1.1.2.2.4 Ensure noexec option set on /dev/shm partition | CIS Oracle Linux 8 Server L1 v3.0.0 | Unix | ACCESS CONTROL, MEDIA PROTECTION |
1.1.2.3.3 Ensure nosuid option set on /home partition | CIS Oracle Linux 8 Server L1 v3.0.0 | Unix | ACCESS CONTROL, MEDIA PROTECTION |
1.1.2.4.2 Ensure nodev option set on /var partition | CIS Oracle Linux 8 Server L1 v3.0.0 | Unix | ACCESS CONTROL, MEDIA PROTECTION |
1.1.2.5.3 Ensure nosuid option set on /var/tmp partition | CIS Debian Linux 12 v1.1.0 L1 Workstation | Unix | ACCESS CONTROL, MEDIA PROTECTION |
1.1.2.5.4 Ensure noexec option set on /var/tmp partition | CIS Oracle Linux 8 Server L1 v3.0.0 | Unix | ACCESS CONTROL, MEDIA PROTECTION |
1.1.2.6.2 Ensure nodev option set on /var/log partition | CIS Oracle Linux 8 Server L1 v3.0.0 | Unix | ACCESS CONTROL, MEDIA PROTECTION |
1.3.1.1 Ensure AppArmor is installed | CIS Debian Linux 12 v1.1.0 L1 Workstation | Unix | ACCESS CONTROL, MEDIA PROTECTION |
1.6.4 Ensure access to /etc/motd is configured | CIS Debian Linux 12 v1.1.0 L1 Workstation | Unix | ACCESS CONTROL, MEDIA PROTECTION |
1.6.5 Ensure access to /etc/issue is configured | CIS Debian Linux 12 v1.1.0 L1 Workstation | Unix | ACCESS CONTROL, MEDIA PROTECTION |
2.2.3 Ensure that RDS instances are not publicly accessible | CIS Amazon Web Services Foundations v5.0.0 L1 | amazon_aws | ACCESS CONTROL, MEDIA PROTECTION |
2.4.1.6 Ensure permissions on /etc/cron.monthly are configured | CIS Debian Linux 12 v1.1.0 L1 Workstation | Unix | ACCESS CONTROL, MEDIA PROTECTION |
3.5 Ensure 'relay_log_basename' Files Have Appropriate Permissions | CIS Oracle MySQL Community Server 8.4 v1.0.0 L1 OS Linux on Linux | Unix | ACCESS CONTROL, MEDIA PROTECTION |
3.7 Ensure SSL Key Files Have Appropriate Permissions | CIS Oracle MySQL Enterprise Edition 8.4 v1.0.0 L1 MySQL OS Linux | Unix | ACCESS CONTROL, MEDIA PROTECTION |
3.8 Ensure only the default permissions specified by Microsoft are granted to the public server role | CIS Microsoft SQL Server 2019 v1.5.0 L1 AWS RDS | MS_SQLDB | ACCESS CONTROL, MEDIA PROTECTION |
3.8 Ensure Plugin Directory Has Appropriate Permissions | CIS Oracle MySQL Enterprise Edition 8.4 v1.0.0 L1 MySQL OS Linux | Unix | ACCESS CONTROL, MEDIA PROTECTION |
4.1 Restrict access to $CATALINA_HOME | CIS Apache Tomcat 11 v1.0.0 L1 | Unix | ACCESS CONTROL, MEDIA PROTECTION |
4.1 Restrict access to $CATALINA_HOME | CIS Apache Tomcat 10.1 v1.1.0 L1 | Unix | ACCESS CONTROL, MEDIA PROTECTION |
4.1.1.8 Ensure crontab is restricted to authorized users | CIS Oracle Linux 8 Server L1 v3.0.0 | Unix | ACCESS CONTROL, MEDIA PROTECTION |
4.1.2.1 Ensure at is restricted to authorized users | CIS Oracle Linux 8 Server L1 v3.0.0 | Unix | ACCESS CONTROL, MEDIA PROTECTION |
4.1.4 Ensure permissions on /etc/cron.daily are configured | CIS Ubuntu Linux 18.04 LTS v2.2.0 L1 Workstation | Unix | ACCESS CONTROL, MEDIA PROTECTION |
4.2.1 Ensure permissions on /etc/ssh/sshd_config are configured | CIS Ubuntu Linux 18.04 LTS v2.2.0 L1 Workstation | Unix | ACCESS CONTROL, MEDIA PROTECTION |
4.3 Restrict access to Tomcat configuration directory | CIS Apache Tomcat 11 v1.0.0 L1 | Unix | ACCESS CONTROL, MEDIA PROTECTION |
4.3 Restrict access to Tomcat configuration directory | CIS Apache Tomcat 10.1 v1.1.0 L1 | Unix | ACCESS CONTROL, MEDIA PROTECTION |
4.4 Restrict access to Tomcat logs directory | CIS Apache Tomcat 10.1 v1.1.0 L1 | Unix | ACCESS CONTROL, MEDIA PROTECTION |
