Item Search

NameAudit NamePluginCategory
1.6.1.3 Ensure all AppArmor Profiles are enforcing - unconfinedCIS Ubuntu Linux 18.04 LXD Container L2 v1.0.0Unix

ACCESS CONTROL

1.6.1.6 Ensure no unconfined daemons existCIS CentOS 6 Server L1 v3.0.0Unix

CONFIGURATION MANAGEMENT

1.6.2.2 Ensure the SELinux state is enforcingCIS Distribution Independent Linux Server L2 v2.0.0Unix

ACCESS CONTROL

1.6.2.3 Ensure SELinux policy is configuredCIS Distribution Independent Linux Workstation L2 v2.0.0Unix

ACCESS CONTROL

1.6.3.2 Ensure all AppArmor Profiles are enforcing - 0 profiles are in complain modeCIS Distribution Independent Linux Server L2 v2.0.0Unix

ACCESS CONTROL

1.6.3.2 Ensure all AppArmor Profiles are enforcing - profiles are loadedCIS Distribution Independent Linux Server L2 v2.0.0Unix

ACCESS CONTROL

1.7.1.2 Ensure AppArmor is enabled in the bootloader configuration - apparmorCIS Ubuntu Linux 18.04 LXD Host L1 Workstation v1.0.0Unix

ACCESS CONTROL

1.7.1.4 Ensure all AppArmor Profiles are enforcing - unconfinedCIS Ubuntu Linux 18.04 LXD Host L2 Server v1.0.0Unix

ACCESS CONTROL

2.1 Ensure the file permissions mask is correctCIS PostgreSQL 11 OS v1.0.0Unix

ACCESS CONTROL

2.1 Ensure the file permissions mask is correctCIS PostgreSQL 9.5 OS v1.1.0Unix

ACCESS CONTROL

2.2 Ensure the PostgreSQL pg_wheel group membership is correct - /etc/groupsCIS PostgreSQL 9.5 OS v1.1.0Unix

ACCESS CONTROL

2.2.1.7 Ensure 'Allow documents from unmanaged sources in managed destinations' is set to 'Disabled'AirWatch - CIS Apple iOS 14 and iPadOS 14 v1.0.0 End User Owned L1MDM

ACCESS CONTROL

2.2.1.7 Ensure 'Allow documents from unmanaged sources in managed destinations' is set to 'Disabled'MobileIron - CIS Apple iOS 14 and iPadOS 14 v1.0.0 End User Owned L1MDM

ACCESS CONTROL

2.2.1.8 Ensure 'Treat AirDrop as unmanaged destination' is set to 'Enabled'AirWatch - CIS Apple iOS 14 and iPadOS 14 v1.0.0 End User Owned L1MDM

ACCESS CONTROL

2.2.1.9 Ensure 'Allow Handoff' is set to 'Disabled'AirWatch - CIS Apple iOS 13 and iPadOS 13 v1.0.0 End User Owned L2MDM

ACCESS CONTROL

2.2.17 Ensure '_trace_files_public' Is Set to 'FALSE'CIS Oracle Server 12c DB Traditional Auditing v3.0.0OracleDB

ACCESS CONTROL

2.3 Ensure 'Cross DB Ownership Chaining' Server Configuration Option is set to '0'CIS SQL Server 2012 Database L1 AWS RDS v1.6.0MS_SQLDB

ACCESS CONTROL

2.3 Ensure 'Cross DB Ownership Chaining' Server Configuration Option is set to '0'CIS SQL Server 2014 Database L1 AWS RDS v1.5.0MS_SQLDB

ACCESS CONTROL

2.3 Ensure 'Cross DB Ownership Chaining' Server Configuration Option is set to '0'CIS SQL Server 2014 Database L1 DB v1.5.0MS_SQLDB

ACCESS CONTROL

2.3.1 Ensure 'Managed Safari Web Domains' is 'Configured'MobileIron - CIS Apple iOS 14 and iPadOS 14 v1.0.0 End User Owned L1MDM

ACCESS CONTROL

2.6.1 Ensure 'Allow user to move messages from this account' is set to 'Disabled'AirWatch - CIS Apple iOS 13 and iPadOS 13 v1.0.0 End User Owned L1MDM

ACCESS CONTROL

3.1.6 Ensure the log file permissions are set correctlyCIS PostgreSQL 10 DB v1.0.0PostgreSQLDB

ACCESS CONTROL

3.1.6 Ensure the log file permissions are set correctlyCIS PostgreSQL 9.5 DB v1.1.0PostgreSQLDB

ACCESS CONTROL

3.2.1.25 Ensure 'Allow proximity based password sharing requests' is set to 'Disabled'MobileIron - CIS Apple iOS 13 and iPadOS 13 Institution Owned L1MDM

