1.2.1 Set 'privilege 1' for local users - 'No users with privileges 2-15' | CIS Cisco IOS 12 L1 v4.0.0 | Cisco | ACCESS CONTROL |
2.2.4.6.2 (L1) Ensure 'Disable AutoRepublish' is set to 'Enabled' | CIS Microsoft Intune for Office v1.1.0 L1 | Windows | ACCESS CONTROL |
2.2.4.6.2 Ensure 'Disable AutoRepublish' is set to 'Enabled' | CIS Microsoft Office Enterprise v1.2.0 L1 | Windows | ACCESS CONTROL |
2.3.10.2 Ensure 'Network access: Do not allow anonymous enumeration of SAM accounts' is set to 'Enabled' (MS only) | CIS Microsoft Windows Server 2016 STIG v3.0.0 L1 MS | Windows | ACCESS CONTROL |
2.3.10.12 Ensure 'Network access: Restrict anonymous access to Named Pipes and Shares' is set to 'Enabled' | CIS Microsoft Windows Server 2016 STIG v3.0.0 L1 MS | Windows | ACCESS CONTROL |
2.3.17.3 Ensure 'User Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode' is set to 'Prompt for consent on the secure desktop' or higher | CIS Microsoft Windows Server 2016 STIG v3.0.0 L1 MS | Windows | ACCESS CONTROL |
2.3.17.5 Ensure 'User Account Control: Detect application installations and prompt for elevation' is set to 'Enabled' | CIS Microsoft Windows Server 2016 STIG v3.0.0 L1 Domain Controller | Windows | ACCESS CONTROL |
2.3.17.7 (L1) Ensure 'User Account Control: Switch to the secure desktop when prompting for elevation' is set to 'Enabled' | CIS Microsoft Windows Server 2025 v1.0.0 L1 MS | Windows | ACCESS CONTROL |
2.3.17.8 Ensure 'User Account Control: Switch to the secure desktop when prompting for elevation' is set to 'Enabled' | CIS Microsoft Windows Server 2016 STIG v3.0.0 L1 MS | Windows | ACCESS CONTROL |
3.1 Restrict Core Dumps to Protected Directory - global core dumps = enabled | CIS Solaris 11.1 L1 v1.0.0 | Unix | ACCESS CONTROL |
3.1 Restrict Core Dumps to Protected Directory - global core file pattern | CIS Solaris 11.2 L1 v1.1.0 | Unix | ACCESS CONTROL |
3.1 Restrict Core Dumps to Protected Directory - global setid core dumps = enabled | CIS Solaris 11.2 L1 v1.1.0 | Unix | ACCESS CONTROL |
3.1 Restrict Core Dumps to Protected Directory - init core file pattern | CIS Solaris 11.1 L1 v1.0.0 | Unix | ACCESS CONTROL |
3.1 Restrict Core Dumps to Protected Directory - per-process core dumps = disabled | CIS Solaris 11.2 L1 v1.1.0 | Unix | ACCESS CONTROL |
3.1 Restrict Core Dumps to Protected Directory - per-process setid core dumps = disabled | CIS Solaris 11.2 L1 v1.1.0 | Unix | ACCESS CONTROL |
3.2 Restrict Core Dumps to Protected Directory - Check if COREADM_PROC_ENABLED is set to no | CIS Solaris 10 L1 v5.2 | Unix | ACCESS CONTROL |
3.5 Review Superuser/Admin Roles - dbAdminAnyDatabase | CIS MongoDB 5 L2 DB v1.2.0 | MongoDB | ACCESS CONTROL |
3.5 Review Superuser/Admin Roles - dbOwner | CIS MongoDB 5 L2 DB v1.2.0 | MongoDB | ACCESS CONTROL |
3.5 Review Superuser/Admin Roles - readWriteAnyDatabase | CIS MongoDB 5 L2 DB v1.2.0 | MongoDB | ACCESS CONTROL |
3.6 Review Superuser/Admin Roles - clusterAdmin | CIS MongoDB 3.6 Database Audit L1 v1.1.0 | MongoDB | ACCESS CONTROL |
3.6 Review Superuser/Admin Roles - dbOwner | CIS MongoDB 3.6 Database Audit L1 v1.1.0 | MongoDB | ACCESS CONTROL |
3.6 Review Superuser/Admin Roles - hostManager | CIS MongoDB 3.6 Database Audit L1 v1.1.0 | MongoDB | ACCESS CONTROL |
3.6 Review Superuser/Admin Roles - userAdminAnyDatabase | CIS MongoDB 3.6 Database Audit L1 v1.1.0 | MongoDB | ACCESS CONTROL |
