Buffer overflow protection should be configured 'LimitRequestFieldsize' | TNS IBM HTTP Server Best Practice | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
CGI-BIN directory should be disabled. 'Directory' | TNS IBM HTTP Server Best Practice | Unix | CONFIGURATION MANAGEMENT |
CGI-BIN directory should be disabled. 'LoadModule cgi_module' | TNS IBM HTTP Server Best Practice | Windows | CONFIGURATION MANAGEMENT |
Directory access permissions should be restricted. | TNS IBM HTTP Server Best Practice | Windows | ACCESS CONTROL |
Encryption protocols such as https should be used | TNS IBM HTTP Server Best Practice | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
HTTP TRACE method should be disabled. 'RewriteCond' | TNS IBM HTTP Server Best Practice | Windows | CONFIGURATION MANAGEMENT |
HTTP TRACE method should be disabled. 'RewriteEngine' | TNS IBM HTTP Server Best Practice | Windows | CONFIGURATION MANAGEMENT |
HTTP TRACE method should be disabled. 'TraceEnable' | TNS IBM HTTP Server Best Practice | Unix | CONFIGURATION MANAGEMENT |
Huawei: Device clock = UTC | TNS Huawei VRP Best Practice Audit | Huawei | CONFIGURATION MANAGEMENT |
Logging Directives should be restricted to authorized users. - 'LogFormat' | TNS IBM HTTP Server Best Practice | Windows | AUDIT AND ACCOUNTABILITY |
Logging Directives should be restricted to authorized users. - 'LogLevel notice' | TNS IBM HTTP Server Best Practice | Windows | AUDIT AND ACCOUNTABILITY |
MaxClients parameter value should be configured to appropriate value. | TNS IBM HTTP Server Best Practice | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
MaxKeepAliveRequests parameter value should be appropriately configured. | TNS IBM HTTP Server Best Practice | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
Non-Essential modules should be disabled. 'mod_autoindex' | TNS IBM HTTP Server Best Practice | Unix | CONFIGURATION MANAGEMENT |
Non-Essential modules should be disabled. 'mod_include' | TNS IBM HTTP Server Best Practice | Unix | CONFIGURATION MANAGEMENT |
Non-Essential modules should be disabled. 'mod_userdir' | TNS IBM HTTP Server Best Practice | Windows | CONFIGURATION MANAGEMENT |
Non-Essential modules should be disabled. 'mod_userdir' | TNS IBM HTTP Server Best Practice | Unix | CONFIGURATION MANAGEMENT |
OpenStack Compute - keystone used for authentication | TNS OpenStack Nova/Compute Security Guide | Unix | IDENTIFICATION AND AUTHENTICATION |
OpenStack Compute - secure protocol used for authentication | TNS OpenStack Nova/Compute Security Guide | Unix | |
OpenStack Compute - strict permissions set for Compute configuration files - /etc/nova/api-paste.ini | TNS OpenStack Nova/Compute Security Guide | Unix | CONFIGURATION MANAGEMENT |
OpenStack Compute - user/group ownership of config files set to root/nova - /etc/nova/nova.conf | TNS OpenStack Nova/Compute Security Guide | Unix | CONFIGURATION MANAGEMENT |
OpenStack Compute - user/group ownership of config files set to root/nova - /etc/nova/rootwrap.conf | TNS OpenStack Nova/Compute Security Guide | Unix | CONFIGURATION MANAGEMENT |
OpenStack Identity - Disable admin token in /etc/keystone/keystone-paste.ini | TNS OpenStack Keystone/Identity Security Guide | Unix | ACCESS CONTROL |
OpenStack Identity - max_request_body_size set to default | TNS OpenStack Keystone/Identity Security Guide | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
OpenStack Identity - strict permissions set for Identity configuration files - /etc/keystone/logging.conf | TNS OpenStack Keystone/Identity Security Guide | Unix | CONFIGURATION MANAGEMENT |
OpenStack Identity - strict permissions set for Identity configuration files - /etc/keystone/ssl/certs/signing_cert.pem | TNS OpenStack Keystone/Identity Security Guide | Unix | CONFIGURATION MANAGEMENT |
