| 1.11 Audit Docker files and directories - docker.socket | CIS Docker 1.11.0 v1.0.0 L1 Linux | Unix | AUDIT AND ACCOUNTABILITY |
| 1.12 Audit Docker files and directories - /etc/default/docker | CIS Docker 1.11.0 v1.0.0 L1 Linux | Unix | AUDIT AND ACCOUNTABILITY |
| 1.12 Audit Docker files and directories - /etc/default/docker | CIS Docker 1.12.0 v1.0.0 L1 Linux | Unix | AUDIT AND ACCOUNTABILITY |
| 1.14 Audit Docker files and directories - /etc/sysconfig/docker | CIS Docker 1.6 v1.0.0 L1 Linux | Unix | AUDIT AND ACCOUNTABILITY |
| 1.18 Audit Docker files and directories - /etc/default/docker | CIS Docker 1.6 v1.0.0 L1 Linux | Unix | AUDIT AND ACCOUNTABILITY |
| 1.98 WN16-CC-000050 | CIS Microsoft Windows Server 2016 STIG v4.0.0 DC CAT III | Windows | CONFIGURATION MANAGEMENT |
| 1.98 WN16-CC-000050 | CIS Microsoft Windows Server 2016 STIG v4.0.0 MS CAT III | Windows | CONFIGURATION MANAGEMENT |
| 1.98 WN19-CC-000040 | CIS Microsoft Windows Server 2019 STIG v4.0.0 MS CAT III | Windows | CONFIGURATION MANAGEMENT |
| 1.98 WN19-CC-000040 | CIS Microsoft Windows Server 2019 STIG v4.0.0 DC CAT III | Windows | CONFIGURATION MANAGEMENT |
| 1.98 WN22-CC-000040 | CIS Microsoft Windows Server 2022 STIG v3.0.0 MS CAT III | Windows | CONFIGURATION MANAGEMENT |
| 1.98 WN22-CC-000040 | CIS Microsoft Windows Server 2022 STIG v3.0.0 DC CAT III | Windows | CONFIGURATION MANAGEMENT |
| 2.3.2 Ensure Screen Saver Corners Are Secure - bottom right corner | CIS Apple macOS 10.14 v2.0.0 L2 | Unix | ACCESS CONTROL |
| 2.3.2 Ensure Screen Saver Corners Are Secure - top left corner | CIS Apple macOS 10.14 v2.0.0 L2 | Unix | ACCESS CONTROL |
| 5.1 Ensure that WildFire file size upload limits are maximized | CIS Palo Alto Firewall 11 v1.2.0 L1 | Palo_Alto | SYSTEM AND INFORMATION INTEGRITY |
| 5.2.10 Ensure number of characters changed in new password is configured | CIS IBM AIX 7 v1.1.0 L1 | Unix | IDENTIFICATION AND AUTHENTICATION |
| 5.003 - Booting into alternate operating systems is permitted. | DISA Windows Vista STIG v6r41 | Windows | CONFIGURATION MANAGEMENT |
| 7.2 Set Strong Password Creation Policies - MINNONALPHA = 1 | CIS Solaris 11.2 L1 v1.1.0 | Unix | IDENTIFICATION AND AUTHENTICATION |
| 7.2 Set Strong Password Creation Policies - DICTIONLIST = /usr/share/lib/dict/words | CIS Solaris 11.1 L1 v1.0.0 | Unix | IDENTIFICATION AND AUTHENTICATION |
| 7.2 Set Strong Password Creation Policies - HISTORY = 10 | CIS Solaris 11.1 L1 v1.0.0 | Unix | IDENTIFICATION AND AUTHENTICATION |
| 7.2 Set Strong Password Creation Policies - MAXREPEATS = 0 | CIS Solaris 11.1 L1 v1.0.0 | Unix | IDENTIFICATION AND AUTHENTICATION |
| 7.2 Set Strong Password Creation Policies - MINUPPER = 1 | CIS Solaris 11.2 L1 v1.1.0 | Unix | IDENTIFICATION AND AUTHENTICATION |
| 7.2 Set Strong Password Creation Policies - NAMECHECK = yes | CIS Solaris 11.2 L1 v1.1.0 | Unix | IDENTIFICATION AND AUTHENTICATION |
| 7.2 Set Strong Password Creation Policies - PASSLENGTH = 8 | CIS Solaris 11.1 L1 v1.0.0 | Unix | IDENTIFICATION AND AUTHENTICATION |
| 89.7 (L1) Ensure 'Create Global Objects' is set to 'Administrators, LOCAL SERVICE, NETWORK SERVICE, SERVICE' | CIS Microsoft Intune for Windows 11 v4.0.0 L1 | Windows | ACCESS CONTROL, AUDIT AND ACCOUNTABILITY |
| 89.7 (L1) Ensure 'Create Global Objects' is set to 'Administrators, LOCAL SERVICE, NETWORK SERVICE, SERVICE' | CIS Microsoft Intune for Windows 10 v4.0.0 L1 | Windows | ACCESS CONTROL, AUDIT AND ACCOUNTABILITY |
| AIOS-13-013100 - Apple iOS/iPadOS must implement the management setting: disable paired Apple Watch. | AirWatch - DISA Apple iOS/iPadOS 13 v2r1 | MDM | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
| AIOS-14-011000 - Apple iOS/iPadOS must implement the management setting: disable paired Apple Watch. | AirWatch - DISA Apple iOS/iPadOS 14 v1r3 | MDM | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
| CIS_Microsoft_Windows_Server_2016_STIG_v4.0.0_DC_CAT_I.audit from CIS Microsoft Windows Server 2016 STIG Benchmark v4.0.0 | CIS Microsoft Windows Server 2016 STIG v4.0.0 DC CAT I | Windows | |
| CIS_Microsoft_Windows_Server_2016_STIG_v4.0.0_MS_CAT_I.audit from CIS Microsoft Windows Server 2016 STIG Benchmark v4.0.0 | CIS Microsoft Windows Server 2016 STIG v4.0.0 MS CAT I | Windows | |
