Item Search

NameAudit NamePluginCategory
1.5.5 Ensure that the --peer-client-cert-auth argument is set to trueCIS Kubernetes 1.7.0 Benchmark v1.1.0 L1Unix

IDENTIFICATION AND AUTHENTICATION

1.5.5 Ensure that the --peer-client-cert-auth argument is set to trueCIS Kubernetes 1.8 Benchmark v1.2.0 L1Unix

IDENTIFICATION AND AUTHENTICATION

1.5.5 Ensure that the --peer-client-cert-auth argument is set to trueCIS Kubernetes 1.11 Benchmark v1.3.0 L1Unix

IDENTIFICATION AND AUTHENTICATION

1.6.1.1 Ensure SELinux is not disabled in bootloader configurationCIS Ubuntu Linux 14.04 LTS Server L2 v2.1.0Unix

ACCESS CONTROL

1.6.1.1 Ensure SELinux is not disabled in bootloader configurationCIS Ubuntu Linux 14.04 LTS Workstation L2 v2.1.0Unix

ACCESS CONTROL

1.6.1.1 Ensure SELinux is not disabled in bootloader configuration - 'enforcing'CIS Ubuntu Linux 14.04 LTS Server L2 v2.1.0Unix

SYSTEM AND INFORMATION INTEGRITY

1.6.1.1 Ensure SELinux is not disabled in bootloader configuration - 'enforcing'CIS Ubuntu Linux 14.04 LTS Workstation L2 v2.1.0Unix

SYSTEM AND INFORMATION INTEGRITY

1.6.1.1 Ensure SELinux is not disabled in bootloader configuration - enforcing = 0CIS Amazon Linux v2.1.0 L2Unix

ACCESS CONTROL

1.6.1.1 Ensure SELinux is not disabled in bootloader configuration - selinux = 0CIS Amazon Linux v2.1.0 L2Unix

ACCESS CONTROL

1.6.1.1 Ensure SELinux is not disabled in bootloader configuration -'selinux'CIS Ubuntu Linux 14.04 LTS Server L2 v2.1.0Unix

SYSTEM AND INFORMATION INTEGRITY

1.6.1.1 Ensure SELinux is not disabled in bootloader configuration -'selinux'CIS Ubuntu Linux 14.04 LTS Workstation L2 v2.1.0Unix

SYSTEM AND INFORMATION INTEGRITY

1.6.1.2 Ensure the SELinux state is enforcingCIS Ubuntu Linux 14.04 LTS Workstation L2 v2.1.0Unix

ACCESS CONTROL

1.6.1.2 Ensure the SELinux state is enforcingCIS Amazon Linux v2.1.0 L2Unix

ACCESS CONTROL

1.6.1.2 Ensure the SELinux state is enforcing - 'Current mode'CIS Ubuntu Linux 14.04 LTS Server L2 v2.1.0Unix

ACCESS CONTROL

1.6.1.2 Ensure the SELinux state is enforcing - 'Current mode'CIS Ubuntu Linux 14.04 LTS Workstation L2 v2.1.0Unix

ACCESS CONTROL

1.6.1.2 Ensure the SELinux state is enforcing - 'Mode from config file'CIS Ubuntu Linux 14.04 LTS Server L2 v2.1.0Unix

ACCESS CONTROL

1.6.1.2 Ensure the SELinux state is enforcing - 'Mode from config file'CIS Ubuntu Linux 14.04 LTS Workstation L2 v2.1.0Unix

ACCESS CONTROL

1.6.1.2 Ensure the SELinux state is enforcing - 'SELinux status'CIS Ubuntu Linux 14.04 LTS Server L2 v2.1.0Unix

ACCESS CONTROL

1.6.1.2 Ensure the SELinux state is enforcing - 'SELINUX'CIS Ubuntu Linux 14.04 LTS Workstation L2 v2.1.0Unix

ACCESS CONTROL

1.6.1.4 Ensure no unconfined daemons existCIS Ubuntu Linux 14.04 LTS Server L2 v2.1.0Unix

ACCESS CONTROL

1.6.1.6 Ensure no unconfined daemons existCIS Amazon Linux v2.1.0 L2Unix

ACCESS CONTROL

1.6.2 Ensure SELinux is installedCIS Amazon Linux v2.1.0 L2Unix

ACCESS CONTROL

1.6.2.1 Ensure AppArmor is not disabled in bootloader configurationCIS Ubuntu Linux 14.04 LTS Server L2 v2.1.0Unix

SYSTEM AND INFORMATION INTEGRITY

1.6.2.2 Ensure all AppArmor Profiles are enforcingCIS Ubuntu Linux 14.04 LTS Server L2 v2.1.0Unix

ACCESS CONTROL

1.6.2.2 Ensure all AppArmor Profiles are enforcing - 'complian mode'CIS Ubuntu Linux 14.04 LTS Server L2 v2.1.0Unix

ACCESS CONTROL

1.6.2.2 Ensure all AppArmor Profiles are enforcing - 'profiles loaded'CIS Ubuntu Linux 14.04 LTS Workstation L2 v2.1.0Unix

