2.1.3 Ensure 'ADMIN_RESTRICTIONS_' Is Set to 'ON' | CIS Oracle Server 12c Linux v3.0.0 | Unix | ACCESS CONTROL |
2.2 Ensure access to sensitive site features is restricted to authenticated principals only | CIS IIS 8.0 v1.5.1 Level 1 | Windows | ACCESS CONTROL |
2.2.18 (L1) Ensure 'Deny log on as a service' to include 'Guests' | CIS Microsoft Windows 8.1 v2.4.1 L1 Bitlocker | Windows | ACCESS CONTROL |
2.2.28 (L2) Ensure 'Log on as a batch job' is set to 'Administrators' | CIS Microsoft Windows 8.1 v2.4.1 L2 | Windows | ACCESS CONTROL |
2.3.1.3 (L1) Ensure 'Accounts: Guest account status' is set to 'Disabled' | CIS Microsoft Windows 8.1 v2.4.1 L1 Bitlocker | Windows | ACCESS CONTROL |
2.3.1.6 (L1) Configure 'Accounts: Rename guest account' | CIS Microsoft Windows 8.1 v2.4.1 L1 Bitlocker | Windows | ACCESS CONTROL |
2.3.4.2 (L2) Ensure 'Devices: Prevent users from installing printer drivers' is set to 'Enabled' | CIS Microsoft Windows 8.1 v2.4.1 L2 Bitlocker | Windows | ACCESS CONTROL |
2.3.9.4 (L1) Ensure 'Microsoft network server: Disconnect clients when logon hours expire' is set to 'Enabled' | CIS Microsoft Windows 8.1 v2.4.1 L1 Bitlocker | Windows | ACCESS CONTROL |
2.3.17.6 (L1) Ensure 'User Account Control: Run all administrators in Admin Approval Mode' is set to 'Enabled' | CIS Microsoft Windows 8.1 v2.4.1 L1 Bitlocker | Windows | ACCESS CONTROL |
2.13 Ensure 'sa' Login Account is set to 'Disabled' | CIS SQL Server 2014 Database L1 AWS RDS v1.5.0 | MS_SQLDB | ACCESS CONTROL |
3.2 Ensure that the default password changed for the cassandra role | CIS Apache Cassandra 3.11 L1 Unix Audit v1.0.0 | Unix | ACCESS CONTROL |
3.2 Ensure the Apache User Account Has an Invalid Shell | CIS Apache HTTP Server 2.2 L1 v3.6.0 | Unix | ACCESS CONTROL |
3.2 Ensure the Apache User Account Has an Invalid Shell | CIS Apache HTTP Server 2.2 L1 v3.6.0 Middleware | Unix | ACCESS CONTROL |
3.3 Ensure 'Orphaned Users' are Dropped From SQL Server Databases | CIS SQL Server 2008 R2 DB Engine L1 v1.7.0 | MS_SQLDB | ACCESS CONTROL |
3.3 Ensure 'Orphaned Users' are Dropped From SQL Server Databases - Orphaned Users are Dropped from SQL Server Databases | CIS SQL Server 2014 Database L1 DB v1.5.0 | MS_SQLDB | ACCESS CONTROL |
3.3 Ensure the Apache User Account Is Locked | CIS Apache HTTP Server 2.2 L2 v3.6.0 | Unix | ACCESS CONTROL |
3.5 Ensure the SQL Server's MSSQL Service Account is Not an Administrator | CIS SQL Server 2012 Database L1 OS v1.6.0 | Windows | ACCESS CONTROL |
4.2 Ensure 'CHECK_EXPIRATION' Option is set to 'ON' for All SQL Authenticated Logins Within the Sysadmin Role | CIS SQL Server 2014 Database L1 AWS RDS v1.5.0 | MS_SQLDB | ACCESS CONTROL |
4.2 Ensure 'CHECK_EXPIRATION' Option is set to 'ON' for All SQL Authenticated Logins Within the Sysadmin Role | CIS SQL Server 2012 Database L1 AWS RDS v1.6.0 | MS_SQLDB | ACCESS CONTROL |
4.4 Ensure No Users Are Assigned the 'DEFAULT' Profile | CIS Oracle Server 12c DB Unified Auditing v3.0.0 | OracleDB | ACCESS CONTROL |
5.2.6 Ensure SSH MaxAuthTries is set to 4 or less | CIS Debian Family Workstation L1 v1.0.0 | Unix | ACCESS CONTROL |
5.2.6 Ensure SSH MaxAuthTries is set to 4 or less | CIS Debian Family Server L1 v1.0.0 | Unix | ACCESS CONTROL |
5.2.7 Ensure SSH MaxAuthTries is set to 4 or less | CIS Debian 9 Server L1 v1.0.1 | Unix | ACCESS CONTROL |
5.2.7 Ensure SSH MaxAuthTries is set to 4 or less | CIS Ubuntu Linux 18.04 LXD Host L1 Server v1.0.0 | Unix | ACCESS CONTROL |
5.2.10 Ensure SSH root login is disabled | CIS Distribution Independent Linux Server L1 v2.0.0 | Unix | ACCESS CONTROL |
