Item Search

NameAudit NamePluginCategory
1.3.4 Ensure 'Minimum Lowercase Letters' is greater than or equal to 1CIS Palo Alto Firewall 8 Benchmark L1 v1.0.0Palo_Alto

ACCESS CONTROL

1.3.5 Ensure 'Minimum Numeric Letters' is greater than or equal to 1CIS Palo Alto Firewall 8 Benchmark L1 v1.0.0Palo_Alto

ACCESS CONTROL

1.3.6 Ensure 'Minimum Special Characters' is greater than or equal to 1CIS Palo Alto Firewall 8 Benchmark L1 v1.0.0Palo_Alto

ACCESS CONTROL

3.2.1.25 Ensure 'Allow proximity based password sharing requests' is set to 'Disabled'MobileIron - CIS Apple iOS 13 and iPadOS 13 Institution Owned L1MDM

ACCESS CONTROL

5.1.8 Ensure at/cron is restricted to authorized users - at.allowCIS Distribution Independent Linux Workstation L1 v2.0.0Unix

ACCESS CONTROL

5.1.8 Ensure at/cron is restricted to authorized users - at.allowCIS Debian 9 Workstation L1 v1.0.1Unix

ACCESS CONTROL

5.1.8 Ensure at/cron is restricted to authorized users - at.denyCIS Debian 9 Workstation L1 v1.0.1Unix

ACCESS CONTROL

5.1.8 Ensure at/cron is restricted to authorized users - at.denyCIS Distribution Independent Linux Server L1 v2.0.0Unix

ACCESS CONTROL

5.1.8 Ensure at/cron is restricted to authorized users - cron.allowCIS Debian 9 Workstation L1 v1.0.1Unix

ACCESS CONTROL

5.1.8 Ensure at/cron is restricted to authorized users - cron.allowCIS Distribution Independent Linux Server L1 v2.0.0Unix

ACCESS CONTROL

5.1.8 Ensure at/cron is restricted to authorized users - cron.denyCIS Distribution Independent Linux Workstation L1 v2.0.0Unix

