Item Search

NameAudit NamePluginCategory
1.3 Ensure Data Cluster Initialized SuccessfullyCIS PostgreSQL 12 OS v1.1.0Unix

ACCESS CONTROL, MEDIA PROTECTION

1.3 Ensure Data Cluster Initialized SuccessfullyCIS PostgreSQL 16 OS v1.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

1.4 Ensure Data Cluster Initialized SuccessfullyCIS PostgreSQL 13 OS v1.2.0Unix

ACCESS CONTROL, MEDIA PROTECTION

1.6.1.4 Ensure the SELinux mode is enforcing or permissive - getenforceCIS Red Hat Enterprise Linux 7 STIG v2.0.0 L1 WorkstationUnix

ACCESS CONTROL, MEDIA PROTECTION

1.6.1.5 Ensure the SELinux mode is enforcing - getenforceCIS Red Hat Enterprise Linux 7 STIG v2.0.0 L2 WorkstationUnix

ACCESS CONTROL, MEDIA PROTECTION

1.7.5 Ensure permissions on /etc/motd are configuredCIS Red Hat Enterprise Linux 7 STIG v2.0.0 L1 WorkstationUnix

ACCESS CONTROL, MEDIA PROTECTION

1.7.7 Ensure permissions on /etc/issue.net are configuredCIS Red Hat Enterprise Linux 7 STIG v2.0.0 L1 ServerUnix

ACCESS CONTROL, MEDIA PROTECTION

2.3 Ensure 'Cross DB Ownership Chaining' Server Configuration Option is set to '0'CIS SQL Server 2016 Database L1 AWS RDS v1.4.0MS_SQLDB

ACCESS CONTROL, MEDIA PROTECTION

3.1.6 Ensure the log file permissions are set correctlyCIS PostgreSQL 12 DB v1.1.0PostgreSQLDB

ACCESS CONTROL, MEDIA PROTECTION

3.1.6 Ensure the log file permissions are set correctlyCIS PostgreSQL 16 DB v1.0.0PostgreSQLDB

ACCESS CONTROL, MEDIA PROTECTION

3.2 Ensure CONNECT permissions on the 'guest' user is Revoked within all SQL Server databasesCIS SQL Server 2016 Database L1 DB v1.4.0MS_SQLDB

ACCESS CONTROL, MEDIA PROTECTION

3.2.5 CDE - sgid/suid binary lockdown - /usr/dt/bin/dtactionCIS IBM AIX 7.1 L1 v2.1.0Unix

ACCESS CONTROL, MEDIA PROTECTION

3.2.5 CDE - sgid/suid binary lockdown - /usr/dt/bin/dtappgatherCIS IBM AIX 7.1 L1 v2.1.0Unix

ACCESS CONTROL, MEDIA PROTECTION

3.2.5 CDE - sgid/suid binary lockdown - /usr/dt/bin/dtprintinfoCIS IBM AIX 7.1 L1 v2.1.0Unix

ACCESS CONTROL, MEDIA PROTECTION

3.5.3 Remote command lockdown - rloginCIS IBM AIX 7.1 L2 v2.1.0Unix

ACCESS CONTROL, MEDIA PROTECTION

3.7.1.1 Ensure all directories in root PATH deny write access to allCIS IBM AIX 7.1 L1 v2.1.0Unix

ACCESS CONTROL, MEDIA PROTECTION

3.7.1.6 /var/adm/rasCIS IBM AIX 7.1 L1 v2.1.0Unix

ACCESS CONTROL, MEDIA PROTECTION

3.7.1.7 /var/adm/saCIS IBM AIX 7.1 L1 v2.1.0Unix

ACCESS CONTROL, MEDIA PROTECTION

3.7.2.13 /var/adm/cron/logCIS IBM AIX 7.1 L1 v2.1.0Unix

ACCESS CONTROL, MEDIA PROTECTION

3.7.2.16 /var/tmp/snmpd.logCIS IBM AIX 7.1 L1 v2.1.0Unix

ACCESS CONTROL, MEDIA PROTECTION

3.8 Ensure only the default permissions specified by Microsoft are granted to the public server roleCIS SQL Server 2016 Database L1 DB v1.4.0MS_SQLDB

ACCESS CONTROL, MEDIA PROTECTION

3.8 Ensure only the default permissions specified by Microsoft are granted to the public server roleCIS SQL Server 2017 Database L1 DB v1.3.0MS_SQLDB

