1.10 Do not create access keys during initial setup for IAM users with a console password | CIS Amazon Web Services Foundations v5.0.0 L1 | amazon_aws | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION |
2.1.3 Ensure 'ADMIN_RESTRICTIONS_' Is Set to 'ON' | CIS Oracle Server 12c Windows v3.0.0 | Windows | ACCESS CONTROL |
2.2.16 (L1) Ensure 'Deny access to this computer from the network' to include 'Guests, Local account' | CIS Microsoft Windows 8.1 v2.4.1 L1 Bitlocker | Windows | ACCESS CONTROL |
2.2.19 (L1) Ensure 'Deny log on locally' to include 'Guests' | CIS Microsoft Windows 8.1 v2.4.1 L1 Bitlocker | Windows | ACCESS CONTROL |
2.2.28 (L2) Ensure 'Log on as a batch job' is set to 'Administrators' | CIS Microsoft Windows 8.1 v2.4.1 L2 Bitlocker | Windows | ACCESS CONTROL |
2.2.29 (L2) Configure 'Log on as a service' | CIS Microsoft Windows 8.1 v2.4.1 L2 Bitlocker | Windows | ACCESS CONTROL |
2.3.1.2 (L1) Ensure 'Accounts: Block Microsoft accounts' is set to 'Users can't add or log on with Microsoft accounts' | CIS Microsoft Windows 8.1 v2.4.1 L1 Bitlocker | Windows | ACCESS CONTROL |
2.3.17.2 (L1) Ensure 'User Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode' is set to 'Prompt for consent on the secure desktop' | CIS Microsoft Windows 8.1 v2.4.1 L1 Bitlocker | Windows | ACCESS CONTROL |
2.3.17.7 (L1) Ensure 'User Account Control: Switch to the secure desktop when prompting for elevation' is set to 'Enabled' | CIS Microsoft Windows 8.1 v2.4.1 L1 Bitlocker | Windows | ACCESS CONTROL |
2.8 Ensure that a unique Certificate Authority is used for etcd | CIS Kubernetes v1.11.1 L2 Master Node | Unix | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION |
2.13 Ensure 'sa' Login Account is set to 'Disabled' | CIS SQL Server 2012 Database L1 AWS RDS v1.6.0 | MS_SQLDB | ACCESS CONTROL |
2.13 Ensure 'sa' Login Account is set to 'Disabled' | CIS SQL Server 2012 Database L1 DB v1.6.0 | MS_SQLDB | ACCESS CONTROL |
3.3 Ensure 'Orphaned Users' are Dropped from SQL Server Databases | CIS SQL Server 2012 Database L1 DB v1.6.0 | MS_SQLDB | ACCESS CONTROL |
3.4 Ensure the SQL Server's MSSQL Service Account is Not an Administrator | CIS SQL Server 2008 R2 DB OS L1 v1.7.0 | Windows | ACCESS CONTROL |
4.1 Ensure sudo is configured correctly | CIS PostgreSQL 11 OS v1.0.0 | Unix | ACCESS CONTROL |
4.2 Ensure 'CHECK_EXPIRATION' Option is set to 'ON' for All SQL Authenticated Logins Within the Sysadmin Role | CIS SQL Server 2014 Database L1 DB v1.5.0 | MS_SQLDB | ACCESS CONTROL |
4.4 Ensure No Users Are Assigned the 'DEFAULT' Profile | CIS Oracle Server 12c DB Traditional Auditing v3.0.0 | OracleDB | ACCESS CONTROL |
5.2.7 Ensure SSH MaxAuthTries is set to 4 or less | CIS Distribution Independent Linux Workstation L1 v2.0.0 | Unix | ACCESS CONTROL |
5.2.7 Ensure SSH MaxAuthTries is set to 4 or less | CIS Debian 9 Workstation L1 v1.0.1 | Unix | ACCESS CONTROL |
5.2.7 Ensure SSH MaxAuthTries is set to 4 or less | CIS Aliyun Linux 2 L1 v1.0.0 | Unix | ACCESS CONTROL |
5.3.1 (L2) Ensure 'Privileged Identity Management' is used to manage roles | CIS Microsoft 365 Foundations v5.0.0 L2 E5 | microsoft_azure | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION |
5.3.5 (L1) Ensure approval is required for Privileged Role Administrator activation | CIS Microsoft 365 Foundations v5.0.0 L1 E5 | microsoft_azure | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION |
5.3.8 Ensure SSH MaxAuthTries is set to 4 or less | CIS Red Hat 6 Workstation L1 v3.0.0 | Unix | ACCESS CONTROL |
5.3.8 Ensure SSH MaxAuthTries is set to 4 or less | CIS Red Hat 6 Server L1 v3.0.0 | Unix | ACCESS CONTROL |
