Item Search

NameAudit NamePluginCategory
1.1.1.3 Configure AAA Authentication - RADIUS if applicableCIS Cisco NX-OS v1.2.0 L1Cisco

ACCESS CONTROL

1.2.5 Ensure Exec Timeout for Remote Administrative Sessions (VTY) is set to less than 10CIS Cisco NX-OS v1.2.0 L1Cisco

CONFIGURATION MANAGEMENT, MAINTENANCE

1.2.6 Set the Maximum Number of VTY SessionsCIS Cisco NX-OS v1.2.0 L1Cisco

CONFIGURATION MANAGEMENT, MAINTENANCE

1.2.7 Disable the Telnet FeatureCIS Cisco NX-OS v1.2.0 L1Cisco

CONFIGURATION MANAGEMENT, MAINTENANCE

1.4.3 Set password lifetime, warning time and grace time for local credentialsCIS Cisco NX-OS v1.2.0 L1Cisco

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY, IDENTIFICATION AND AUTHENTICATION

1.5 (L1) Host integrated hardware management controller must be secureCIS VMware ESXi 8.0 v1.2.0 L1VMware

CONFIGURATION MANAGEMENT, MAINTENANCE

1.5.1 Ensure Syslog Logging is configuredCIS Cisco NX-OS v1.2.0 L2Cisco

AUDIT AND ACCOUNTABILITY

1.5.2 Log all Successful and Failed Administrative LoginsCIS Cisco NX-OS v1.2.0 L2Cisco

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

1.6.1 Configure at least 2 external NTP ServersCIS Cisco NX-OS v1.2.0 L1Cisco

AUDIT AND ACCOUNTABILITY

2.1.1.3.2.1.2 Ensure 'Disable all trusted locations' is set to 'Enabled'CIS Microsoft Office Enterprise v1.2.0 L2Windows

CONFIGURATION MANAGEMENT

2.2 Alter the Advertised server.number StringCIS Apache Tomcat 9 L2 v1.2.0Unix

CONFIGURATION MANAGEMENT

2.2.4.7.2.4.2 Ensure 'Disable all trusted locations' is set to 'Enabled'CIS Microsoft Office Enterprise v1.2.0 L2Windows

CONFIGURATION MANAGEMENT

2.4 (L1) Host image profile acceptance level must be PartnerSupported or higherCIS VMware ESXi 8.0 v1.2.0 L1Unix

SYSTEM AND SERVICES ACQUISITION

2.4 Disable X-Powered-By HTTP Header and Rename the Server Value for all ConnectorsCIS Apache Tomcat 9 L2 v1.2.0Unix

CONFIGURATION MANAGEMENT

2.5.10.8.3.1 Ensure 'Read e-mail as plain text' is set to 'Enabled'CIS Microsoft Office Enterprise v1.2.0 L2Windows

CONFIGURATION MANAGEMENT

2.6 (L1) Host must have reliable time synchronization sourcesCIS VMware ESXi 8.0 v1.2.0 L1VMware

AUDIT AND ACCOUNTABILITY

2.6.6.6.2.3.2 Ensure 'Disable all trusted locations' is set to 'Enabled'CIS Microsoft Office Enterprise v1.2.0 L2Windows

CONFIGURATION MANAGEMENT

2.8 (L1) Host must require TPM-based configuration encryptionCIS VMware ESXi 8.0 v1.2.0 L1VMware

IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

3.1.1.3 Configure EIGRP log-adjacency-changesCIS Cisco NX-OS v1.2.0 L1Cisco

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

3.1.2.2 If Possible, Limit the BGP Routes Accepted from PeersCIS Cisco NX-OS v1.2.0 L2Cisco

CONFIGURATION MANAGEMENT, CONTINGENCY PLANNING, PLANNING, PROGRAM MANAGEMENT, SYSTEM AND SERVICES ACQUISITION, SYSTEM AND COMMUNICATIONS PROTECTION

3.1.2.3 Configure BGP AuthenticationCIS Cisco NX-OS v1.2.0 L2Cisco

ACCESS CONTROL, CONFIGURATION MANAGEMENT, CONTINGENCY PLANNING, PLANNING, PROGRAM MANAGEMENT, SYSTEM AND SERVICES ACQUISITION, SYSTEM AND COMMUNICATIONS PROTECTION

3.1.3.2 Authenticate OSPF peers with MD5 authentication keysCIS Cisco NX-OS v1.2.0 L2Cisco

ACCESS CONTROL, CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

3.2 Disable the Shutdown portCIS Apache Tomcat 9 L2 v1.2.0Unix

SECURITY ASSESSMENT AND AUTHORIZATION, CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