| CIS_Microsoft_Windows_Server_2016_STIG_v4.0.0_MS_CAT_II.audit from CIS Microsoft Windows Server 2016 STIG Benchmark v4.0.0 | CIS Microsoft Windows Server 2016 STIG v4.0.0 MS CAT II | Windows | |
| CIS_Microsoft_Windows_Server_2019_STIG_v4.0.0_DC_CAT_I.audit from CIS Microsoft Windows Server 2019 STIG Benchmark v4.0.0 | CIS Microsoft Windows Server 2019 STIG v4.0.0 DC CAT I | Windows | |
| CIS_Microsoft_Windows_Server_2019_STIG_v4.0.0_DC_CAT_II.audit from CIS Microsoft Windows Server 2019 STIG Benchmark v4.0.0 | CIS Microsoft Windows Server 2019 STIG v4.0.0 DC CAT II | Windows | |
| CIS_Microsoft_Windows_Server_2019_STIG_v4.0.0_MS_CAT_II.audit from CIS Microsoft Windows Server 2019 STIG Benchmark v4.0.0 | CIS Microsoft Windows Server 2019 STIG v4.0.0 MS CAT II | Windows | |
| CIS_Microsoft_Windows_Server_2022_STIG_v3.0.0_DC_CAT_I.audit from CIS Microsoft Windows Server 2022 STIG Benchmark v3.0.0 | CIS Microsoft Windows Server 2022 STIG v3.0.0 DC CAT I | Windows | |
| CIS_Microsoft_Windows_Server_2022_STIG_v3.0.0_MS_CAT_I.audit from CIS Microsoft Windows Server 2022 STIG Benchmark v3.0.0 | CIS Microsoft Windows Server 2022 STIG v3.0.0 MS CAT I | Windows | |
| CISC-ND-001450 - The Cisco switch must be configured to send log data to at least two central log servers for the purpose of forwarding alerts to the administrators and the information system security officer (ISSO). | DISA Cisco NX OS Switch NDM STIG v3r6 | Cisco | AUDIT AND ACCOUNTABILITY |
| Do not allow drive redirection | MSCT Windows Server v1909 MS v1.0.0 | Windows | CONFIGURATION MANAGEMENT |
| Do not allow drive redirection | MSCT Windows Server v2004 DC v1.0.0 | Windows | CONFIGURATION MANAGEMENT |
| Do not allow drive redirection | MSCT Windows Server 2016 MS v1.0.0 | Windows | CONFIGURATION MANAGEMENT |
| Do not allow drive redirection | MSCT Windows Server 2019 MS v1.0.0 | Windows | CONFIGURATION MANAGEMENT |
| ESXI-65-000034 - The ESXi host must disable the Managed Object Browser (MOB). | DISA STIG VMware vSphere ESXi 6.5 v2r4 | VMware | CONFIGURATION MANAGEMENT |
| OS10-L2S-000190 - The Dell OS10 Switch must enable Far-End Failure Detection (FEFD) to protect against one-way connections. | DISA Dell OS10 Switch Layer 2 Switch STIG v1r1 | Dell_OS10 | CONFIGURATION MANAGEMENT |
| WN16-CC-000040 - Internet Protocol version 6 (IPv6) source routing must be configured to the highest protection level to prevent IP source routing. | DISA Microsoft Windows Server 2016 STIG v2r10 | Windows | CONFIGURATION MANAGEMENT |
| WN16-CC-000050 - Source routing must be configured to the highest protection level to prevent Internet Protocol (IP) source routing. | DISA Microsoft Windows Server 2016 STIG v2r10 | Windows | CONFIGURATION MANAGEMENT |
| WN19-CC-000030 - Windows Server 2019 Internet Protocol version 6 (IPv6) source routing must be configured to the highest protection level to prevent IP source routing. | DISA Microsoft Windows Server 2019 STIG v3r8 | Windows | CONFIGURATION MANAGEMENT |
| WN19-CC-000040 - Windows Server 2019 source routing must be configured to the highest protection level to prevent Internet Protocol (IP) source routing. | DISA Microsoft Windows Server 2019 STIG v3r8 | Windows | CONFIGURATION MANAGEMENT |
| WN22-CC-000030 - Windows Server 2022 Internet Protocol version 6 (IPv6) source routing must be configured to the highest protection level to prevent IP source routing. | DISA Microsoft Windows Server 2022 STIG v2r8 | Windows | CONFIGURATION MANAGEMENT |
| WN22-CC-000040 - Windows Server 2022 source routing must be configured to the highest protection level to prevent Internet Protocol (IP) source routing. | DISA Microsoft Windows Server 2022 STIG v2r8 | Windows | CONFIGURATION MANAGEMENT |
| WN25-CC-000030 - Windows Server 2025 Internet Protocol version 6 (IPv6) source routing must be configured to the highest protection level to prevent IP source routing. | DISA Microsoft Windows Server 2025 STIG v1r1 | Windows | CONFIGURATION MANAGEMENT |
| WN25-CC-000040 - Windows Server 2025 source routing must be configured to the highest protection level to prevent Internet Protocol (IP) source routing. | DISA Microsoft Windows Server 2025 STIG v1r1 | Windows | CONFIGURATION MANAGEMENT |