Item Search

NameAudit NamePluginCategory
1.6.1.1 Ensure SELinux is enabled in the bootloader configuration - security=selinuxCIS Debian 9 Workstation L2 v1.0.1Unix

ACCESS CONTROL

1.6.1.2 Ensure the SELinux state is enforcing - /etc/selinux/configCIS Aliyun Linux 2 L2 v1.0.0Unix

ACCESS CONTROL

1.6.1.3 Ensure SELinux policy is configuredCIS Ubuntu Linux 14.04 LTS Workstation L2 v2.1.0Unix

ACCESS CONTROL

1.6.1.3 Ensure SELinux policy is configuredCIS CentOS 6 Workstation L1 v3.0.0Unix

ACCESS CONTROL

1.6.1.3 Ensure SELinux policy is configuredCIS Debian 9 Server L2 v1.0.1Unix

ACCESS CONTROL

1.6.1.3 Ensure SELinux policy is configured - 'SELINUXTYPE'CIS Ubuntu Linux 14.04 LTS Workstation L2 v2.1.0Unix

ACCESS CONTROL

1.6.1.3 Ensure SELinux policy is configured - /etc/selinux/configCIS Aliyun Linux 2 L2 v1.0.0Unix

ACCESS CONTROL

1.6.1.4 Ensure no unconfined daemons existCIS Debian 9 Server L2 v1.0.1Unix

ACCESS CONTROL

1.6.1.4 Ensure no unconfined daemons existCIS Debian 9 Workstation L2 v1.0.1Unix

ACCESS CONTROL

1.6.2.1 Ensure SELinux is not disabled in bootloader configuration - selinux=0CIS Distribution Independent Linux Workstation L2 v2.0.0Unix

ACCESS CONTROL

1.6.2.2 Ensure all AppArmor Profiles are enforcing - complain modeCIS Debian 9 Workstation L2 v1.0.1Unix

ACCESS CONTROL

1.6.2.2 Ensure all AppArmor Profiles are enforcing - profiles loadedCIS Debian 9 Workstation L2 v1.0.1Unix

ACCESS CONTROL

1.7.1.2 Ensure AppArmor is enabled in the bootloader configuration - apparmor=1CIS Debian Family Server L1 v1.0.0Unix

ACCESS CONTROL

1.7.1.3 Ensure all AppArmor Profiles are in enforce or complain mode - 0 processes are unconfinedCIS Debian Family Workstation L1 v1.0.0Unix

ACCESS CONTROL

1.7.1.3 Ensure all AppArmor Profiles are in enforce or complain mode - profiles loadedCIS Debian Family Server L1 v1.0.0Unix

ACCESS CONTROL

1.7.1.4 Ensure all AppArmor Profiles are enforcing - complain modeCIS Debian Family Workstation L2 v1.0.0Unix

ACCESS CONTROL

1.7.1.4 Ensure all AppArmor Profiles are enforcing - profiles loadedCIS Debian Family Server L2 v1.0.0Unix

ACCESS CONTROL

1.7.1.4 Ensure all AppArmor Profiles are enforcing - profiles loadedCIS Debian Family Workstation L2 v1.0.0Unix

ACCESS CONTROL

1.7.1.4 Ensure the SELinux mode is enforcing or permissive - /etc/selinux/configCIS Fedora 19 Family Linux Server L1 v1.0.0Unix

ACCESS CONTROL

1.7.1.4 Ensure the SELinux mode is enforcing or permissive - getenforceCIS Fedora 19 Family Linux Workstation L1 v1.0.0Unix