OpenStack Networking - SSL enabled on Neutron API server | TNS OpenStack Neutron/Networking Security Guide | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
Salesforce.com : AuthConfig - 'Auth Providers = Facebook Consumer Secret' | TNS Salesforce Best Practices Audit v1.2.0 | Salesforce.com | |
Salesforce.com : AuthConfig - 'Auth Providers = Facebook Default Scope' | TNS Salesforce Best Practices Audit v1.2.0 | Salesforce.com | |
Salesforce.com : AuthConfig - 'Auth Providers = MicrosoftACS Default Scope' | TNS Salesforce Best Practices Audit v1.2.0 | Salesforce.com | |
Salesforce.com : AuthConfig - 'Auth Providers = OpenIdConnect Authorize Endpoint URL' | TNS Salesforce Best Practices Audit v1.2.0 | Salesforce.com | |
Salesforce.com : AuthConfig - 'Auth Providers = OpenIdConnect Execution User ID' | TNS Salesforce Best Practices Audit v1.2.0 | Salesforce.com | |
Salesforce.com : AuthConfig - 'Auth Providers = OpenIdConnect Send Access Token in Header' | TNS Salesforce Best Practices Audit v1.2.0 | Salesforce.com | |
Salesforce.com : AuthConfig - 'Auth Providers = OpenIdConnect User Info Endpoint URL' | TNS Salesforce Best Practices Audit v1.2.0 | Salesforce.com | |
Salesforce.com : AuthConfig - 'Auth Providers = Salesforce Consumer Key' | TNS Salesforce Best Practices Audit v1.2.0 | Salesforce.com | |
Salesforce.com : AuthConfig - 'Auth Providers = Salesforce Error URL' | TNS Salesforce Best Practices Audit v1.2.0 | Salesforce.com | |
Salesforce.com : Email Services - 'AuthorizationFailureAction != 2' | TNS Salesforce Best Practices Audit v1.2.0 | Salesforce.com | CONFIGURATION MANAGEMENT |
Salesforce.com : Email Services - 'IsTlsRequired = True' | TNS Salesforce Best Practices Audit v1.2.0 | Salesforce.com | IDENTIFICATION AND AUTHENTICATION |
Salesforce.com : Monitoring Login History - 'No users are password locked' | TNS Salesforce Best Practices Audit v1.2.0 | Salesforce.com | ACCESS CONTROL |
Salesforce.com : Object Permissions - 'DefaultCampaignAccess should not be Public Full Access or Public Read/Write' | TNS Salesforce Best Practices Audit v1.2.0 | Salesforce.com | ACCESS CONTROL |
Salesforce.com : Object Permissions - 'DefaultPricebookAccess should not be Use' | TNS Salesforce Best Practices Audit v1.2.0 | Salesforce.com | ACCESS CONTROL |
Salesforce.com : Setting Password Policies - 'password question cannot contain password' | TNS Salesforce Best Practices Audit v1.2.0 | Salesforce.com | IDENTIFICATION AND AUTHENTICATION |
Salesforce.com : Setting Session Security - 'Enable caching and autocomplete = false' | TNS Salesforce Best Practices Audit v1.2.0 | Salesforce.com | CONFIGURATION MANAGEMENT |
Salesforce.com : Setting Session Security - 'Enable CSRF protection on POST requests on non-setup pages = true' | TNS Salesforce Best Practices Audit v1.2.0 | Salesforce.com | SYSTEM AND COMMUNICATIONS PROTECTION |
Salesforce.com : Setting Session Security - 'Enable SMS-based identity confirmation = true' | TNS Salesforce Best Practices Audit v1.2.0 | Salesforce.com | IDENTIFICATION AND AUTHENTICATION |
Salesforce.com : Setting Session Security - 'Force logout on timeout = true' | TNS Salesforce Best Practices Audit v1.2.0 | Salesforce.com | ACCESS CONTROL |
Salesforce.com : Setting Session Security - 'PermissionsPasswordNeverExpires = true' | TNS Salesforce Best Practices Audit v1.2.0 | Salesforce.com | ACCESS CONTROL |
Salesforce.com : Setting Session Security - 'Review Force.com Flow Users' | TNS Salesforce Best Practices Audit v1.2.0 | Salesforce.com | |
Salesforce.com : Setting Session Security - 'Review Marketing Users' | TNS Salesforce Best Practices Audit v1.2.0 | Salesforce.com | |
User IDs which disclose the privileges associated with it, should not be created. 'nologin' | TNS IBM HTTP Server Best Practice | Unix | ACCESS CONTROL |