1.1 Ensure a separate user and group exist for Cassandra - group | CIS Apache Cassandra 3.11 L1 Unix Audit v1.0.0 | Unix | ACCESS CONTROL |
1.1 Ensure a separate user and group exist for Cassandra - passwd | CIS Apache Cassandra 3.11 L2 Unix Audit v1.0.0 | Unix | ACCESS CONTROL |
1.1 Ensure a separate user and group exist for Cassandra - user exists in group | CIS Apache Cassandra 3.11 L2 Unix Audit v1.0.0 | Unix | ACCESS CONTROL |
1.3.3 Ensure 'Minimum Uppercase Letters' is greater than or equal to 1 | CIS Palo Alto Firewall 8 Benchmark L1 v1.0.0 | Palo_Alto | ACCESS CONTROL |
1.3.7 Ensure 'Required Password Change Period' is less than or equal to 90 days | CIS Palo Alto Firewall 8 Benchmark L1 v1.0.0 | Palo_Alto | ACCESS CONTROL |
1.4.2 Ensure 'Failed Attempts' and 'Lockout Time' for Authentication Profile are properly configured - Failed Attempts | CIS Palo Alto Firewall 8 Benchmark L1 v1.0.0 | Palo_Alto | ACCESS CONTROL |
1.5 Ensure the Cassandra service is run as a non-root user | CIS Apache Cassandra 3.11 L2 Unix Audit v1.0.0 | Unix | ACCESS CONTROL |
2.1 Run BIND as a non-root User - UID | CIS BIND DNS v1.0.0 L1 Authoritative Name Server | Unix | ACCESS CONTROL |
2.3.1.4 Configure 'Accounts: Rename administrator account' | CIS Windows 7 Workstation Level 1 + Bitlocker v3.2.0 | Windows | ACCESS CONTROL |
2.7 Ensure that a unique Certificate Authority is used for etcd | CIS Kubernetes v1.20 Benchmark v1.0.1 L2 Master | Unix | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION |
3.2.1.25 Ensure 'Allow proximity based password sharing requests' is set to 'Disabled' | AirWatch - CIS Apple iOS 13 and iPadOS 13 Institution Owned L1 | MDM | ACCESS CONTROL |
3.7.1 Ensure 'Notification Settings' are configured for all 'Managed Apps' | MobileIron - CIS Apple iOS 13 and iPadOS 13 Institution Owned L1 | MDM | ACCESS CONTROL |
3.8 Ensure 'SESSIONS_PER_USER' Is Less than or Equal to '10' | CIS Oracle Server 18c DB Traditional Auditing v1.1.0 | OracleDB | ACCESS CONTROL |
4.4 Ensure excessive DML privileges are revoked | CIS PostgreSQL 9.6 DB v1.0.0 | PostgreSQLDB | ACCESS CONTROL |
5.1.8 Ensure at/cron is restricted to authorized users - at.deny | CIS Debian 9 Server L1 v1.0.1 | Unix | ACCESS CONTROL |
5.1.8 Ensure at/cron is restricted to authorized users - cron.deny | CIS Debian 9 Workstation L1 v1.0.1 | Unix | ACCESS CONTROL |
5.1.8 Ensure cron is restricted to authorized users - /etc/cron.allow | CIS CentOS 6 Server L1 v3.0.0 | Unix | ACCESS CONTROL |
5.1.8 Ensure cron is restricted to authorized users - /etc/cron.deny | CIS CentOS 6 Workstation L1 v3.0.0 | Unix | ACCESS CONTROL |
5.1.9 Ensure at is restricted to authorized users - /etc/at.deny | CIS CentOS 6 Server L1 v3.0.0 | Unix | ACCESS CONTROL |
5.1.9 Ensure at is restricted to authorized users - /etc/at.deny | CIS Oracle Linux 6 Workstation L1 v2.0.0 | Unix | ACCESS CONTROL |
5.2.1 Ensure sudo is installed | CIS CentOS 6 Server L1 v3.0.0 | Unix | ACCESS CONTROL |
5.2.1 Ensure sudo is installed | CIS Oracle Linux 6 Workstation L1 v2.0.0 | Unix | ACCESS CONTROL |
5.3.2 Ensure lockout for failed password attempts is configured | CIS Debian 9 Server L1 v1.0.1 | Unix | ACCESS CONTROL |
5.3.2 Ensure lockout for failed password attempts is configured - account pam_deny.so | CIS Ubuntu Linux 18.04 LXD Container L1 v1.0.0 | Unix | ACCESS CONTROL |