ACCESS CONTROL

1.8.1.5 Ensure permissions on /etc/issue are configuredCIS Fedora 19 Family Linux Server L1 v1.0.0Unix

ACCESS CONTROL

2.3 Set umask value for DB2 admin user .profile fileCIS IBM DB2 v10 v1.1.0 Linux OS Level 1Unix

ACCESS CONTROL

4.4 Ensure logrotate assigns appropriate permissionsCIS Debian Family Workstation L1 v1.0.0Unix

ACCESS CONTROL

4.5 Activate AppArmor - '0 processes unconfined'CIS Ubuntu 12.04 LTS Benchmark L2 v1.1.0Unix

ACCESS CONTROL

4.5 Activate AppArmor - GRUB_CMDLINE_LINUX - 0 processes are unconfirmedCIS Debian Linux 7 L2 v1.0.0Unix

ACCESS CONTROL

4.5 Activate AppArmor - GRUB_CMDLINE_LINUX - 0 profiles are in complain modeCIS Debian Linux 7 L2 v1.0.0Unix

ACCESS CONTROL

5.1 Do not disable AppArmor ProfileCIS Docker 1.13.0 v1.0.0 L1 DockerUnix

ACCESS CONTROL

5.1 Use secure RealmsCIS Apache Tomcat 8 L2 v1.1.0Unix

ACCESS CONTROL

5.1.2 Ensure permissions on /etc/crontab are configuredCIS Fedora 19 Family Linux Server L1 v1.0.0Unix

ACCESS CONTROL

5.1.7 Ensure permissions on /etc/cron.d are configuredCIS Fedora 19 Family Linux Server L1 v1.0.0Unix

ACCESS CONTROL

5.2 Verify SELinux security options, if applicableCIS Docker 1.11.0 v1.0.0 L2 DockerUnix

ACCESS CONTROL

5.2 Verify SELinux security options, if applicableCIS Docker 1.13.0 v1.0.0 L2 DockerUnix

ACCESS CONTROL

5.2.1 Ensure permissions on /etc/ssh/sshd_config are configuredCIS Fedora 19 Family Linux Server L1 v1.0.0Unix

ACCESS CONTROL

5.3 Reduce the sudo timeout periodCIS Apple macOS 10.13 L1 v1.1.0Unix

ACCESS CONTROL

5.3 Reduce the sudo timeout periodCIS Apple OSX 10.9 L1 v1.3.0Unix

ACCESS CONTROL

5.3.2 Ensure permissions on SSH private host key files are configuredCIS CentOS 6 Server L1 v3.0.0Unix

ACCESS CONTROL

5.3.2 Ensure permissions on SSH private host key files are configuredCIS CentOS 6 Workstation L1 v3.0.0Unix

ACCESS CONTROL

6.1.1 Audit system file permissionsCIS Aliyun Linux 2 L2 v1.0.0Unix

ACCESS CONTROL

6.1.1 Audit system file permissionsCIS Debian 9 Workstation L2 v1.0.1Unix

ACCESS CONTROL

6.1.2 Ensure permissions on /etc/passwd are configuredCIS Fedora 19 Family Linux Server L1 v1.0.0Unix

ACCESS CONTROL

6.1.8 Ensure permissions on /etc/group- are configuredCIS Fedora 19 Family Linux Server L1 v1.0.0Unix

ACCESS CONTROL

6.1.10 Ensure no world writable files existCIS Debian Family Server L1 v1.0.0Unix

ACCESS CONTROL

6.2.9 Ensure users own their home directoriesCIS Aliyun Linux 2 L1 v1.0.0Unix

ACCESS CONTROL

6.2.17 Ensure shadow group is emptyCIS Debian Family Server L1 v1.0.0Unix

ACCESS CONTROL

7.6 Ensure directory in logging.properties is a secure location - check application log directory is secureCIS Apache Tomcat 9 L1 v1.2.0 MiddlewareUnix

ACCESS CONTROL

10.3 Ensure the named_t Process Type is Not in Permissive ModeCIS BIND DNS v1.0.0 L2 Caching Only Name ServerUnix

ACCESS CONTROL

20.47 Ensure 'Permissions for program file directories must conform to minimum requirements'CIS Microsoft Windows Server 2019 STIG v3.0.0 STIG DCWindows

ACCESS CONTROL

20.47 Ensure 'Permissions for program file directories must conform to minimum requirements'CIS Microsoft Windows Server 2016 STIG v3.0.0 STIG MSWindows

ACCESS CONTROL

IBM i : Use Adopted Authority (QUSEADPAUT) - AUTH_LIST_NAMEIBM System i Security Reference for V7R2AS/400

ACCESS CONTROL

IBM i : Use Adopted Authority (QUSEADPAUT) - AUTH_LIST_NAMEIBM System i Security Reference for V7R3AS/400

ACCESS CONTROL