Item Search

NameAudit NamePluginCategory
1.1.3 Ensure nodev option set on /tmp partitionCIS SUSE Linux Enterprise Workstation 11 L1 v2.1.1Unix

ACCESS CONTROL

1.1.3 Ensure nodev option set on /tmp partitionCIS SUSE Linux Enterprise Server 11 L1 v2.1.1Unix

ACCESS CONTROL

1.5.1 Ensure core dumps are restricted - fs.suid_dumpableCIS SUSE Linux Enterprise Server 11 L1 v2.1.1Unix

ACCESS CONTROL

1.6 Only allow trusted users to control Docker daemonCIS Docker 1.12.0 v1.0.0 L1 LinuxUnix

ACCESS CONTROL

2.3.5.1 Ensure 'Domain controller: Allow server operators to schedule tasks' is set to 'Disabled' (DC only)CIS Microsoft Windows Server 2016 STIG v3.0.0 L1 Domain ControllerWindows

ACCESS CONTROL

2.3.10.5 (L1) Ensure 'Network access: Let Everyone permissions apply to anonymous users' is set to 'Disabled'CIS Microsoft Windows Server 2019 Stand-alone v2.0.0 L1 MSWindows

ACCESS CONTROL

2.3.10.9 (L1) Ensure 'Network access: Restrict anonymous access to Named Pipes and Shares' is set to 'Enabled'CIS Microsoft Windows Server 2019 Stand-alone v2.0.0 L1 MSWindows

ACCESS CONTROL

2.3.10.10 (L1) Ensure 'Network access: Restrict clients allowed to make remote calls to SAM' is set to 'Administrators: Remote Access: Allow'CIS Microsoft Windows Server 2019 Stand-alone v2.0.0 L1 MSWindows

ACCESS CONTROL

2.3.17.2 (L1) Ensure 'User Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode' is set to 'Prompt for consent on the secure desktop' or higherCIS Microsoft Windows Server 2019 Stand-alone v2.0.0 L1 MSWindows

ACCESS CONTROL

2.3.17.2 Ensure 'User Account Control: Allow UIAccess applications to prompt for elevation without using the secure desktop' is set to 'Disabled' (STIG only)CIS Microsoft Windows Server 2016 STIG v3.0.0 STIG DCWindows

ACCESS CONTROL

2.3.17.3 (L1) Ensure 'User Account Control: Behavior of the elevation prompt for standard users' is set to 'Automatically deny elevation requests'CIS Microsoft Windows Server 2019 Stand-alone v2.0.0 L1 MSWindows

ACCESS CONTROL

2.3.17.4 Ensure 'User Account Control: Behavior of the elevation prompt for standard users' is set to 'Automatically deny elevation requests'CIS Microsoft Windows Server 2016 STIG v3.0.0 L1 Domain ControllerWindows

ACCESS CONTROL

2.3.17.8 Ensure 'User Account Control: Switch to the secure desktop when prompting for elevation' is set to 'Enabled'CIS Microsoft Windows Server 2016 STIG v3.0.0 L1 Domain ControllerWindows

ACCESS CONTROL

3.1 Restrict Core Dumps to Protected Directory - global core dump logging = enabledCIS Solaris 11.1 L1 v1.0.0Unix

ACCESS CONTROL

3.1 Restrict Core Dumps to Protected Directory - global core dump logging = enabledCIS Solaris 11.2 L1 v1.1.0Unix

ACCESS CONTROL

3.1 Restrict Core Dumps to Protected Directory - global core dumps = enabledCIS Solaris 11 L1 v1.1.0Unix

ACCESS CONTROL

3.1 Restrict Core Dumps to Protected Directory - global core file contentCIS Solaris 11.2 L1 v1.1.0Unix

ACCESS CONTROL

3.1 Restrict Core Dumps to Protected Directory - init core file contentCIS Solaris 11 L1 v1.1.0Unix

ACCESS CONTROL

3.2 Restrict Core Dumps to Protected Directory - Check if COREADM_PROC_SETID_ENABLED is set to noCIS Solaris 10 L1 v5.2Unix

ACCESS CONTROL

3.5 Review User-Defined RolesCIS MongoDB Database Audit L2 v1.0.0MongoDB

ACCESS CONTROL

3.6 Review Superuser/Admin Roles - userAdminCIS MongoDB Database Audit L2 v1.0.0MongoDB

ACCESS CONTROL

4.6 Ensure only authorized users and groups belong to the esxAdminsGroup groupCIS VMware ESXi 6.7 v1.3.0 Level 1VMware

ACCESS CONTROL

5.2 Restrict Set-UID on User Mounted Devices - Check if nosuid option is set in /etc/rmmount.conf.CIS Solaris 10 L1 v5.2Unix

