Item Search

NameAudit NamePluginCategory
1.3.6 Ensure 'Minimum Special Characters' is greater than or equal to 1CIS Palo Alto Firewall 9 v1.1.0 L1Palo_Alto

IDENTIFICATION AND AUTHENTICATION

1.3.9 Ensure 'Prevent Password Reuse Limit' is set to 24 or more passwordsCIS Palo Alto Firewall 8 Benchmark L1 v1.0.0Palo_Alto

ACCESS CONTROL

1.4.2 Ensure 'Failed Attempts' and 'Lockout Time' for Authentication Profile are properly configured - Lockout TimeCIS Palo Alto Firewall 8 Benchmark L1 v1.0.0Palo_Alto

ACCESS CONTROL

2.11 Implement Connection Delays to Limit Failed Login Attempts - connection_control_max_connection_delayCIS MySQL 5.6 Community Database L1 v2.0.0MySQLDB

ACCESS CONTROL

2.11 Implement Connection Delays to Limit Failed Login Attempts - connection_control_max_connection_delayCIS MySQL 5.6 Enterprise Database L1 v2.0.0MySQLDB

ACCESS CONTROL

2.15 Implement Connection Delays to Limit Failed Login Attempts - connection_control_failed_connections_thresholdCIS MySQL 5.7 Enterprise Database L1 v2.0.0MySQLDB

ACCESS CONTROL

2.15 Implement Connection Delays to Limit Failed Login Attempts - CONNECTION_CONTROL_FAILED_LOGIN_ATTEMPTSCIS MySQL 5.7 Community Database L1 v2.0.0MySQLDB

ACCESS CONTROL

2.15 Implement Connection Delays to Limit Failed Login Attempts - connection_control_min_connection_delayCIS MySQL 5.7 Community Database L1 v2.0.0MySQLDB

ACCESS CONTROL

2.18 Implement Connection Delays to Limit Failed Login AttemptsCIS MySQL 8.0 Community Database L1 v1.1.0MySQLDB

ACCESS CONTROL

3.2.1.26 Ensure 'Allow proximity based password sharing requests' is set to 'Disabled'AirWatch - CIS Apple iOS 14 and iPadOS 14 Institution Owned L1MDM

ACCESS CONTROL

3.2.1.26 Ensure 'Allow proximity based password sharing requests' is set to 'Disabled'MobileIron - CIS Apple iOS 14 and iPadOS 14 Institution Owned L1MDM

ACCESS CONTROL

4.5 Ensure the Exception Users list is properly configuredCIS VMware ESXi 6.5 v1.0.0 Level 1VMware

ACCESS CONTROL

4.6 Ensure the maximum failed login attempts is set to 3CIS VMware ESXi 6.5 v1.0.0 Level 1VMware

ACCESS CONTROL

5.1.8 Ensure at/cron is restricted to authorized users - at.allowCIS Distribution Independent Linux Server L1 v2.0.0Unix

ACCESS CONTROL

5.1.8 Ensure at/cron is restricted to authorized users - at.allowCIS Debian 9 Server L1 v1.0.1Unix

ACCESS CONTROL

5.1.8 Ensure at/cron is restricted to authorized users - at.denyCIS Distribution Independent Linux Workstation L1 v2.0.0Unix

ACCESS CONTROL

5.1.8 Ensure at/cron is restricted to authorized users - cron.allowCIS Debian 9 Server L1 v1.0.1Unix

ACCESS CONTROL

5.1.8 Ensure at/cron is restricted to authorized users - cron.allowCIS Distribution Independent Linux Workstation L1 v2.0.0Unix