ACCESS CONTROL

1.6.2.2 Ensure all AppArmor Profiles are enforcing - 'profiles loaded'CIS Ubuntu Linux 14.04 LTS Server L2 v2.1.0Unix

ACCESS CONTROL

1.6.2.2 Ensure all AppArmor Profiles are enforcing - 'unconfined processes'CIS Ubuntu Linux 14.04 LTS Workstation L2 v2.1.0Unix

ACCESS CONTROL

1.6.2.2 Ensure all AppArmor Profiles are enforcing - 'unconfined processes'CIS Ubuntu Linux 14.04 LTS Server L2 v2.1.0Unix

ACCESS CONTROL

1.6.3 Ensure SELinux or AppArmor are installedCIS Ubuntu Linux 14.04 LTS Server L2 v2.1.0Unix

ACCESS CONTROL

1.6.3 Ensure SELinux or AppArmor are installedCIS Ubuntu Linux 14.04 LTS Workstation L2 v2.1.0Unix

ACCESS CONTROL

2.2.7 Ensure that the certificate authorities file permissions are set to 644 or more restrictiveCIS Kubernetes 1.8 Benchmark v1.2.0 L1Unix

CONFIGURATION MANAGEMENT

2.6 Set Group named or root for BIND Directories and FilesCIS BIND DNS v1.0.0 L1 Authoritative Name ServerUnix

ACCESS CONTROL

2.9 Isolate BIND with chroot'ed SubdirectoryCIS BIND DNS v3.0.1 Authoritative Name ServerUnix

ACCESS CONTROL

3.1 Ensure that role-based access control is enabled and configured appropriatelyCIS MongoDB 3.4 Database Audit L1 v1.0.0MongoDB

ACCESS CONTROL

3.1 Ensure that role-based access control is enabled and configured appropriatelyCIS MongoDB 3.2 Database Audit L1 v1.0.0MongoDB

ACCESS CONTROL

3.2.1.21 Ensure 'Treat AirDrop as unmanaged destination' is set to 'Enabled'AirWatch - CIS Apple iOS 14 and iPadOS 14 Institution Owned L1MDM

ACCESS CONTROL

3.2.1.23 Ensure 'Require Touch ID / Face ID authentication before AutoFill' is set to 'Enabled'AirWatch - CIS Apple iOS 14 and iPadOS 14 Institution Owned L1MDM

ACCESS CONTROL

3.2.1.24 Ensure 'Force Apple Watch wrist detection' is set to 'Enabled'AirWatch - CIS Apple iOS 14 and iPadOS 14 Institution Owned L1MDM

ACCESS CONTROL

3.4 Ensure that each role for each MongoDB database is needed and grants only the necessary privilegesCIS MongoDB 3.4 Database Audit L2 v1.0.0MongoDB

ACCESS CONTROL

3.6.2 Ensure 'Allow Mail Drop' is set to 'Disabled'MobileIron - CIS Apple iOS 14 and iPadOS 14 Institution Owned L2MDM

ACCESS CONTROL

5.1 Ensure AppArmor Profile is EnabledCIS Docker Community Edition v1.1.0 L1 DockerUnix

ACCESS CONTROL

5.2 Ensure SELinux security options are set, if applicableCIS Docker Community Edition v1.1.0 L2 DockerUnix

ACCESS CONTROL

6.1.1 Audit system file permissionsCIS Amazon Linux v2.1.0 L2Unix

SYSTEM AND INFORMATION INTEGRITY

6.1.1 Audit system file permissionsCIS Ubuntu Linux 14.04 LTS Workstation L2 v2.1.0Unix

AUDIT AND ACCOUNTABILITY

6.1.1 Audit system file permissionsCIS Ubuntu Linux 14.04 LTS Server L2 v2.1.0Unix

AUDIT AND ACCOUNTABILITY

Audit system file permissions - dpkgTenable Cisco Firepower Management Center OS Best Practices AuditUnix

SYSTEM AND INFORMATION INTEGRITY

Audit system file permissions - rpmTenable Cisco Firepower Management Center OS Best Practices AuditUnix

SYSTEM AND INFORMATION INTEGRITY

Audit system file permissions - zypperTenable Cisco Firepower Management Center OS Best Practices AuditUnix

SYSTEM AND INFORMATION INTEGRITY

Ensure no unconfined daemons existTenable Cisco Firepower Management Center OS Best Practices AuditUnix

ACCESS CONTROL