Item Search

NameAudit NamePluginCategory
1.3.6 Apply Security Context to Your Pods and ContainersCIS Kubernetes 1.7.0 Benchmark v1.1.0 L2Unix
1.3.6 Apply Security Context to Your Pods and ContainersCIS Kubernetes 1.8 Benchmark v1.2.0 L2Unix
1.6.6 Apply Security Context to Your Pods and ContainersCIS Kubernetes 1.7.0 Benchmark v1.1.0 L2Unix
1.6.6 Apply Security Context to Your Pods and ContainersCIS Kubernetes 1.8 Benchmark v1.2.0 L2Unix
2.1.1 Backup Policy in PlaceCIS MariaDB 10.6 Database L1 v1.1.0MySQLDB

CONTINGENCY PLANNING

2.3.7.10 Ensure 'Interactive logon: Smart card removal behavior' is set to 'Lock Workstation' or 'Force Logoff' (STIG DC & MS only)CIS Microsoft Windows Server 2022 STIG v2.0.0 STIG MSWindows

ACCESS CONTROL

2.3.7.10 Ensure 'Interactive logon: Smart card removal behavior' is set to 'Lock Workstation' or 'Force Logoff' (STIG DC & MS only)CIS Microsoft Windows Server 2022 STIG v2.0.0 STIG DCWindows

ACCESS CONTROL

2.3.7.10 Ensure 'Interactive logon: Smart card removal behavior' is set to 'Lock Workstation' or 'Force Logoff' (STIG DC & MS only)CIS Microsoft Windows Server 2019 STIG v3.0.0 STIG DCWindows

ACCESS CONTROL

2.3.7.10 Ensure 'Interactive logon: Smart card removal behavior' is set to 'Lock Workstation' or 'Force Logoff' (STIG only)CIS Microsoft Windows Server 2016 STIG v3.0.0 STIG DCWindows

ACCESS CONTROL

2.3.7.10 Ensure 'Interactive logon: Smart card removal behavior' is set to 'Lock Workstation' or 'Force Logoff' (STIG only)CIS Microsoft Windows Server 2016 STIG v3.0.0 STIG MSWindows

ACCESS CONTROL

4.1 Configure 'URL to be displayed for updates:'CIS IE 10 v1.1.0Windows

SYSTEM AND INFORMATION INTEGRITY

4.1 Ensure a non-root user account exists for local admin accessCIS VMware ESXi 6.5 v1.0.0 Level 1 Bare MetalUnix

ACCESS CONTROL

4.1 Ensure a non-root user account exists for local admin accessCIS VMware ESXi 6.7 v1.3.0 Level 1 Bare MetalUnix

ACCESS CONTROL

5.1 (L1) Ensure 'Print Spooler (Spooler)' is set to 'Disabled' (DC only)CIS Microsoft Windows Server 2016 v3.0.0 L1 DCWindows

CONFIGURATION MANAGEMENT

5.1 (L1) Ensure 'Print Spooler (Spooler)' is set to 'Disabled' (DC only)CIS Windows Server 2012 R2 DC L1 v3.0.0Windows

CONFIGURATION MANAGEMENT

5.1 (L1) Host firewall must only allow traffic from authorized networksCIS VMware ESXi 8.0 v1.1.0 L1VMware

SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION

5.1 Ensure login via 'local' UNIX Domain Socket is configured correctlyCIS PostgreSQL 9.6 OS v1.0.0Unix

IDENTIFICATION AND AUTHENTICATION

5.1 Ensure login via 'local' UNIX Domain Socket is configured correctlyCIS PostgreSQL 10 OS v1.0.0Unix

IDENTIFICATION AND AUTHENTICATION

5.7 Ensure 'GRANT OPTION' is Not Granted to Non-Administrative UsersCIS MySQL 5.6 Community Database L1 v2.0.0MySQLDB

ACCESS CONTROL

5.7 Ensure 'GRANT OPTION' is Not Granted to Non-Administrative UsersCIS MySQL 5.7 Enterprise Database L1 v2.0.0MySQLDB

ACCESS CONTROL

5.7.3 Apply Security Context to Your Pods and ContainersCIS Kubernetes v1.10.0 L2 MasterUnix

CONFIGURATION MANAGEMENT

5.7.3 Apply Security Context to Your Pods and ContainersCIS Red Hat OpenShift Container Platform v1.7.0 L2OpenShift

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

6.1.3 Ensure That the 'Local_infile' Database Flag for a Cloud SQL MySQL Instance Is Set to 'Off'CIS Google Cloud Platform v3.0.0 L1GCP

CONFIGURATION MANAGEMENT

6.3 Ensure 'log_error_verbosity' is Set to '2'CIS Oracle MySQL Enterprise Edition 8.0 v1.4.0 L2 DatabaseMySQLDB

AUDIT AND ACCOUNTABILITY

6.8 Ensure the Audit Plugin Can't be UnloadedCIS MySQL 5.7 Enterprise Database L1 v2.0.0MySQLDB

AUDIT AND ACCOUNTABILITY

6.11 Ensure the Audit Plugin Can't be UnloadedCIS MySQL 5.6 Enterprise Database L1 v2.0.0MySQLDB

AUDIT AND ACCOUNTABILITY

6.30 Ensure RDS Database is not publically accessibleCIS Amazon Web Services Three-tier Web Architecture L2 1.0.0amazon_aws