ACCESS CONTROL

5.1.8 Ensure at/cron is restricted to authorized users - cron.denyCIS Debian 9 Server L1 v1.0.1Unix

ACCESS CONTROL

5.1.8 Ensure cron is restricted to authorized users - /etc/cron.allowCIS Oracle Linux 6 Server L1 v2.0.0Unix

ACCESS CONTROL

5.1.8 Ensure cron is restricted to authorized users - /etc/cron.allowCIS Oracle Linux 6 Workstation L1 v2.0.0Unix

ACCESS CONTROL

5.1.9 Ensure at is restricted to authorized users - /etc/at.allowCIS CentOS 6 Server L1 v3.0.0Unix

ACCESS CONTROL

5.1.9 Ensure at is restricted to authorized users - /etc/at.allowCIS CentOS 6 Workstation L1 v3.0.0Unix

ACCESS CONTROL

5.1.9 Ensure at is restricted to authorized users - /etc/at.denyCIS CentOS 6 Workstation L1 v3.0.0Unix

ACCESS CONTROL

5.3.3 Ensure password reuse is limitedCIS SUSE Linux Enterprise 12 v3.2.1 L1 ServerUnix

IDENTIFICATION AND AUTHENTICATION

5.3.3 Ensure password reuse is limitedCIS SUSE Linux Enterprise Server 11 L1 v2.1.1Unix

IDENTIFICATION AND AUTHENTICATION

5.3.3 Ensure password reuse is limitedCIS SUSE Linux Enterprise Workstation 11 L1 v2.1.1Unix

IDENTIFICATION AND AUTHENTICATION

5.3.3 Ensure password reuse is limitedCIS SUSE Linux Enterprise 12 v3.2.1 L1 WorkstationUnix

IDENTIFICATION AND AUTHENTICATION

5.4.2 Ensure system accounts are non-loginCIS Debian 8 Server L1 v2.0.2Unix

ACCESS CONTROL

5.4.2 Ensure system accounts are securedCIS Ubuntu Linux 18.04 LXD Container L1 v1.0.0Unix

ACCESS CONTROL

5.4.4 Ensure password reuse is limitedCIS Amazon Linux 2 STIG v2.0.0 L1 ServerUnix

IDENTIFICATION AND AUTHENTICATION

5.4.4 Ensure password reuse is limitedCIS Amazon Linux 2 STIG v2.0.0 L1 WorkstationUnix

IDENTIFICATION AND AUTHENTICATION

5.4.4 Ensure password reuse is limitedCIS Red Hat Enterprise Linux 7 STIG v2.0.0 L1 ServerUnix

IDENTIFICATION AND AUTHENTICATION

5.4.4 Ensure password reuse is limitedCIS Red Hat Enterprise Linux 7 STIG v2.0.0 L1 WorkstationUnix

IDENTIFICATION AND AUTHENTICATION

5.5.2 Ensure system accounts are securedCIS Ubuntu Linux 16.04 LTS Server L1 v2.0.0Unix

ACCESS CONTROL

6.2.15 Ensure all groups in /etc/passwd exist in /etc/groupCIS Oracle Linux 6 Workstation L1 v2.0.0Unix

ACCESS CONTROL

6.2.15 Ensure all groups in /etc/passwd exist in /etc/groupCIS Red Hat 6 Workstation L1 v3.0.0Unix

ACCESS CONTROL

6.2.16 Ensure no duplicate group names existCIS Ubuntu Linux 16.04 LTS Server L1 v2.0.0Unix

ACCESS CONTROL

6.2.16 Ensure no duplicate UIDs existCIS Ubuntu Linux 18.04 LXD Container L1 v1.0.0Unix

ACCESS CONTROL

6.2.16 Ensure no duplicate UIDs existCIS Red Hat 6 Server L1 v3.0.0Unix

ACCESS CONTROL

6.2.16 Ensure no duplicate UIDs existCIS CentOS 6 Workstation L1 v3.0.0Unix

ACCESS CONTROL

6.2.17 Ensure no duplicate GIDs existCIS Distribution Independent Linux Server L1 v2.0.0Unix

ACCESS CONTROL

6.2.17 Ensure no duplicate GIDs existCIS Distribution Independent Linux Workstation L1 v2.0.0Unix

ACCESS CONTROL

6.2.18 Ensure no duplicate user names existCIS Ubuntu Linux 18.04 LXD Container L1 v1.0.0Unix

ACCESS CONTROL

6.2.18 Ensure no duplicate user names existCIS Oracle Linux 6 Workstation L1 v2.0.0Unix

ACCESS CONTROL

6.2.19 Ensure no duplicate group names existCIS SUSE Linux Enterprise Workstation 11 L1 v2.1.1Unix

ACCESS CONTROL

6.2.19 Ensure no duplicate group names existCIS Oracle Linux 6 Server L1 v2.0.0Unix

ACCESS CONTROL

6.2.20 Ensure shadow group is emptyCIS Debian 9 Workstation L1 v1.0.1Unix

ACCESS CONTROL

7.13 Apple Watch features with macOSCIS Apple macOS 10.12 L1 v1.2.0Unix

ACCESS CONTROL

7.13 Apple Watch features with macOSCIS Apple macOS 10.13 L1 v1.1.0Unix

ACCESS CONTROL