ACCESS CONTROL, MEDIA PROTECTION

3.9 Ensure Windows BUILTIN groups are not SQL LoginsCIS SQL Server 2016 Database L1 AWS RDS v1.4.0MS_SQLDB

ACCESS CONTROL, MEDIA PROTECTION

3.10 Ensure Windows local groups are not SQL LoginsCIS SQL Server 2016 Database L1 AWS RDS v1.4.0MS_SQLDB

ACCESS CONTROL, MEDIA PROTECTION

4.1 Restrict access to $CATALINA_HOMECIS Apache Tomcat 9 L1 v1.2.0Unix

ACCESS CONTROL, MEDIA PROTECTION

4.3 Restrict access to Tomcat configuration directoryCIS Apache Tomcat 9 L1 v1.2.0 MiddlewareUnix

ACCESS CONTROL, MEDIA PROTECTION

4.4 Restrict access to Tomcat logs directoryCIS Apache Tomcat 9 L1 v1.2.0 MiddlewareUnix

ACCESS CONTROL, MEDIA PROTECTION

4.5 Ensure Row Level Security (RLS) is configured correctlyCIS PostgreSQL 15 DB v1.1.0PostgreSQLDB

ACCESS CONTROL, MEDIA PROTECTION

4.6 Restrict access to Tomcat binaries directoryCIS Apache Tomcat 9 L1 v1.2.0Unix

ACCESS CONTROL, MEDIA PROTECTION

4.7 Ensure Row Level Security (RLS) is configured correctlyCIS PostgreSQL 14 DB v 1.2.0PostgreSQLDB

ACCESS CONTROL, MEDIA PROTECTION

4.7 Restrict access to Tomcat web application directoryCIS Apache Tomcat 10 L1 v1.1.0 MiddlewareUnix

ACCESS CONTROL, MEDIA PROTECTION

4.9 Restrict access to Tomcat catalina.policyCIS Apache Tomcat 10 L1 v1.1.0 MiddlewareUnix

ACCESS CONTROL, MEDIA PROTECTION

4.11 Restrict access to Tomcat logging.propertiesCIS Apache Tomcat 9 L1 v1.2.0 MiddlewareUnix

ACCESS CONTROL, MEDIA PROTECTION

4.13 Restrict access to Tomcat tomcat-users.xmlCIS Apache Tomcat 9 L1 v1.2.0 MiddlewareUnix

ACCESS CONTROL, MEDIA PROTECTION

4.15 Restrict access to jaspic-providers.xmlCIS Apache Tomcat 10 L1 v1.1.0 MiddlewareUnix

ACCESS CONTROL, MEDIA PROTECTION

5.1.1 Privilege escalation: enhanced RBACCIS IBM AIX 7.1 L2 v2.1.0Unix

ACCESS CONTROL, MEDIA PROTECTION

5.1.2 Ensure permissions on /etc/crontab are configuredCIS Red Hat Enterprise Linux 7 STIG v2.0.0 L1 WorkstationUnix

ACCESS CONTROL, MEDIA PROTECTION

5.1.7 Ensure permissions on /etc/cron.d are configuredCIS Red Hat Enterprise Linux 7 STIG v2.0.0 L1 ServerUnix

ACCESS CONTROL, MEDIA PROTECTION

5.1.7 Ensure permissions on /etc/cron.d are configuredCIS Red Hat Enterprise Linux 7 STIG v2.0.0 L1 WorkstationUnix

ACCESS CONTROL, MEDIA PROTECTION

5.2.2 Ensure permissions on SSH private host key files are configuredCIS Debian 8 Workstation L1 v2.0.2Unix

ACCESS CONTROL, MEDIA PROTECTION

5.3 Special Permissions Management - suid, sgid, acl, and trusted-bit files and programsCIS IBM AIX 7.1 L2 v2.1.0Unix

ACCESS CONTROL, MEDIA PROTECTION

5.5.2 Ensure system accounts are secured - non-login shellCIS Red Hat Enterprise Linux 7 STIG v2.0.0 L1 ServerUnix

ACCESS CONTROL, MEDIA PROTECTION

5.8 Ensure 'REPLICATION SLAVE' is Not Granted to Non-Administrative UsersCIS MariaDB 10.6 Database L1 v1.1.0MySQLDB

ACCESS CONTROL, MEDIA PROTECTION

6.1.2 Ensure permissions on /etc/passwd are configuredCIS Red Hat Enterprise Linux 7 STIG v2.0.0 L1 ServerUnix

ACCESS CONTROL, MEDIA PROTECTION

6.1.5 Ensure permissions on /etc/shadow- are configuredCIS Red Hat Enterprise Linux 7 STIG v2.0.0 L1 ServerUnix

ACCESS CONTROL, MEDIA PROTECTION

6.1.9 Ensure permissions on /etc/group- are configuredCIS Red Hat Enterprise Linux 7 STIG v2.0.0 L1 WorkstationUnix

ACCESS CONTROL, MEDIA PROTECTION

6.2.14 Ensure users' dot files are not group or world writableCIS Red Hat Enterprise Linux 7 STIG v2.0.0 L1 ServerUnix

ACCESS CONTROL, MEDIA PROTECTION

7.4 Ensure directory in context.xml is a secure location - permissionsCIS Apache Tomcat 10 L1 v1.1.0 MiddlewareUnix

ACCESS CONTROL, MEDIA PROTECTION

7.4 Ensure directory in context.xml is a secure location - permissionsCIS Apache Tomcat 9 L1 v1.2.0 MiddlewareUnix

ACCESS CONTROL, MEDIA PROTECTION

8.1 Restrict runtime access to sensitive packagesCIS Apache Tomcat 9 L1 v1.2.0 MiddlewareUnix

ACCESS CONTROL, MEDIA PROTECTION