ACCESS CONTROL

5.4 Do not use privileged containersCIS Docker 1.12.0 v1.0.0 L1 DockerUnix

ACCESS CONTROL

6.1.1 Display login window as name and passwordCIS Apple macOS 10.13 L1 v1.1.0Unix

ACCESS CONTROL

8.2.6 Prevent unauthorized removal and modification of devices.CIS VMware ESXi 5.5 v1.2.0 Level 1VMware

ACCESS CONTROL

8.2.6 Prevent unauthorized removal, connection, and modification of devicesCIS VMware ESXi 5.1 v1.0.1 Level 1VMware

ACCESS CONTROL

9.1 Check for Remote ConsolesCIS Solaris 11 L1 v1.1.0Unix

ACCESS CONTROL

9.4 Restrict root Login to System Console - ReviewCIS Ubuntu 12.04 LTS Benchmark L1 v1.1.0Unix

ACCESS CONTROL

9.5 Restrict Access to the su Command - '/etc/pam.d/su contents'CIS Ubuntu 12.04 LTS Benchmark L1 v1.1.0Unix

ACCESS CONTROL

10.3 Restrict access to power management functions - PMCHANGEPERMCIS Solaris 10 L2 v5.2Unix

ACCESS CONTROL

10.4 Restrict access to sys-suspend featureCIS Solaris 10 L2 v5.2Unix

ACCESS CONTROL

18.7.10 (L1) Ensure 'Point and Print Restrictions: When installing drivers for a new connection' is set to 'Enabled: Show warning and elevation prompt'CIS Microsoft Windows Server 2019 Stand-alone v2.0.0 L1 MSWindows

ACCESS CONTROL

18.7.10 Ensure 'Point and Print Restrictions: When installing drivers for a new connection' is set to 'Enabled: Show warning and elevation prompt'CIS Microsoft Windows Server 2016 STIG v3.0.0 L1 Domain ControllerWindows

ACCESS CONTROL

18.9.16.2 (L1) Ensure 'Enumerate administrator accounts on elevation' is set to 'Disabled'CIS Azure Compute Microsoft Windows Server 2019 v1.0.0 L1 DCWindows

ACCESS CONTROL

18.9.28.2 Ensure 'Do not display network selection UI' is set to 'Enabled'CIS Microsoft Windows Server 2016 STIG v3.0.0 L1 Domain ControllerWindows

ACCESS CONTROL

18.10.80.1 (L1) Ensure 'Allow user control over installs' is set to 'Disabled'CIS Microsoft Windows Server 2019 Stand-alone v2.0.0 L1 MSWindows

ACCESS CONTROL

Access Security - SSH - Deny Root loginsJuniper Hardening JunOS 12 Devices ChecklistJuniper

ACCESS CONTROL

Default Authentication RealmTenable Cisco ACICisco_ACI

ACCESS CONTROL

Ensure nodev option set on /dev/shm partitionTenable Cisco Firepower Management Center OS Best Practices AuditUnix

ACCESS CONTROL

Ensure nosuid option set on /var/tmp partitionTenable Cisco Firepower Management Center OS Best Practices AuditUnix

ACCESS CONTROL

ESXi : audit-exception-usersVMWare vSphere 6.0 Hardening GuideVMware

ACCESS CONTROL

ESXi : enable-normal-lockdown-modeVMWare vSphere 6.0 Hardening GuideVMware

ACCESS CONTROL

ESXi : enable-normal-lockdown-modeVMWare vSphere 6.5 Hardening GuideVMware

ACCESS CONTROL

IBM i : Allow Restoring of Security-Sensitive Objects (QALWOBJRST) - '*NONE'IBM System i Security Reference for V7R2AS/400

ACCESS CONTROL

IBM i : Allow Restoring of Security-Sensitive Objects (QALWOBJRST) - '*NONE'IBM System i Security Reference for V7R3AS/400

ACCESS CONTROL

Physical Security - Console Port - Configure the insecure featureJuniper Hardening JunOS 12 Devices ChecklistJuniper

ACCESS CONTROL

User Authentication Security - Limit access to ## SECRET-DATAJuniper Hardening JunOS 12 Devices ChecklistJuniper

ACCESS CONTROL

User Authentication Security - Local Authentication - Limit local accounts to required usersJuniper Hardening JunOS 12 Devices ChecklistJuniper

ACCESS CONTROL

VM : prevent-device-interaction-connectVMWare vSphere 5.X Hardening GuideVMware

ACCESS CONTROL