1.4.1 Enable SELinux in /etc/grub.conf - selinux != 0 | CIS Red Hat Enterprise Linux 5 L2 v2.2.1 | Unix | ACCESS CONTROL |
1.6.1.3 Ensure all AppArmor Profiles are in enforce or complain mode - loaded | CIS Ubuntu Linux 16.04 LTS Workstation L1 v2.0.0 | Unix | ACCESS CONTROL |
1.6.1.3 Ensure SELinux policy is configured | CIS Oracle Linux 6 Server L1 v2.0.0 | Unix | ACCESS CONTROL |
1.6.1.4 Ensure all AppArmor Profiles are enforcing - loaded | CIS Ubuntu Linux 16.04 LTS Server L2 v2.0.0 | Unix | ACCESS CONTROL |
1.6.1.4 Ensure all AppArmor Profiles are enforcing - unconfined | CIS Ubuntu Linux 16.04 LTS Server L2 v2.0.0 | Unix | ACCESS CONTROL |
1.6.1.4 Ensure the SELinux mode is enforcing or permissive - config | CIS CentOS 6 Workstation L1 v3.0.0 | Unix | ACCESS CONTROL |
1.6.1.5 Ensure the SELinux mode is enforcing - getenforce | CIS CentOS 6 Server L2 v3.0.0 | Unix | ACCESS CONTROL |
1.6.1.5 Ensure the SELinux mode is enforcing - getenforce | CIS Red Hat 6 Workstation L2 v3.0.0 | Unix | ACCESS CONTROL |
1.6.1.7 Ensure SETroubleshoot is not installed | CIS Red Hat 6 Server L1 v3.0.0 | Unix | ACCESS CONTROL |
1.6.2.2 Ensure all AppArmor Profiles are enforcing - 0 processes are unconfined | CIS Debian 9 Server L2 v1.0.1 | Unix | ACCESS CONTROL |
1.6.3 Ensure SELinux or AppArmor are installed | CIS Debian 8 Server L2 v2.0.2 | Unix | ACCESS CONTROL |
1.6.3 Ensure SELinux or AppArmor are installed | CIS Debian 8 Workstation L2 v2.0.2 | Unix | ACCESS CONTROL |
1.7.1.2 Ensure SELinux is not disabled in bootloader configuration - enforcing | CIS Fedora 19 Family Linux Server L1 v1.0.0 | Unix | ACCESS CONTROL |
1.7.1.3 Ensure SELinux policy is configured - SELINUXTYPE | CIS Fedora 19 Family Linux Server L1 v1.0.0 | Unix | ACCESS CONTROL |
1.7.1.4 Ensure the SELinux mode is enforcing or permissive - /etc/selinux/config | CIS Fedora 19 Family Linux Workstation L1 v1.0.0 | Unix | ACCESS CONTROL |
1.7.1.5 Ensure the SELinux mode is enforcing - /etc/selinux/config | CIS Fedora 19 Family Linux Server L2 v1.0.0 | Unix | ACCESS CONTROL |
1.7.1.7 Ensure SETroubleshoot is not installed | CIS Fedora 19 Family Linux Server L1 v1.0.0 | Unix | ACCESS CONTROL |
1.8.1.4 Ensure permissions on /etc/motd are configured | CIS Fedora 19 Family Linux Server L1 v1.0.0 | Unix | ACCESS CONTROL |
1.8.1.4 Ensure permissions on /etc/motd are configured | CIS Fedora 19 Family Linux Workstation L1 v1.0.0 | Unix | ACCESS CONTROL |
2.3.10.11 (L1) Ensure 'Network access: Shares that can be accessed anonymously' is set to 'None' | CIS Microsoft Windows 11 Enterprise v4.0.0 L1 BitLocker | Windows | ACCESS CONTROL |
2.3.10.12 (L1) Ensure 'Network access: Shares that can be accessed anonymously' is set to 'None' | CIS Microsoft Windows Server 2019 v3.0.1 L1 DC | Windows | ACCESS CONTROL |
2.3.10.12 (L1) Ensure 'Network access: Shares that can be accessed anonymously' is set to 'None' | CIS Microsoft Windows Server 2016 v3.0.0 L1 DC | Windows | ACCESS CONTROL |
3.2 Set Daemon umask | CIS Red Hat Enterprise Linux 5 L1 v2.2.1 | Unix | ACCESS CONTROL |
4.11.31.1 (L1) Ensure 'Prevent users from sharing files within their profile. (User)' is set to 'Enabled' | CIS Microsoft Intune for Windows 10 v4.0.0 L1 | Windows | ACCESS CONTROL |
5.1.4 Ensure permissions on /etc/cron.daily are configured | CIS Fedora 19 Family Linux Server L1 v1.0.0 | Unix | ACCESS CONTROL |