3.2.4 Disable IP Directed Broadcasts on all Layer 3 InterfacesCIS Cisco NX-OS v1.2.0 L1Cisco

ACCESS CONTROL, CONFIGURATION MANAGEMENT, CONTINGENCY PLANNING, PLANNING, PROGRAM MANAGEMENT, SYSTEM AND SERVICES ACQUISITION, SYSTEM AND COMMUNICATIONS PROTECTION

3.3.2 Configure Storm ControlCIS Cisco NX-OS v1.2.0 L2Cisco

AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT, CONTINGENCY PLANNING, INCIDENT RESPONSE, PLANNING, PROGRAM MANAGEMENT, SYSTEM AND SERVICES ACQUISITION, SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY

3.4 Ensure that each role for each MongoDB database is needed and grants only the necessary privilegesCIS MongoDB 6 v1.2.0 L1 MongoDBMongoDB

ACCESS CONTROL

3.5 Review Superuser/Admin RolesCIS MongoDB 6 v1.2.0 L2 MongoDBMongoDB

ACCESS CONTROL

3.5 Review Superuser/Admin Roles - userAdminAnyDatabaseCIS MongoDB 5 L2 DB v1.2.0MongoDB

ACCESS CONTROL

3.5.1 Basic Fiber Channel ConfigurationCIS Cisco NX-OS v1.2.0 L2Cisco

ACCESS CONTROL, CONFIGURATION MANAGEMENT

3.20 (L1) Host must enable normal lockdown modeCIS VMware ESXi 8.0 v1.2.0 L1VMware

ACCESS CONTROL

3.22 (L1) Host must deny shell access for the dcui accountCIS VMware ESXi 8.0 v1.2.0 L1VMware

CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY

4.3 (L1) Host must log sufficient information for eventsCIS VMware ESXi 8.0 v1.2.0 L1VMware

AUDIT AND ACCOUNTABILITY

4.5 Ensure Encryption of Data at RestCIS MongoDB 6 v1.2.0 L2 MongoDBWindows

SYSTEM AND COMMUNICATIONS PROTECTION

4.10 (L1) Host must verify certificates for TLS remote logging endpointsCIS VMware ESXi 8.0 v1.2.0 L1VMware

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY

5.4 (L1) Host must filter Bridge Protocol Data Unit (BPDU) packetsCIS VMware ESXi 8.0 v1.2.0 L1VMware

SYSTEM AND COMMUNICATIONS PROTECTION

5.7 (L1) Host should reject MAC address changes on standard virtual switches and port groupsCIS VMware ESXi 8.0 v1.2.0 L1VMware

SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION

6.2 Ensure that operating system resource limits are set for MongoDBCIS MongoDB 6 v1.2.0 L2 MongoDBWindows

SYSTEM AND COMMUNICATIONS PROTECTION

6.3.1 (L1) Host iSCSI client, if enabled, must employ bidirectional/mutual CHAP authenticationCIS VMware ESXi 8.0 v1.2.0 L1VMware

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

7.2 (L1) Virtual machines must require encryption for vMotionCIS VMware ESXi 8.0 v1.2.0 L1VMware

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

7.8 (L1) Ensure unauthorized modification and disconnection of devices is disabledCIS VMware ESXi 8.0 v1.2.0 L1VMware

CONFIGURATION MANAGEMENT

7.17 (L1) Virtual machines must deactivate console drag and drop operationsCIS VMware ESXi 8.0 v1.2.0 L1VMware

CONFIGURATION MANAGEMENT

7.20 (L1) Virtual machines must limit access through the "dvfilter" network APICIS VMware ESXi 8.0 v1.2.0 L1VMware

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

7.24 (L1) Virtual machines must not be able to obtain host information from the hypervisorCIS VMware ESXi 8.0 v1.2.0 L1VMware

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

7.28 (L1) Virtual machines must limit informational messages from the virtual machine to the VMX fileCIS VMware ESXi 8.0 v1.2.0 L1VMware

AUDIT AND ACCOUNTABILITY

8.1 (L1) VMware Tools must be a version that has not reached End of General Support statusCIS VMware ESXi 8.0 v1.2.0 L1VMware

SYSTEM AND SERVICES ACQUISITION

8.3 (L1) VMware Tools should configure automatic upgrades as appropriate for the environmentCIS VMware ESXi 8.0 v1.2.0 L1VMware

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

8.10 (L1) VMware Tools must deactivate Guest Store Upgrade operations unless requiredCIS VMware ESXi 8.0 v1.2.0 L1VMware

CONFIGURATION MANAGEMENT

10.3 Restrict manager applicationCIS Apache Tomcat 9 L2 v1.2.0Unix

ACCESS CONTROL

10.9 Configure connectionTimeoutCIS Apache Tomcat 9 L2 v1.2.0Unix

CONFIGURATION MANAGEMENT

10.10 Configure maxHttpHeaderSizeCIS Apache Tomcat 9 L2 v1.2.0Unix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION