1.6.1.1 Ensure SELinux is enabled in the bootloader configuration - security=selinux | CIS Debian 9 Workstation L2 v1.0.1 | Unix | ACCESS CONTROL |
1.6.1.2 Ensure the SELinux state is enforcing - /etc/selinux/config | CIS Aliyun Linux 2 L2 v1.0.0 | Unix | ACCESS CONTROL |
1.6.1.3 Ensure SELinux policy is configured | CIS Ubuntu Linux 14.04 LTS Workstation L2 v2.1.0 | Unix | ACCESS CONTROL |
1.6.1.3 Ensure SELinux policy is configured | CIS CentOS 6 Workstation L1 v3.0.0 | Unix | ACCESS CONTROL |
1.6.1.3 Ensure SELinux policy is configured | CIS Debian 9 Server L2 v1.0.1 | Unix | ACCESS CONTROL |
1.6.1.3 Ensure SELinux policy is configured - 'SELINUXTYPE' | CIS Ubuntu Linux 14.04 LTS Workstation L2 v2.1.0 | Unix | ACCESS CONTROL |
1.6.1.3 Ensure SELinux policy is configured - /etc/selinux/config | CIS Aliyun Linux 2 L2 v1.0.0 | Unix | ACCESS CONTROL |
1.6.1.4 Ensure no unconfined daemons exist | CIS Debian 9 Server L2 v1.0.1 | Unix | ACCESS CONTROL |
1.6.1.4 Ensure no unconfined daemons exist | CIS Debian 9 Workstation L2 v1.0.1 | Unix | ACCESS CONTROL |
1.6.2.1 Ensure SELinux is not disabled in bootloader configuration - selinux=0 | CIS Distribution Independent Linux Workstation L2 v2.0.0 | Unix | ACCESS CONTROL |
1.6.2.2 Ensure all AppArmor Profiles are enforcing - complain mode | CIS Debian 9 Workstation L2 v1.0.1 | Unix | ACCESS CONTROL |
1.6.2.2 Ensure all AppArmor Profiles are enforcing - profiles loaded | CIS Debian 9 Workstation L2 v1.0.1 | Unix | ACCESS CONTROL |
1.7.1.2 Ensure AppArmor is enabled in the bootloader configuration - apparmor=1 | CIS Debian Family Server L1 v1.0.0 | Unix | ACCESS CONTROL |
1.7.1.3 Ensure all AppArmor Profiles are in enforce or complain mode - 0 processes are unconfined | CIS Debian Family Workstation L1 v1.0.0 | Unix | ACCESS CONTROL |
1.7.1.3 Ensure all AppArmor Profiles are in enforce or complain mode - profiles loaded | CIS Debian Family Server L1 v1.0.0 | Unix | ACCESS CONTROL |
1.7.1.4 Ensure all AppArmor Profiles are enforcing - complain mode | CIS Debian Family Workstation L2 v1.0.0 | Unix | ACCESS CONTROL |
1.7.1.4 Ensure all AppArmor Profiles are enforcing - profiles loaded | CIS Debian Family Server L2 v1.0.0 | Unix | ACCESS CONTROL |
1.7.1.4 Ensure all AppArmor Profiles are enforcing - profiles loaded | CIS Debian Family Workstation L2 v1.0.0 | Unix | ACCESS CONTROL |
1.7.1.4 Ensure the SELinux mode is enforcing or permissive - /etc/selinux/config | CIS Fedora 19 Family Linux Server L1 v1.0.0 | Unix | ACCESS CONTROL |
1.7.1.4 Ensure the SELinux mode is enforcing or permissive - getenforce | CIS Fedora 19 Family Linux Workstation L1 v1.0.0 | Unix | ACCESS CONTROL |
1.8.1.5 Ensure permissions on /etc/issue are configured | CIS Fedora 19 Family Linux Server L1 v1.0.0 | Unix | ACCESS CONTROL |
2.3 Set umask value for DB2 admin user .profile file | CIS IBM DB2 v10 v1.1.0 Linux OS Level 1 | Unix | ACCESS CONTROL |
4.4 Ensure logrotate assigns appropriate permissions | CIS Debian Family Workstation L1 v1.0.0 | Unix | ACCESS CONTROL |
4.5 Activate AppArmor - '0 processes unconfined' | CIS Ubuntu 12.04 LTS Benchmark L2 v1.1.0 | Unix | ACCESS CONTROL |