5.2.10 Ensure SSH root login is disabled | CIS Ubuntu Linux 18.04 LXD Host L1 Server v1.0.0 | Unix | ACCESS CONTROL |
5.2.18 Ensure SSH access is limited | CIS Ubuntu Linux 18.04 LXD Host L1 Workstation v1.0.0 | Unix | ACCESS CONTROL |
5.3.8 Ensure SSH MaxAuthTries is set to 4 or less | CIS Oracle Linux 6 Server L1 v2.0.0 | Unix | ACCESS CONTROL |
5.3.8 Ensure SSH MaxAuthTries is set to 4 or less | CIS CentOS 6 Server L1 v3.0.0 | Unix | ACCESS CONTROL |
5.3.11 Ensure SSH root login is disabled | CIS CentOS 6 Server L1 v3.0.0 | Unix | ACCESS CONTROL |
5.4 Database Manager Configuration Parameter: TRUST_ALLCLNTS | CIS IBM DB2 11 v1.1.0 Linux OS Level 1 | Unix | ACCESS CONTROL |
5.4 Database Manager Configuration Parameter: TRUST_ALLCLNTS | CIS IBM DB2 11 v1.1.0 Windows OS Level 1 | Windows | ACCESS CONTROL |
5.4.1.4 Ensure inactive password lock is 30 days or less - users | CIS Amazon Linux v2.1.0 L1 | Unix | ACCESS CONTROL |
5.5 Database Manager Configuration Parameter: TRUST_CLNTAUTH | CIS IBM DB2 11 v1.1.0 Linux OS Level 1 | Unix | ACCESS CONTROL |
5.5 Ensure root login is restricted to system console | CIS Ubuntu Linux 18.04 LXD Container L1 v1.0.0 | Unix | ACCESS CONTROL |
7.6 Lock Inactive User Accounts | CIS Oracle Solaris 11.4 L1 v1.1.0 | Unix | ACCESS CONTROL |
12.35 Oracle Installation - 'Oracle software owner account name NOT 'oracle'' | CIS v1.1.0 Oracle 11g OS Windows Level 2 | Windows | ACCESS CONTROL |
18.3.1 (L1) Ensure 'Apply UAC restrictions to local accounts on network logons' is set to 'Enabled' | CIS Microsoft Windows 8.1 v2.4.1 L1 Bitlocker | Windows | ACCESS CONTROL |
18.5.11.2 (L1) Ensure 'Prohibit installation and configuration of Network Bridge on your DNS domain network' is set to 'Enabled' | CIS Microsoft Windows 8.1 v2.4.1 L1 Bitlocker | Windows | ACCESS CONTROL |
18.5.11.3 (L1) Ensure 'Require domain users to elevate when setting a network's location' is set to 'Enabled' | CIS Microsoft Windows 8.1 v2.4.1 L1 Bitlocker | Windows | ACCESS CONTROL |
Big Sur - Automatically Remove or Disable Emergency Accounts within 72 Hours | NIST macOS Big Sur v1.4.0 - 800-53r4 Moderate | Unix | ACCESS CONTROL |
Big Sur - Automatically Remove or Disable Emergency Accounts within 72 Hours | NIST macOS Big Sur v1.4.0 - CNSSI 1253 | Unix | ACCESS CONTROL |
Big Sur - Automatically Remove or Disable Temporary User Accounts within 72 Hours | NIST macOS Big Sur v1.4.0 - 800-53r4 Moderate | Unix | ACCESS CONTROL |
Catalina - Automatically Remove or Disable Temporary User Accounts within 72 Hours | NIST macOS Catalina v1.5.0 - 800-53r4 High | Unix | ACCESS CONTROL |
Catalina - Automatically Remove or Disable Temporary User Accounts within 72 Hours | NIST macOS Catalina v1.5.0 - 800-53r4 Moderate | Unix | ACCESS CONTROL |
Catalina - Automatically Remove or Disable Temporary User Accounts within 72 Hours | NIST macOS Catalina v1.5.0 - 800-53r5 High | Unix | ACCESS CONTROL |
Fortigate - Review users with admin privileges | TNS Fortigate FortiOS Best Practices v2.0.0 | FortiGate | ACCESS CONTROL |
Monterey - Automatically Remove or Disable Emergency Accounts within 72 Hours | NIST macOS Monterey v1.0.0 - 800-53r4 Moderate | Unix | ACCESS CONTROL |
Monterey - Automatically Remove or Disable Emergency Accounts within 72 Hours | NIST macOS Monterey v1.0.0 - CNSSI 1253 | Unix | ACCESS CONTROL |
Monterey - Automatically Remove or Disable Temporary User Accounts within 72 Hours | NIST macOS Monterey v1.0.0 - All Profiles | Unix | ACCESS CONTROL |