ACCESS CONTROL

3.3.1 Ensure 'Managed Safari Web Domains' is `Configured`MobileIron - CIS Apple iOS 13 and iPadOS 13 Institution Owned L1MDM

ACCESS CONTROL

3.6.1 Ensure 'Allow user to move messages from this account' is set to 'Disabled'MobileIron - CIS Apple iOS 13 and iPadOS 13 Institution Owned L1MDM

ACCESS CONTROL

3.6.2 Ensure 'Allow Mail Drop' is set to 'Disabled'AirWatch - CIS Apple iOS 13 and iPadOS 13 Institution Owned L2MDM

ACCESS CONTROL

3.9 Ensure Windows BUILTIN groups are not SQL LoginsCIS SQL Server 2012 Database L1 AWS RDS v1.6.0MS_SQLDB

ACCESS CONTROL

3.9 Ensure Windows BUILTIN groups are not SQL LoginsCIS SQL Server 2014 Database L1 AWS RDS v1.5.0MS_SQLDB

ACCESS CONTROL

3.11 Ensure Group Write Access for the Apache Directories and Files Is Properly RestrictedCIS Apache HTTP Server 2.2 L1 v3.6.0 MiddlewareUnix

ACCESS CONTROL

3.12 Ensure Group Write Access for the Document Root Directories and Files Is Properly RestrictedCIS Apache HTTP Server 2.2 L1 v3.6.0 MiddlewareUnix

ACCESS CONTROL

4.1 Ensure Access to OS Root Directory Is Denied By Default - 'httpd.conf no Allow directives exist'CIS Apache HTTP Server 2.2 L2 v3.6.0Unix

ACCESS CONTROL

4.1 Ensure Access to OS Root Directory Is Denied By Default - 'httpd.conf no Require directives exist'CIS Apache HTTP Server 2.2 L2 v3.6.0Unix

ACCESS CONTROL

4.1 Ensure Access to OS Root Directory Is Denied By Default - 'httpd.conf Order = Deny,AllowCIS Apache HTTP Server 2.2 L2 v3.6.0Unix

ACCESS CONTROL

4.1 Ensure Access to OS Root Directory Is Denied By Default - 'httpd.conf Require all deniedCIS Apache HTTP Server 2.2 L1 v3.6.0 MiddlewareUnix

ACCESS CONTROL

4.2 Ensure Appropriate Access to Web Content Is Allowed - 'httpd.conf Order Deny,Allow'CIS Apache HTTP Server 2.2 L1 v3.6.0 MiddlewareUnix

ACCESS CONTROL

4.2 Ensure Appropriate Access to Web Content Is Allowed - 'No Order/Deny/Allow'CIS Apache HTTP Server 2.2 L2 v3.6.0Unix

ACCESS CONTROL

4.2 Ensure Appropriate Access to Web Content Is Allowed - 'Require is configured'CIS Apache HTTP Server 2.2 L1 v3.6.0Unix

ACCESS CONTROL

4.4 Restrict Access to All Key Files - permissionsCIS BIND DNS v1.0.0 L1 Authoritative Name ServerUnix

ACCESS CONTROL

4.6 Ensure Row Level Security (RLS) is configured correctlyCIS PostgreSQL 11 DB v1.0.0PostgreSQLDB

ACCESS CONTROL

6.1.1 Audit system file permissionsCIS Distribution Independent Linux Workstation L2 v2.0.0Unix

ACCESS CONTROL

6.1.1 Audit system file permissionsCIS Red Hat 6 Workstation L2 v3.0.0Unix

ACCESS CONTROL

6.2.8 Ensure users' home directories permissions are 750 or more restrictiveCIS Distribution Independent Linux Workstation L1 v2.0.0Unix

ACCESS CONTROL

6.2.9 Ensure users own their home directoriesCIS Distribution Independent Linux Workstation L1 v2.0.0Unix

ACCESS CONTROL

6.2.9 Ensure users own their home directoriesCIS Distribution Independent Linux Server L1 v2.0.0Unix

ACCESS CONTROL

6.2.9 Ensure users own their home directoriesCIS Ubuntu Linux 18.04 LXD Host L1 Server v1.0.0Unix

ACCESS CONTROL

10.2 Ensure BIND Processes Run in the named_t Confined Context TypeCIS BIND DNS v1.0.0 L2 Caching Only Name ServerUnix

ACCESS CONTROL

11.1 Ensure SELinux Is Enabled in Enforcing ModeCIS Apache HTTP Server 2.2 L2 v3.6.0Unix

ACCESS CONTROL

11.1 Ensure SELinux Is Enabled in Enforcing ModeCIS Apache HTTP Server 2.2 L2 v3.6.0 MiddlewareUnix

ACCESS CONTROL

11.3 Ensure the httpd_t Type Is Not in Permissive ModeCIS Apache HTTP Server 2.2 L2 v3.6.0Unix

ACCESS CONTROL