4.5 Activate AppArmor - GRUB_CMDLINE_LINUX - 0 processes are unconfirmed | CIS Debian Linux 7 L2 v1.0.0 | Unix | ACCESS CONTROL |
4.5 Activate AppArmor - GRUB_CMDLINE_LINUX - 0 profiles are in complain mode | CIS Debian Linux 7 L2 v1.0.0 | Unix | ACCESS CONTROL |
5.1 Do not disable AppArmor Profile | CIS Docker 1.13.0 v1.0.0 L1 Docker | Unix | ACCESS CONTROL |
5.1 Use secure Realms | CIS Apache Tomcat 8 L2 v1.1.0 | Unix | ACCESS CONTROL |
5.1.2 Ensure permissions on /etc/crontab are configured | CIS Fedora 19 Family Linux Server L1 v1.0.0 | Unix | ACCESS CONTROL |
5.1.7 Ensure permissions on /etc/cron.d are configured | CIS Fedora 19 Family Linux Server L1 v1.0.0 | Unix | ACCESS CONTROL |
5.2 Verify SELinux security options, if applicable | CIS Docker 1.11.0 v1.0.0 L2 Docker | Unix | ACCESS CONTROL |
5.2 Verify SELinux security options, if applicable | CIS Docker 1.13.0 v1.0.0 L2 Docker | Unix | ACCESS CONTROL |
5.2.1 Ensure permissions on /etc/ssh/sshd_config are configured | CIS Fedora 19 Family Linux Server L1 v1.0.0 | Unix | ACCESS CONTROL |
5.3 Reduce the sudo timeout period | CIS Apple macOS 10.13 L1 v1.1.0 | Unix | ACCESS CONTROL |
5.3 Reduce the sudo timeout period | CIS Apple OSX 10.9 L1 v1.3.0 | Unix | ACCESS CONTROL |
5.3.2 Ensure permissions on SSH private host key files are configured | CIS CentOS 6 Server L1 v3.0.0 | Unix | ACCESS CONTROL |
5.3.2 Ensure permissions on SSH private host key files are configured | CIS CentOS 6 Workstation L1 v3.0.0 | Unix | ACCESS CONTROL |
6.1.1 Audit system file permissions | CIS Aliyun Linux 2 L2 v1.0.0 | Unix | ACCESS CONTROL |
6.1.1 Audit system file permissions | CIS Debian 9 Workstation L2 v1.0.1 | Unix | ACCESS CONTROL |
6.1.2 Ensure permissions on /etc/passwd are configured | CIS Fedora 19 Family Linux Server L1 v1.0.0 | Unix | ACCESS CONTROL |
6.1.8 Ensure permissions on /etc/group- are configured | CIS Fedora 19 Family Linux Server L1 v1.0.0 | Unix | ACCESS CONTROL |
6.1.10 Ensure no world writable files exist | CIS Debian Family Server L1 v1.0.0 | Unix | ACCESS CONTROL |
6.2.9 Ensure users own their home directories | CIS Aliyun Linux 2 L1 v1.0.0 | Unix | ACCESS CONTROL |
6.2.17 Ensure shadow group is empty | CIS Debian Family Server L1 v1.0.0 | Unix | ACCESS CONTROL |
7.6 Ensure directory in logging.properties is a secure location - check application log directory is secure | CIS Apache Tomcat 9 L1 v1.2.0 Middleware | Unix | ACCESS CONTROL |
10.3 Ensure the named_t Process Type is Not in Permissive Mode | CIS BIND DNS v1.0.0 L2 Caching Only Name Server | Unix | ACCESS CONTROL |
20.47 Ensure 'Permissions for program file directories must conform to minimum requirements' | CIS Microsoft Windows Server 2019 STIG v3.0.0 STIG DC | Windows | ACCESS CONTROL |
20.47 Ensure 'Permissions for program file directories must conform to minimum requirements' | CIS Microsoft Windows Server 2016 STIG v3.0.0 STIG MS | Windows | ACCESS CONTROL |
IBM i : Use Adopted Authority (QUSEADPAUT) - AUTH_LIST_NAME | IBM System i Security Reference for V7R2 | AS/400 | ACCESS CONTROL |
IBM i : Use Adopted Authority (QUSEADPAUT) - AUTH_LIST_NAME | IBM System i Security Reference for V7R3 | AS/400 | ACCESS CONTROL |