Item Search

NameAudit NamePluginCategory
1.1.1.1 Ensure mounting of udf filesystems is disabledCIS Google Container-Optimized OS v1.2.0 L2 ServerUnix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

1.1.5 Ensure 'Password Policy' is enabledCIS Cisco ASA 9.x Firewall L1 v1.1.0Cisco

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

1.2.1 Ensure 'Permitted IP Addresses' is set to those necessary for device managementCIS Palo Alto Firewall 10 v1.2.0 L1Palo_Alto

ACCESS CONTROL

1.4.1.3 Ensure known default accounts do not existCIS Cisco ASA 9.x Firewall L1 v1.1.0Cisco

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

2.1 Ensure that IP addresses are mapped to usernames - User ID AgentsCIS Palo Alto Firewall 8 Benchmark L2 v1.0.0Palo_Alto

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

2.2.7 (L1) Ensure 'Back up files and directories' is set to 'Administrators'CIS Microsoft Windows 8.1 v2.4.1 L1 BitlockerWindows

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

2.2.10 (L1) Ensure 'Create a pagefile' is set to 'Administrators'CIS Microsoft Windows 8.1 v2.4.1 L1 BitlockerWindows

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

2.2.12 (L1) Ensure 'Create global objects' is set to 'Administrators, LOCAL SERVICE, NETWORK SERVICE, SERVICE'CIS Microsoft Windows 8.1 v2.4.1 L1 BitlockerWindows

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

2.2.14 (L1) Configure 'Create symbolic links'CIS Microsoft Windows 8.1 v2.4.1 L1 BitlockerWindows

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

2.2.15 (L1) Ensure 'Debug programs' is set to 'Administrators'CIS Microsoft Windows 8.1 v2.4.1 L1 BitlockerWindows

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

2.2.21 (L1) Ensure 'Enable computer and user accounts to be trusted for delegation' is set to 'No One'CIS Microsoft Windows 8.1 v2.4.1 L1 BitlockerWindows

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

2.2.22 (L1) Ensure 'Force shutdown from a remote system' is set to 'Administrators'CIS Microsoft Windows 8.1 v2.4.1 L1 BitlockerWindows

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

2.2.25 (L1) Ensure 'Increase scheduling priority' is set to 'Administrators'CIS Microsoft Windows 8.1 v2.4.1 L1 BitlockerWindows

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

2.2.25 (L1) Ensure 'Increase scheduling priority' is set to 'Administrators' - Window Manager\Window Manager Group'CIS Microsoft Windows 8.1 v2.4.1 L1 BitlockerWindows

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

2.2.26 (L1) Ensure 'Load and unload device drivers' is set to 'Administrators'CIS Microsoft Windows 8.1 v2.4.1 L1 BitlockerWindows

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

2.2.30 (L1) Ensure 'Manage auditing and security log' is set to 'Administrators'CIS Microsoft Windows 8.1 v2.4.1 L1 BitlockerWindows

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

2.3.7.7 (L2) Ensure 'Interactive logon: Number of previous logons to cache (in case domain controller is not available)' is set to '4 or fewer logon(s)'CIS Microsoft Windows 8.1 v2.4.1 L2Windows

ACCESS CONTROL, CONFIGURATION MANAGEMENT

2.6 Ensure that the User-ID service account does not have interactive logon rightsCIS Palo Alto Firewall 8 Benchmark L1 v1.0.0Palo_Alto

ACCESS CONTROL

2.7 Ensure remote access capabilities for the User-ID service account are forbidden.CIS Palo Alto Firewall 8 Benchmark L1 v1.0.0Palo_Alto

ACCESS CONTROL

4.04 init.ora - 'remote_os_roles = FALSE'CIS v1.1.0 Oracle 11g OS L1Unix

ACCESS CONTROL

4.08 init.ora - 'os_roles = FALSE'CIS v1.1.0 Oracle 11g OS L1Unix

ACCESS CONTROL

5.3.9 Collect Login and Logout Events - /var/log/btmpCIS Red Hat Enterprise Linux 5 L2 v2.2.1Unix

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

5.3.9 Collect Login and Logout Events - /var/log/faillogCIS Red Hat Enterprise Linux 5 L2 v2.2.1Unix

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

5.3.10 Collect Session Initiation Information - /var/log/wtmpCIS Red Hat Enterprise Linux 5 L2 v2.2.1Unix

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

5.3.10 Collect Session Initiation Information - /var/run/utmpCIS Red Hat Enterprise Linux 5 L2 v2.2.1Unix

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

5.4.1.1 Ensure password expiration is 365 days or less - login.defsCIS Debian 9 Server L1 v1.0.1Unix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

