Server L1 v3.0.0Unix

ACCESS CONTROL

1.6.1.1 Ensure SELinux is installedCIS Oracle Linux 6 Server L1 v2.0.0Unix

ACCESS CONTROL

1.6.1.1 Ensure SELinux is installedCIS Oracle Linux 6 Workstation L1 v2.0.0Unix

ACCESS CONTROL

1.6.1.2 Ensure SELinux is not disabled in bootloader configuration - enforcing=0CIS Oracle Linux 6 Server L1 v2.0.0Unix

ACCESS CONTROL

1.6.1.7 Ensure SETroubleshoot is not installedCIS Red Hat Enterprise Linux 7 STIG v2.0.0 L1 ServerUnix

CONFIGURATION MANAGEMENT

1.7.6 Ensure permissions on /etc/issue.net are configuredCIS Red Hat 6 Server L1 v3.0.0Unix

ACCESS CONTROL

2.2 Ensure the PostgreSQL pg_wheel group membership is correct - /etc/groupCIS PostgreSQL 10 OS v1.0.0Unix

ACCESS CONTROL

2.2.7 Ensure that the certificate authorities file permissions are set to 644 or more restrictiveCIS Kubernetes 1.13 Benchmark v1.4.1 L1Unix

ACCESS CONTROL

2.3.10.9 Ensure 'Network access: Restrict anonymous access to Named Pipes and Shares' is set to 'Enabled'CIS Microsoft Windows 8.1 v2.4.1 L1Windows

ACCESS CONTROL

2.3.10.10 Ensure 'Network access: Shares that can be accessed anonymously' is set to 'None'CIS Microsoft Windows 8.1 v2.4.1 L1Windows

ACCESS CONTROL

3.1.6 Ensure the log file permissions are set correctlyCIS PostgreSQL 11 DB v1.0.0PostgreSQLDB

ACCESS CONTROL

3.3.1 (L1) Ensure Information Protection sensitivity label policies are publishedCIS Microsoft 365 Foundations v5.0.0 L1 E5microsoft_azure

RISK ASSESSMENT

3.4.5 Ensure permissions on /etc/hosts.deny are configuredCIS Oracle Linux 6 Server L1 v2.0.0Unix

ACCESS CONTROL

4.2.2 Ensure permissions on all logfiles are configuredCIS Oracle Linux 6 Workstation L1 v2.0.0Unix

ACCESS CONTROL

4.5 Ensure Row Level Security (RLS) is configured correctlyCIS PostgreSQL 9.6 DB v1.0.0PostgreSQLDB

ACCESS CONTROL

5.1.2 Create and Set Permissions on syslog Log Files - /var/log/messagesCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

ACCESS CONTROL

5.1.2 Ensure permissions on /etc/crontab are configuredCIS Red Hat 6 Server L1 v3.0.0Unix

ACCESS CONTROL

5.1.3 Ensure permissions on /etc/cron.hourly are configuredCIS Red Hat 6 Server L1 v3.0.0Unix

ACCESS CONTROL

5.1.6 Ensure permissions on /etc/cron.monthly are configuredCIS Red Hat 6 Workstation L1 v3.0.0Unix

ACCESS CONTROL

5.1.7 Ensure permissions on /etc/cron.d are configuredCIS Oracle Linux 6 Server L1 v2.0.0Unix

ACCESS CONTROL

5.10 Securely Define Stored Procedures and Functions DEFINER and INVOKERCIS MariaDB 10.6 Database L1 v1.1.0MySQLDB

PLANNING, SYSTEM AND SERVICES ACQUISITION

5.10 Securely Define Stored Procedures and Functions DEFINER and INVOKERCIS MySQL 5.7 Community Database L1 v2.0.0MySQLDB

PLANNING, SYSTEM AND SERVICES ACQUISITION

5.10 Securely Define Stored Procedures and Functions DEFINER and INVOKERCIS MySQL 8.4 Enterprise v1.0.0 L1 DatabaseMySQLDB

PLANNING, SYSTEM AND SERVICES ACQUISITION

5.12 Ensure Proper Use Of ALLOW_NONEXISTENT_DEFINERCIS Oracle MySQL Enterprise Edition 8.0 v1.4.0 L1 DatabaseMySQLDB

PLANNING, SYSTEM AND SERVICES ACQUISITION

5.12 Ensure Proper Use Of ALLOW_NONEXISTENT_DEFINERCIS Oracle MySQL Community Server 8.4 v1.0.0 L1 DatabaseMySQLDB

PLANNING, SYSTEM AND SERVICES ACQUISITION

6.1.1 Audit system file permissionsCIS Oracle Linux 6 Workstation L2 v2.0.0Unix

ACCESS CONTROL

6.1.3 Set User/Group Owner and Permission on /etc/anacrontabCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

ACCESS CONTROL

6.1.4 Set User/Group Owner and Permission on /etc/crontabCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

ACCESS CONTROL

6.1.8 Set User/Group Owner and Permission on /etc/cron.monthlyCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

ACCESS CONTROL

6.1.9 Set User/Group Owner and Permission on /etc/cron.dCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

ACCESS CONTROL

6.1.10 Ensure no world writable files existCIS Red Hat 6 Server L1 v3.0.0Unix

ACCESS CONTROL

6.1.10 Restrict at/cron to Authorized Users - cron.denyCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

ACCESS CONTROL

6.1.12 Ensure no ungrouped files or directories existCIS Red Hat 6 Server L1 v3.0.0Unix

ACCESS CONTROL

6.2.6 Ensure root is the only UID 0 accountCIS Red Hat 6 Workstation L1 v3.0.0Unix

ACCESS CONTROL

6.2.6 Ensure root is the only UID 0 accountCIS Oracle Linux 6 Server L1 v2.0.0Unix

ACCESS CONTROL

6.2.9 Ensure users own their home directoriesCIS Red Hat 6 Workstation L1 v3.0.0Unix

ACCESS CONTROL

6.2.9 Ensure users own their home directoriesCIS Red Hat 6 Server L1 v3.0.0Unix

ACCESS CONTROL

6.2.11 Ensure users' dot files are not group or world writableCIS Oracle Linux 6 Server L1 v2.0.0Unix

ACCESS CONTROL

7.2 Ensure appropriate database file permissions are set.CIS MongoDB 6 v1.2.0 L1 MongoDBWindows

ACCESS CONTROL

9.1.8 Verify User/Group Ownership on /etc/gshadowCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

ACCESS CONTROL

9.1.9 Verify User/Group Ownership on /etc/groupCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

ACCESS CONTROL

9.2.9 Check Permissions on User .netrc FilesCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

ACCESS CONTROL

10.1 Ensure SELinux Is Enabled in Enforcing Mode - config fileCIS BIND DNS v1.0.0 L2 Caching Only Name ServerUnix

ACCESS CONTROL

18.9.59.3.3.2 Ensure 'Do not allow drive redirection' is set to 'Enabled'CIS Microsoft Windows 8.1 v2.4.1 L1Windows

ACCESS CONTROL