SYSTEM AND COMMUNICATIONS PROTECTION

6.34 Ensure RDS Database is configured to use the Data Tier Security GroupCIS Amazon Web Services Three-tier Web Architecture L1 1.0.0amazon_aws

ACCESS CONTROL

7.6 Ensure No Users Have Wildcard HostnamesCIS MySQL 8.4 Enterprise v1.0.0 L1 DatabaseMySQLDB

ACCESS CONTROL, MEDIA PROTECTION

7.6 Ensure No Users Have Wildcard HostnamesCIS Oracle MySQL Community Server 8.4 v1.0.0 L1 DatabaseMySQLDB

ACCESS CONTROL, MEDIA PROTECTION

7.6 Ensure No Users Have Wildcard HostnamesCIS Oracle MySQL Enterprise Edition 8.0 v1.4.0 L1 DatabaseMySQLDB

ACCESS CONTROL, MEDIA PROTECTION

7.7 Ensure No Users Have Wildcard HostnamesCIS MySQL 5.6 Community Database L1 v2.0.0MySQLDB

ACCESS CONTROL, MEDIA PROTECTION

7.7 Ensure No Users Have Wildcard HostnamesCIS MySQL 5.7 Community Database L1 v2.0.0MySQLDB

ACCESS CONTROL, MEDIA PROTECTION

7.7 Ensure No Users Have Wildcard HostnamesCIS MySQL 5.7 Enterprise Database L1 v2.0.0MySQLDB

ACCESS CONTROL, MEDIA PROTECTION

7.7 Ensure No Users Have Wildcard HostnamesCIS MySQL 5.6 Enterprise Database L1 v2.0.0MySQLDB

ACCESS CONTROL, MEDIA PROTECTION

8.1 Ensure 'require_secure_transport' is Set to 'ON' and/or 'have_ssl' is Set to 'YES'CIS MySQL 8.4 Enterprise v1.0.0 L1 DatabaseMySQLDB

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

8.1 Ensure 'require_secure_transport' is Set to 'ON' and/or 'have_ssl' is Set to 'YES'CIS Oracle MySQL Enterprise Edition 8.0 v1.4.0 L1 DatabaseMySQLDB

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

8.1 Ensure 'require_secure_transport' is Set to 'ON' and/or 'have_ssl' is Set to 'YES'CIS MySQL 5.7 Enterprise Database L1 v2.0.0MySQLDB

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

8.2 Ensure 'ssl_type' is Set to 'ANY', 'X509', or 'SPECIFIED' for All Remote UsersCIS Oracle MySQL Community Server 8.4 v1.0.0 L1 DatabaseMySQLDB

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

8.2 Ensure 'ssl_type' is Set to 'ANY', 'X509', or 'SPECIFIED' for All Remote UsersCIS MySQL 8.4 Enterprise v1.0.0 L1 DatabaseMySQLDB

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

8.2 Ensure 'ssl_type' is Set to 'ANY', 'X509', or 'SPECIFIED' for All Remote UsersCIS MySQL 8.0 Community Database L1 v1.1.0MySQLDB

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

9.5 Ensure No Replication Users Have Wildcard HostnamesCIS MySQL 5.6 Community Database L1 v2.0.0MySQLDB

ACCESS CONTROL

9.5 Ensure No Replication Users Have Wildcard HostnamesCIS MySQL 5.7 Community Database L1 v2.0.0MySQLDB

ACCESS CONTROL

9.5 Ensure No Replication Users Have Wildcard HostnamesCIS MySQL 5.7 Enterprise Database L1 v2.0.0MySQLDB

ACCESS CONTROL

20.13 (L1) Ensure 'Web browser is supported and secured'CIS Microsoft Windows 10 EMS Gateway v3.0.0 L1Windows

CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

DG0101-ORACLE11 - OS accounts used to execute external procedures should be assigned minimum privileges.DISA STIG Oracle 11 Installation v9r1 LinuxUnix
DTOO139 - The Save commands default file format must be configured.DISA STIG Microsoft Word 2016 v1r1Windows

CONFIGURATION MANAGEMENT

MYS8-00-007300 - The MySQL Database Server 8.0 must check the validity of all data inputs except those specifically identified by the organization.DISA Oracle MySQL 8.0 v2r2 DBMySQLDB

SYSTEM AND INFORMATION INTEGRITY

MYS8-00-011000 - The MySQL Database Server 8.0 must associate organization-defined types of security labels having organization-defined security label values with information in transmission.DISA Oracle MySQL 8.0 v2r2 DBMySQLDB

ACCESS CONTROL

VM : disable-intervm-vmciVMWare vSphere 5.X Hardening GuideVMware

SYSTEM AND COMMUNICATIONS PROTECTION