1.1.1.2 Ensure mounting of freevxfs filesystems is disabled | CIS Amazon Linux v2.1.0 L2 | Unix | CONFIGURATION MANAGEMENT |
1.9.2 Ensure 'local timezone' is properly configured | CIS Cisco Firewall v8.x L1 v4.2.0 | Cisco | CONFIGURATION MANAGEMENT |
2.1.8 Ensure Host Name is set | CIS Check Point Firewall L1 v1.1.0 | CheckPoint | CONFIGURATION MANAGEMENT |
2.3.1 - MobileIron - Enable Prevent Move for Sensitive Mail Accounts - EMAIL Configurations | MobileIron - CIS Apple iOS 8 v1.0.0 L2 | MDM | ACCESS CONTROL |
2.3.1 - MobileIron - Enable Prevent Move for Sensitive Mail Accounts - EMAIL Configurations | MobileIron - CIS Apple iOS 9 v1.0.0 L2 | MDM | ACCESS CONTROL |
2.3.1 - MobileIron - Enable Prevent Move for Sensitive Mail Accounts - EXCHANGE Configurations | MobileIron - CIS Apple iOS 8 v1.0.0 L2 | MDM | ACCESS CONTROL |
2.4.2 Disable Internet Sharing | CIS Apple macOS 10.12 L1 v1.2.0 | Unix | CONFIGURATION MANAGEMENT |
2.4.3 Require Binding NTP Service to Loopback Interface - 'NTP/SNTP is bound to loopback' | CIS Cisco IOS 12 L2 v4.0.0 | Cisco | CONFIGURATION MANAGEMENT |
2.4.4 Disable Printer Sharing | CIS Apple macOS 10.13 L1 v1.1.0 | Unix | CONFIGURATION MANAGEMENT |
2.5.1 Disable 'Wake for network access' - Wake for network access | CIS Apple macOS 10.12 L1 v1.2.0 | Unix | ACCESS CONTROL |
2.9 Pair the remote control infrared receiver if enabled - 'DeviceEnabled = 1' | CIS Apple OSX 10.11 El Capitan L1 v1.1.0 | Unix | CONFIGURATION MANAGEMENT |
2.18 Disable Mounting of cramfs Filesystems | CIS Debian Linux 7 L2 v1.0.0 | Unix | CONFIGURATION MANAGEMENT |
2.18 Disable Mounting of cramfs Filesystems | CIS Ubuntu 12.04 LTS Benchmark L2 v1.1.0 | Unix | CONFIGURATION MANAGEMENT |
2.21 Disable Mounting of hfs Filesystems | CIS Debian Linux 7 L2 v1.0.0 | Unix | CONFIGURATION MANAGEMENT |
2.24 Disable Mounting of udf Filesystems | CIS Ubuntu 12.04 LTS Benchmark L2 v1.1.0 | Unix | CONFIGURATION MANAGEMENT |
3.5 Control access to audit records - /var/audit | CIS Apple macOS 10.13 L1 v1.1.0 | Unix | AUDIT AND ACCOUNTABILITY |
4.3 Enable Randomized Virtual Memory Region Placement | CIS Debian Linux 7 L1 v1.0.0 | Unix | SYSTEM AND INFORMATION INTEGRITY |
5.1.1 Secure Home Folders | CIS Apple macOS 10.12 L1 v1.2.0 | Unix | CONFIGURATION MANAGEMENT |
5.1.1 Secure Home Folders | CIS Apple macOS 10.13 L1 v1.1.0 | Unix | CONFIGURATION MANAGEMENT |
6.5 Configure Network Time Protocol (NTP) - NTP package installed | CIS Ubuntu 12.04 LTS Benchmark L1 v1.1.0 | Unix | CONFIGURATION MANAGEMENT |
6.5 Configure Network Time Protocol (NTP) - RUNASUSER=ntp | CIS Ubuntu 12.04 LTS Benchmark L1 v1.1.0 | Unix | CONFIGURATION MANAGEMENT |
7.5 Set "mesg n" as Default for All Users - /etc/.login mesg = n | CIS Solaris 11.2 L1 v1.1.0 | Unix | CONFIGURATION MANAGEMENT |
8.1 Create Warnings for Standard Login Services - etc/issue perms | CIS Solaris 11.1 L1 v1.0.0 | Unix | CONFIGURATION MANAGEMENT |
8.1 Create Warnings for Standard Login Services - etc/issue perms | CIS Solaris 11 L1 v1.1.0 | Unix | CONFIGURATION MANAGEMENT |
8.1 Create Warnings for Standard Login Services - etc/motd perms | CIS Solaris 11.1 L1 v1.0.0 | Unix | CONFIGURATION MANAGEMENT |
8.1 Create Warnings for Standard Login Services - etc/motd perms | CIS Solaris 11 L1 v1.1.0 | Unix | CONFIGURATION MANAGEMENT |