5.3.2 Ensure lockout for failed password attempts is configured - account pam_deny.so | CIS Ubuntu Linux 18.04 LXD Host L1 Server v1.0.0 | Unix | ACCESS CONTROL |
5.3.2 Ensure lockout for failed password attempts is configured - auth pam_tally2.so | CIS Ubuntu Linux 18.04 LXD Container L1 v1.0.0 | Unix | ACCESS CONTROL |
5.3.2 Lockout for failed password attempts - 'auth required pam_faillock.so preauth audit silent deny=5 unlock_time=900' | CIS Distribution Independent Linux Server L1 v2.0.0 | Unix | ACCESS CONTROL |
5.3.3 Ensure password reuse is limited | CIS Distribution Independent Linux Workstation L1 v2.0.0 | Unix | ACCESS CONTROL |
5.3.3 Ensure password reuse is limited | CIS Ubuntu Linux 18.04 LXD Host L1 Workstation v1.0.0 | Unix | ACCESS CONTROL |
5.4.2 Ensure system accounts are secured - non login | CIS Distribution Independent Linux Workstation L1 v2.0.0 | Unix | ACCESS CONTROL |
5.7 Ensure access to the su command is restricted - pam_wheel.so | CIS CentOS 6 Workstation L1 v3.0.0 | Unix | ACCESS CONTROL |
5.7 Ensure access to the su command is restricted - pam_wheel.so | CIS Red Hat 6 Server L1 v3.0.0 | Unix | ACCESS CONTROL |
5.7 Ensure access to the su command is restricted - wheel group contains root | CIS CentOS 6 Server L1 v3.0.0 | Unix | ACCESS CONTROL |
5.7 Ensure access to the su command is restricted - wheel group contains root | CIS Red Hat 6 Server L1 v3.0.0 | Unix | ACCESS CONTROL |
6.2.15 Ensure all groups in /etc/passwd exist in /etc/group | CIS Ubuntu Linux 18.04 LXD Host L1 Workstation v1.0.0 | Unix | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION |
6.2.15 Ensure all groups in /etc/passwd exist in /etc/group | CIS CentOS 6 Workstation L1 v3.0.0 | Unix | ACCESS CONTROL |
6.2.15 Ensure all groups in /etc/passwd exist in /etc/group | CIS Red Hat 6 Server L1 v3.0.0 | Unix | ACCESS CONTROL |
6.2.16 Ensure no duplicate UIDs exist | CIS Distribution Independent Linux Server L1 v2.0.0 | Unix | ACCESS CONTROL |
6.2.16 Ensure no duplicate UIDs exist | CIS CentOS 6 Server L1 v3.0.0 | Unix | ACCESS CONTROL |
6.2.16 Ensure no duplicate UIDs exist | CIS Ubuntu Linux 18.04 LXD Host L1 Workstation v1.0.0 | Unix | ACCESS CONTROL |
6.2.16 Ensure no duplicate UIDs exist | CIS Oracle Linux 6 Workstation L1 v2.0.0 | Unix | ACCESS CONTROL |
6.2.18 Ensure no duplicate user names exist | CIS Ubuntu Linux 18.04 LXD Host L1 Server v1.0.0 | Unix | ACCESS CONTROL |
6.2.18 Ensure no duplicate user names exist | CIS Ubuntu Linux 18.04 LXD Host L1 Workstation v1.0.0 | Unix | ACCESS CONTROL |
6.2.19 Ensure no duplicate group names exist | CIS CentOS 6 Workstation L1 v3.0.0 | Unix | ACCESS CONTROL |
Accounts: Administrator account status | MSCT Windows 10 1803 v1.0.0 | Windows | ACCESS CONTROL |
HP ProCurve - 'Configure Management VLAN' | TNS HP ProCurve | HPProCurve | ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION |
Monterey - Disable the Guest Account | NIST macOS Monterey v1.0.0 - 800-53r4 Moderate | Unix | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
Monterey - Disable the Guest Account | NIST macOS Monterey v1.0.0 - 800-53r5 High | Unix | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
Monterey - Disable the Guest Account | NIST macOS Monterey v1.0.0 - 800-53r4 Low | Unix | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
Monterey - Disable the Guest Account | NIST macOS Monterey v1.0.0 - 800-53r5 Low | Unix | ACCESS CONTROL, CONFIGURATION MANAGEMENT |