5.2.2 Ensure permissions on SSH private host key files are configured | CIS Fedora 19 Family Linux Server L1 v1.0.0 | Unix | ACCESS CONTROL |
5.2.3 Ensure permissions on SSH public host key files are configured | CIS Fedora 19 Family Linux Server L1 v1.0.0 | Unix | ACCESS CONTROL |
5.3.2 Ensure permissions on SSH private host key files are configured | CIS Ubuntu Linux 16.04 LTS Server L1 v2.0.0 | Unix | ACCESS CONTROL |
5.3.2 Ensure permissions on SSH private host key files are configured | CIS Ubuntu Linux 16.04 LTS Workstation L1 v2.0.0 | Unix | ACCESS CONTROL |
5.3.3 Ensure permissions on SSH public host key files are configured | CIS Ubuntu Linux 16.04 LTS Server L1 v2.0.0 | Unix | ACCESS CONTROL |
5.4.4 Ensure default user umask is 027 or more restrictive - /etc/login.defs | CIS Debian Family Workstation L1 v1.0.0 | Unix | ACCESS CONTROL |
5.4.4 Ensure default user umask is 027 or more restrictive - /etc/pam.d/common-session | CIS Debian Family Server L1 v1.0.0 | Unix | ACCESS CONTROL |
6.1.1 Audit system file permissions | CIS Debian 9 Server L2 v1.0.1 | Unix | ACCESS CONTROL |
6.1.4 Ensure permissions on /etc/group are configured | CIS Fedora 19 Family Linux Server L1 v1.0.0 | Unix | ACCESS CONTROL |
6.2.5 Ensure users own their home directories | CIS Ubuntu Linux 16.04 LTS Server L1 v2.0.0 | Unix | ACCESS CONTROL |
6.2.5 Ensure users own their home directories | CIS Ubuntu Linux 16.04 LTS Workstation L1 v2.0.0 | Unix | ACCESS CONTROL |
6.2.6 Ensure users' home directories permissions are 750 or more restrictive | CIS Ubuntu Linux 16.04 LTS Workstation L1 v2.0.0 | Unix | ACCESS CONTROL |
6.2.8 Ensure no users have .netrc files | CIS Ubuntu Linux 16.04 LTS Workstation L1 v2.0.0 | Unix | ACCESS CONTROL |
6.2.8 Ensure users' dot files are not group or world writable | CIS Fedora 19 Family Linux Server L1 v1.0.0 | Unix | ACCESS CONTROL |
6.2.11 Ensure users' .netrc Files are not group or world accessible | CIS Fedora 19 Family Linux Server L1 v1.0.0 | Unix | ACCESS CONTROL |
7.2 Ensure appropriate database file permissions are set | CIS MongoDB 5 L1 OS Linux v1.2.0 | Unix | ACCESS CONTROL |
7.6 Ensure directory in logging.properties is a secure location - check application log directory is secure | CIS Apache Tomcat 9 L1 v1.2.0 | Unix | ACCESS CONTROL |
7.6 Ensure directory in logging.properties is a secure location - check log directory location | CIS Apache Tomcat 8 L1 v1.1.0 Middleware | Unix | ACCESS CONTROL |
7.6 Ensure directory in logging.properties is a secure location - check prefix application name | CIS Apache Tomcat 8 L1 v1.1.0 | Unix | ACCESS CONTROL |
7.6 Ensure directory in logging.properties is a secure location - check prefix application name | CIS Apache Tomcat 9 L1 v1.2.0 | Unix | ACCESS CONTROL |
9.1.12 Find Un-grouped Files and Directories | CIS Red Hat Enterprise Linux 5 L1 v2.2.1 | Unix | ACCESS CONTROL |
10.3 Ensure the named_t Process Type is Not in Permissive Mode | CIS BIND DNS v1.0.0 L2 Authoritative Name Server | Unix | ACCESS CONTROL |
19.7.26.1 (L1) Ensure 'Prevent users from sharing files within their profile.' is set to 'Enabled' | CIS Microsoft Windows 11 Stand-alone v4.0.0 L1 | Windows | ACCESS CONTROL |
19.7.26.1 (L1) Ensure 'Prevent users from sharing files within their profile.' is set to 'Enabled' | CIS Microsoft Windows 10 EMS Gateway v3.0.0 L1 | Windows | ACCESS CONTROL |
55.3 (L2) Ensure 'Allow Shared User App Data' is set to 'Block' | CIS Microsoft Intune for Windows 11 v4.0.0 L2 | Windows | ACCESS CONTROL |