5.3.11 Ensure SSH root login is disabled | CIS Red Hat 6 Server L1 v3.0.0 | Unix | ACCESS CONTROL |
5.3.11 Ensure SSH root login is disabled | CIS Red Hat 6 Workstation L1 v3.0.0 | Unix | ACCESS CONTROL |
5.3.11 Ensure SSH root login is disabled | CIS CentOS 6 Workstation L1 v3.0.0 | Unix | ACCESS CONTROL |
5.3.11 Ensure SSH root login is disabled | CIS Oracle Linux 6 Server L1 v2.0.0 | Unix | ACCESS CONTROL |
5.5 Ensure root login is restricted to system console | CIS Ubuntu Linux 18.04 LXD Host L1 Workstation v1.0.0 | Unix | ACCESS CONTROL |
6.2.15 Ensure all groups in /etc/passwd exist in /etc/group | CIS Ubuntu Linux 18.04 LXD Container L1 v1.0.0 | Unix | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION |
7.6 Lock Inactive User Accounts - useradd -D, 35 | CIS Solaris 11.2 L1 v1.1.0 | Unix | ACCESS CONTROL |
7.6 Lock Inactive User Accounts - useradd -D, 35 | CIS Solaris 11.1 L1 v1.0.0 | Unix | ACCESS CONTROL |
9.3.1 Ensure that the Expiration Date is set for all Keys in RBAC Key Vaults | CIS Microsoft Azure Foundations v4.0.0 L1 | microsoft_azure | ACCESS CONTROL, AUDIT AND ACCOUNTABILITY, SYSTEM AND INFORMATION INTEGRITY |
9.3.2 Ensure that the Expiration Date is set for all Keys in Non-RBAC Key Vaults. | CIS Microsoft Azure Foundations v4.0.0 L1 | microsoft_azure | ACCESS CONTROL, AUDIT AND ACCOUNTABILITY, SYSTEM AND INFORMATION INTEGRITY |
10.3.1.2 Ensure that Storage Account access keys are periodically regenerated | CIS Microsoft Azure Foundations v4.0.0 L1 | microsoft_azure | ACCESS CONTROL, CONFIGURATION MANAGEMENT, MAINTENANCE |
10.5 Lock Inactive User Accounts | CIS Debian Linux 7 L1 v1.0.0 | Unix | ACCESS CONTROL |
Big Sur - Automatically Remove or Disable Emergency Accounts within 72 Hours | NIST macOS Big Sur v1.4.0 - All Profiles | Unix | ACCESS CONTROL |
Big Sur - Automatically Remove or Disable Temporary User Accounts within 72 Hours | NIST macOS Big Sur v1.4.0 - 800-53r5 High | Unix | ACCESS CONTROL |
Big Sur - Automatically Remove or Disable Temporary User Accounts within 72 Hours | NIST macOS Big Sur v1.4.0 - 800-53r5 Moderate | Unix | ACCESS CONTROL |
Big Sur - Automatically Remove or Disable Temporary User Accounts within 72 Hours | NIST macOS Big Sur v1.4.0 - All Profiles | Unix | ACCESS CONTROL |
Catalina - Automatically Remove or Disable Temporary User Accounts within 72 Hours | NIST macOS Catalina v1.5.0 - All Profiles | Unix | ACCESS CONTROL |
List users | TNS Citrix Hypervisor | Unix | ACCESS CONTROL |
Monterey - Automatically Remove or Disable Emergency Accounts within 72 Hours | NIST macOS Monterey v1.0.0 - All Profiles | Unix | ACCESS CONTROL |
Monterey - Automatically Remove or Disable Temporary User Accounts within 72 Hours | NIST macOS Monterey v1.0.0 - 800-53r5 High | Unix | ACCESS CONTROL |
Monterey - Automatically Remove or Disable Temporary User Accounts within 72 Hours | NIST macOS Monterey v1.0.0 - CNSSI 1253 | Unix | ACCESS CONTROL |
Monterey - Disable the Guest Account | NIST macOS Monterey v1.0.0 - 800-171 | Unix | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
Monterey - Disable the Guest Account | NIST macOS Monterey v1.0.0 - CNSSI 1253 | Unix | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
Monterey - Disable the Guest Account | NIST macOS Monterey v1.0.0 - 800-53r4 High | Unix | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
Monterey - Disable the Guest Account | NIST macOS Monterey v1.0.0 - All Profiles | Unix | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
XenServer - List users | TNS Citrix XenServer | Unix | ACCESS CONTROL |