5.4.1.1 Ensure password expiration is 365 days or less - login.defsCIS Debian 9 Workstation L1 v1.0.1Unix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

5.4.1.1 Ensure password expiration is 365 days or less - usersCIS Debian 9 Workstation L1 v1.0.1Unix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

5.4.1.2 Ensure minimum days between password changes is 7 or more - login.defsCIS Debian 9 Server L1 v1.0.1Unix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

5.4.1.2 Ensure minimum days between password changes is 7 or more - login.defsCIS Debian 9 Workstation L1 v1.0.1Unix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

5.4.1.2 Ensure minimum days between password changes is 7 or more - usersCIS Debian 9 Workstation L1 v1.0.1Unix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

5.4.1.3 Ensure password expiration warning days is 7 or more - login.defsCIS Debian 9 Workstation L1 v1.0.1Unix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

5.4.1.3 Ensure password expiration warning days is 7 or more - usersCIS Debian 9 Server L1 v1.0.1Unix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

5.4.1.3 Ensure password expiration warning days is 7 or more - usersCIS Debian 9 Workstation L1 v1.0.1Unix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

5.4.1.5 Ensure all users last password change date is in the pastCIS Debian 9 Server L1 v1.0.1Unix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

7.2.3 Audit Passwords System Preference SettingCIS Apple macOS 12.0 Monterey v4.0.0 L1Unix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

9.2.4 Verify No Legacy '+' Entries Exist in /etc/group File - + Entries Exist in /etc/group FileCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

Catalina - Configure the System to Notify upon Account Enabled ActionsNIST macOS Catalina v1.5.0 - CNSSI 1253Unix

ACCESS CONTROL

Catalina - FileVault Authorized UsersNIST macOS Catalina v1.5.0 - All ProfilesUnix

ACCESS CONTROL

Catalina - FileVault Authorized UsersNIST macOS Catalina v1.5.0 - 800-53r5 HighUnix

ACCESS CONTROL

CIS Control 16 (16.8(b)) Disable Any Unassociated AccountsCAS Implementation Group 1 Audit FileUnix

ACCESS CONTROL

Monterey - Automatically Remove or Disable Temporary or Emergency User Accounts within 72 HoursNIST macOS Monterey v1.0.0 - 800-53r4 ModerateUnix

ACCESS CONTROL

Monterey - Automatically Remove or Disable Temporary or Emergency User Accounts within 72 HoursNIST macOS Monterey v1.0.0 - 800-53r5 HighUnix

ACCESS CONTROL

Monterey - Configure the System to Notify upon Account Disabled ActionsNIST macOS Monterey v1.0.0 - 800-53r4 ModerateUnix

ACCESS CONTROL

Monterey - Configure the System to Notify upon Account Disabled ActionsNIST macOS Monterey v1.0.0 - All ProfilesUnix

ACCESS CONTROL

Monterey - Configure the System to Notify upon Account Modified ActionsNIST macOS Monterey v1.0.0 - 800-53r4 ModerateUnix

ACCESS CONTROL

Monterey - Employ Automated Mechanisms for Account Management FunctionsNIST macOS Monterey v1.0.0 - 800-53r4 HighUnix

ACCESS CONTROL

Monterey - Employ Automated Mechanisms for Account Management FunctionsNIST macOS Monterey v1.0.0 - 800-53r5 HighUnix

ACCESS CONTROL

Monterey - Employ Automated Mechanisms for Account Management FunctionsNIST macOS Monterey v1.0.0 - 800-53r5 ModerateUnix

ACCESS CONTROL

Monterey - Employ Automated Mechanisms for Account Management FunctionsNIST macOS Monterey v1.0.0 - CNSSI 1253Unix

ACCESS CONTROL