8.2.4 Create and Set Permissions on rsyslog Log Files - /var/log/localmessages | CIS Ubuntu 12.04 LTS Benchmark L1 v1.1.0 | Unix | CONFIGURATION MANAGEMENT |
8.2.4 Create and Set Permissions on rsyslog Log Files - /var/log/news/news.crit | CIS Ubuntu 12.04 LTS Benchmark L1 v1.1.0 | Unix | CONFIGURATION MANAGEMENT |
9.1.3 Set User/Group Owner and Permission on /etc/cron.hourly | CIS Ubuntu 12.04 LTS Benchmark L1 v1.1.0 | Unix | CONFIGURATION MANAGEMENT |
9.1.4 Set User/Group Owner and Permission on /etc/cron.daily | CIS Debian Linux 7 L1 v1.0.0 | Unix | CONFIGURATION MANAGEMENT |
9.1.5 Set User/Group Owner and Permission on /etc/cron.weekly | CIS Ubuntu 12.04 LTS Benchmark L1 v1.1.0 | Unix | CONFIGURATION MANAGEMENT |
9.1.7 Set User/Group Owner and Permission on /etc/cron.d | CIS Debian Linux 7 L1 v1.0.0 | Unix | CONFIGURATION MANAGEMENT |
9.3.4 Disable SSH X11 Forwarding | CIS Ubuntu 12.04 LTS Benchmark L1 v1.1.0 | Unix | CONFIGURATION MANAGEMENT |
9.3.10 Do Not Allow Users to Set Environment Options | CIS Ubuntu 12.04 LTS Benchmark L1 v1.1.0 | Unix | CONFIGURATION MANAGEMENT |
9.4 Verify No Legacy '+' Entries Exist in passwd, shadow, and group Files - Check for group | CIS Solaris 10 L1 v5.2 | Unix | CONFIGURATION MANAGEMENT |
9.7 Check Permissions on User Home Directories | CIS Solaris 11.1 L1 v1.0.0 | Unix | CONFIGURATION MANAGEMENT |
9.12 Check That Users Are Assigned Home Directories | CIS Solaris 11.2 L1 v1.1.0 | Unix | CONFIGURATION MANAGEMENT |
9.14 Check User Home Directory Ownership | CIS Solaris 11.2 L1 v1.1.0 | Unix | CONFIGURATION MANAGEMENT |
11.1 Set Warning Banner for Standard Login Services - /etc/issue permissions | CIS Ubuntu 12.04 LTS Benchmark L1 v1.1.0 | Unix | CONFIGURATION MANAGEMENT |
11.1 Set Warning Banner for Standard Login Services - /etc/issue.net permissions | CIS Debian Linux 7 L1 v1.0.0 | Unix | CONFIGURATION MANAGEMENT |
11.1 Set Warning Banner for Standard Login Services - /etc/motd | CIS Debian Linux 7 L1 v1.0.0 | Unix | CONFIGURATION MANAGEMENT |
11.2 Remove OS Information from Login Warning Banners - /etc/motd | CIS Debian Linux 7 L1 v1.0.0 | Unix | CONFIGURATION MANAGEMENT |
13.9 Check Permissions on User .netrc Files | CIS Ubuntu 12.04 LTS Benchmark L1 v1.1.0 | Unix | CONFIGURATION MANAGEMENT |
IBM i : Force Conversion on Restore (QFRCCVNRST) - '>=3' | IBM System i Security Reference for V7R3 | AS/400 | CONFIGURATION MANAGEMENT |
IBM i : Scan File Systems (QSCANFS) - '*ROOTOPNUD' | IBM System i Security Reference for V7R2 | AS/400 | CONFIGURATION MANAGEMENT |
IBM i : Scan File Systems Control (QSCANFSCTL)- '*NONE' | IBM System i Security Reference for V7R3 | AS/400 | CONFIGURATION MANAGEMENT |
Logs containing auditing information should be secured at the directory level. | TNS IBM HTTP Server Best Practice | Unix | AUDIT AND ACCOUNTABILITY |
OpenStack Compute - strict permissions set for Compute configuration files - /etc/nova/nova.conf | TNS OpenStack Nova/Compute Security Guide | Unix | CONFIGURATION MANAGEMENT |
OpenStack Compute - strict permissions set for Compute configuration files - /etc/nova/policy.json | TNS OpenStack Nova/Compute Security Guide | Unix | CONFIGURATION MANAGEMENT |
OpenStack Identity - strict permissions set for Identity configuration files - /etc/keystone/ssl/private/signing_key.pem | TNS OpenStack Keystone/Identity Security Guide | Unix | CONFIGURATION MANAGEMENT |