4.1 Restrict Core Dumps - fs.suid_dumpable | CIS Debian Linux 7 L1 v1.0.0 | Unix | ACCESS CONTROL |
4.3 Review Users, Groups, and Roles - Users list | CIS IBM DB2 v10 v1.1.0 Linux OS Level 1 | Unix | ACCESS CONTROL |
4.3 Review Users, Groups, and Roles - Users list | CIS IBM DB2 v10 v1.1.0 Linux OS Level 2 | Unix | ACCESS CONTROL |
4.7 (L1) Ensure only authorized users and groups belong to the esxAdminsGroup group | CIS VMware ESXi 7.0 v1.4.0 L1 | VMware | ACCESS CONTROL |
5.1 Ensure Only Administrative Users Have Full Database Access | CIS MySQL 5.6 Enterprise Database L1 v2.0.0 | MySQLDB | ACCESS CONTROL |
5.1 Ensure Only Administrative Users Have Full Database Access | CIS MySQL 5.7 Community Database L1 v2.0.0 | MySQLDB | ACCESS CONTROL |
5.1 Ensure Only Administrative Users Have Full Database Access | CIS MySQL 5.7 Enterprise Database L1 v2.0.0 | MySQLDB | ACCESS CONTROL |
5.1 Ensure Only Administrative Users Have Full Database Access | CIS MySQL 8.4 Enterprise v1.0.0 L1 Database | MySQLDB | ACCESS CONTROL |
5.1 Ensure Only Administrative Users Have Full Database Access | CIS Oracle MySQL Enterprise Edition 8.0 v1.4.0 L1 Database | MySQLDB | ACCESS CONTROL |
5.4 Do not use privileged containers | CIS Docker 1.11.0 v1.0.0 L1 Docker | Unix | ACCESS CONTROL |
6.1.1 Display login window as name and password | CIS Apple macOS 10.12 L1 v1.2.0 | Unix | ACCESS CONTROL |
6.2.27 Ensure nosuid is set on users' home directories. | CIS Amazon Linux 2 STIG v1.0.0 L3 | Unix | ACCESS CONTROL |
6.12 Set EEPROM Security Mode and Log Failed Access - SPARC only. Should *not* be 'security-mode=none'. | CIS Solaris 10 L1 v5.2 | Unix | ACCESS CONTROL |
6.13 Restrict at/cron to Authorized Users - /etc/cron.d/cron.allow | CIS Solaris 11.1 L1 v1.0.0 | Unix | ACCESS CONTROL |
6.13 Restrict at/cron to Authorized Users - /etc/cron.d/cron.allow | CIS Solaris 11 L1 v1.1.0 | Unix | ACCESS CONTROL |
6.14 Restrict root Login to System Console - CONSOLE = /dev/console | CIS Solaris 11.1 L1 v1.0.0 | Unix | ACCESS CONTROL |
9.1 Check for Remote Consoles using 'consadm' command line utility | CIS Solaris 10 L1 v5.2 | Unix | ACCESS CONTROL |
9.4 Restrict root Login to System Console | CIS Debian Linux 7 L1 v1.0.0 | Unix | ACCESS CONTROL |
9.22 Find SUID/SGID System Executables | CIS Solaris 11.2 L1 v1.1.0 | Unix | ACCESS CONTROL |
9.23 Find SUID/SGID System Executables | CIS Solaris 11.1 L1 v1.0.0 | Unix | ACCESS CONTROL |
10.1 SN.1 Restrict access to suspend feature | CIS Solaris 11.1 L2 v1.0.0 | Unix | ACCESS CONTROL |
10.2 Restrict access to the web administration | CIS Apache Tomcat 7 L2 v1.1.0 | Unix | ACCESS CONTROL |
10.3 Restrict access to power management functions - CPRCHANGEPERM | CIS Solaris 10 L2 v5.2 | Unix | ACCESS CONTROL |
12.10 Find SUID System Executables | CIS Ubuntu 12.04 LTS Benchmark L1 v1.1.0 | Unix | ACCESS CONTROL |
12.11 Find SGID System Executables | CIS Ubuntu 12.04 LTS Benchmark L1 v1.1.0 | Unix | ACCESS CONTROL |
18.6.11.4 Ensure 'Require domain users to elevate when setting a network's location' is set to 'Enabled' | CIS Microsoft Windows Server 2016 STIG v3.0.0 L1 MS | Windows | ACCESS CONTROL |
18.9.28.4 Ensure 'Enumerate local users on domain-joined computers' is set to 'Disabled' (MS only) | CIS Microsoft Windows Server 2016 STIG v3.0.0 L1 MS | Windows | ACCESS CONTROL |