ACCESS CONTROL

5.1.8 Ensure cron is restricted to authorized users - /etc/cron.allowCIS CentOS 6 Workstation L1 v3.0.0Unix

ACCESS CONTROL

5.1.8 Ensure cron is restricted to authorized users - /etc/cron.denyCIS Oracle Linux 6 Server L1 v2.0.0Unix

ACCESS CONTROL

5.1.8 Ensure cron is restricted to authorized users - /etc/cron.denyCIS Oracle Linux 6 Workstation L1 v2.0.0Unix

ACCESS CONTROL

5.1.8 Ensure cron is restricted to authorized users - /etc/cron.denyCIS CentOS 6 Server L1 v3.0.0Unix

ACCESS CONTROL

5.1.9 Ensure at is restricted to authorized users - /etc/at.denyCIS Oracle Linux 6 Server L1 v2.0.0Unix

ACCESS CONTROL

5.3.3 Ensure password reuse is limitedCIS Distribution Independent Linux Server L1 v2.0.0Unix

ACCESS CONTROL

5.3.3 Ensure password reuse is limitedCIS Ubuntu Linux 18.04 LXD Container L1 v1.0.0Unix

ACCESS CONTROL

5.4.2 Ensure system accounts are securedCIS Ubuntu Linux 18.04 LXD Host L1 Server v1.0.0Unix

ACCESS CONTROL

5.4.2 Ensure system accounts are securedCIS Ubuntu Linux 18.04 LXD Host L1 Workstation v1.0.0Unix

ACCESS CONTROL

5.4.2 Ensure system accounts are secured - lock not rootCIS Distribution Independent Linux Server L1 v2.0.0Unix

ACCESS CONTROL

5.4.2 Ensure system accounts are secured - lock not rootCIS Distribution Independent Linux Workstation L1 v2.0.0Unix

ACCESS CONTROL

5.4.2 Ensure system accounts are secured - non loginCIS Distribution Independent Linux Server L1 v2.0.0Unix

ACCESS CONTROL

6.2.15 Ensure all groups in /etc/passwd exist in /etc/groupCIS Distribution Independent Linux Workstation L1 v2.0.0Unix

ACCESS CONTROL

6.2.15 Ensure all groups in /etc/passwd exist in /etc/groupCIS CentOS 6 Server L1 v3.0.0Unix

ACCESS CONTROL

6.2.16 Ensure no duplicate UIDs existCIS Red Hat 6 Workstation L1 v3.0.0Unix

ACCESS CONTROL

6.2.16 Ensure no duplicate UIDs existCIS Distribution Independent Linux Workstation L1 v2.0.0Unix

ACCESS CONTROL

6.2.16 Ensure no duplicate UIDs existCIS Ubuntu Linux 18.04 LXD Host L1 Server v1.0.0Unix

ACCESS CONTROL

6.2.17 Ensure no duplicate GIDs existCIS Ubuntu Linux 18.04 LXD Host L1 Server v1.0.0Unix

ACCESS CONTROL

6.2.17 Ensure no duplicate GIDs existCIS Ubuntu Linux 18.04 LXD Host L1 Workstation v1.0.0Unix

ACCESS CONTROL

6.2.17 Ensure no duplicate GIDs existCIS Ubuntu Linux 18.04 LXD Container L1 v1.0.0Unix

ACCESS CONTROL

6.2.17 Ensure no duplicate GIDs existCIS Red Hat 6 Server L1 v3.0.0Unix

ACCESS CONTROL

6.2.17 Ensure no duplicate GIDs existCIS CentOS 6 Server L1 v3.0.0Unix

ACCESS CONTROL

6.2.17 Ensure no duplicate GIDs existCIS Red Hat 6 Workstation L1 v3.0.0Unix

ACCESS CONTROL

6.2.17 Ensure no duplicate GIDs existCIS Oracle Linux 6 Server L1 v2.0.0Unix

ACCESS CONTROL

6.2.17 Ensure no duplicate GIDs existCIS CentOS 6 Workstation L1 v3.0.0Unix

ACCESS CONTROL

6.2.18 Ensure no duplicate user names existCIS Distribution Independent Linux Server L1 v2.0.0Unix

ACCESS CONTROL

6.2.18 Ensure no duplicate user names existCIS Distribution Independent Linux Workstation L1 v2.0.0Unix

ACCESS CONTROL

6.2.18 Ensure no duplicate user names existCIS Oracle Linux 6 Server L1 v2.0.0Unix

ACCESS CONTROL

6.2.18 Ensure no duplicate user names existCIS Red Hat 6 Server L1 v3.0.0Unix

ACCESS CONTROL

6.2.18 Ensure no duplicate user names existCIS Red Hat 6 Workstation L1 v3.0.0Unix

ACCESS CONTROL

6.2.18 Ensure no duplicate user names existCIS CentOS 6 Server L1 v3.0.0Unix

ACCESS CONTROL

6.2.18 Ensure no duplicate user names existCIS CentOS 6 Workstation L1 v3.0.0Unix

ACCESS CONTROL

6.2.19 Ensure no duplicate group names existCIS Oracle Linux 6 Workstation L1 v2.0.0Unix

ACCESS CONTROL

6.2.19 Ensure no duplicate group names existCIS Red Hat 6 Server L1 v3.0.0Unix

ACCESS CONTROL

6.2.19 Ensure no duplicate group names existCIS Red Hat 6 Workstation L1 v3.0.0Unix

ACCESS CONTROL

6.2.19 Ensure no duplicate group names existCIS Distribution Independent Linux Server L1 v2.0.0Unix

ACCESS CONTROL

6.2.19 Ensure no duplicate group names existCIS Ubuntu Linux 18.04 LXD Host L1 Server v1.0.0Unix

ACCESS CONTROL

6.2.19 Ensure no duplicate group names existCIS Ubuntu Linux 18.04 LXD Host L1 Workstation v1.0.0Unix

ACCESS CONTROL

6.2.19 Ensure no duplicate group names existCIS CentOS 6 Server L1 v3.0.0Unix

ACCESS CONTROL