4.5 Ensure 'mysqld' is Not Started With '--skip-grant-tables' | CIS Oracle MySQL Community Server 8.4 v1.0.0 L1 OS Linux on Linux | Unix | ACCESS CONTROL, MEDIA PROTECTION |
4.5.4 Ensure default user umask is 027 or more restrictive | CIS Ubuntu Linux 18.04 LTS v2.2.0 L1 Workstation | Unix | ACCESS CONTROL, MEDIA PROTECTION |
4.7 Restrict access to Tomcat web application directory | CIS Apache Tomcat 11 v1.0.0 L1 | Unix | ACCESS CONTROL, MEDIA PROTECTION |
4.11 Restrict access to Tomcat logging.properties | CIS Apache Tomcat 11 v1.0.0 L1 | Unix | ACCESS CONTROL, MEDIA PROTECTION |
4.13 Restrict access to Tomcat tomcat-users.xml | CIS Apache Tomcat 10.1 v1.1.0 L1 | Unix | ACCESS CONTROL, MEDIA PROTECTION |
4.14 Restrict access to Tomcat web.xml | CIS Apache Tomcat 11 v1.0.0 L1 | Unix | ACCESS CONTROL, MEDIA PROTECTION |
4.14 Restrict access to Tomcat web.xml | CIS Apache Tomcat 10.1 v1.1.0 L1 | Unix | ACCESS CONTROL, MEDIA PROTECTION |
4.15 Restrict access to jaspic-providers.xml | CIS Apache Tomcat 10.1 v1.1.0 L1 | Unix | ACCESS CONTROL, MEDIA PROTECTION |
5.2.7 Ensure access to the su command is restricted | CIS Debian Linux 12 v1.1.0 L1 Workstation | Unix | ACCESS CONTROL, MEDIA PROTECTION |
5.4.2.7 Ensure system accounts do not have a valid login shell | CIS Debian Linux 12 v1.1.0 L1 Workstation | Unix | ACCESS CONTROL, MEDIA PROTECTION |
6.1.1 Ensure permissions on /etc/passwd are configured | CIS Ubuntu Linux 18.04 LTS v2.2.0 L1 Workstation | Unix | ACCESS CONTROL, MEDIA PROTECTION |
6.1.1 Ensure permissions on /etc/passwd are configured | CIS Debian 10 Workstation L1 v2.0.0 | Unix | ACCESS CONTROL, MEDIA PROTECTION |
6.1.2 Ensure permissions on /etc/passwd- are configured | CIS Debian 10 Workstation L1 v2.0.0 | Unix | ACCESS CONTROL, MEDIA PROTECTION |
6.1.6 Ensure permissions on /etc/shadow- are configured | CIS Ubuntu Linux 18.04 LTS v2.2.0 L1 Workstation | Unix | ACCESS CONTROL, MEDIA PROTECTION |
6.1.7 Ensure permissions on /etc/gshadow are configured | CIS Ubuntu Linux 18.04 LTS v2.2.0 L1 Workstation | Unix | ACCESS CONTROL, MEDIA PROTECTION |
6.1.8 Ensure permissions on /etc/gshadow- are configured | CIS Ubuntu Linux 18.04 LTS v2.2.0 L1 Workstation | Unix | ACCESS CONTROL, MEDIA PROTECTION |
6.1.8 Ensure permissions on /etc/gshadow- are configured | CIS Debian 10 Workstation L1 v2.0.0 | Unix | ACCESS CONTROL, MEDIA PROTECTION |
6.1.11 Ensure world writable files and directories are secured | CIS Debian 10 Workstation L1 v2.0.0 | Unix | ACCESS CONTROL, MEDIA PROTECTION |
6.2.4 Ensure shadow group is empty | CIS Ubuntu Linux 18.04 LTS v2.2.0 L1 Workstation | Unix | ACCESS CONTROL, MEDIA PROTECTION |
6.2.4 Ensure shadow group is empty | CIS Debian 10 Workstation L1 v2.0.0 | Unix | ACCESS CONTROL, MEDIA PROTECTION |
7.1.2 Ensure permissions on /etc/passwd- are configured | CIS Debian Linux 12 v1.1.0 L1 Workstation | Unix | ACCESS CONTROL, MEDIA PROTECTION |
7.1.3 Ensure permissions on /etc/group are configured | CIS Debian Linux 12 v1.1.0 L1 Workstation | Unix | ACCESS CONTROL, MEDIA PROTECTION |
7.1.8 Ensure permissions on /etc/gshadow- are configured | CIS Debian Linux 12 v1.1.0 L1 Workstation | Unix | ACCESS CONTROL, MEDIA PROTECTION |
7.2.4 Ensure shadow group is empty | CIS Debian Linux 12 v1.1.0 L1 Workstation | Unix | ACCESS CONTROL, MEDIA PROTECTION |
7.2.10 Ensure local interactive user dot files access is configured | CIS Debian Linux 12 v1.1.0 L1 Workstation | Unix | ACCESS CONTROL, MEDIA PROTECTION |
8.1 Restrict runtime access to sensitive packages | CIS Apache Tomcat 11 v1.0.0 L1 | Unix | ACCESS CONTROL, MEDIA PROTECTION |