1.3.3 Ensure 'Minimum Uppercase Letters' is greater than or equal to 1 | CIS Palo Alto Firewall 8 Benchmark L1 v1.0.0 | Palo_Alto | ACCESS CONTROL |
1.3.3 Ensure 'Minimum Uppercase Letters' is greater than or equal to 1 | CIS Palo Alto Firewall 9 v1.1.0 L1 | Palo_Alto | IDENTIFICATION AND AUTHENTICATION |
1.3.4 Ensure 'Minimum Lowercase Letters' is greater than or equal to 1 | CIS Palo Alto Firewall 9 v1.1.0 L1 | Palo_Alto | IDENTIFICATION AND AUTHENTICATION |
1.3.5 Ensure 'Minimum Numeric Letters' is greater than or equal to 1 | CIS Palo Alto Firewall 9 v1.1.0 L1 | Palo_Alto | IDENTIFICATION AND AUTHENTICATION |
1.3.7 Ensure 'Required Password Change Period' is less than or equal to 90 days | CIS Palo Alto Firewall 8 Benchmark L1 v1.0.0 | Palo_Alto | ACCESS CONTROL |
1.3.7 Ensure 'Required Password Change Period' is less than or equal to 90 days | CIS Palo Alto Firewall 9 v1.1.0 L1 | Palo_Alto | ACCESS CONTROL |
1.3.8 Ensure 'New Password Differs By Characters' is greater than or equal to 3 | CIS Palo Alto Firewall 9 v1.1.0 L1 | Palo_Alto | IDENTIFICATION AND AUTHENTICATION |
1.3.9 Ensure 'Prevent Password Reuse Limit' is set to 24 or more passwords | CIS Palo Alto Firewall 9 v1.1.0 L1 | Palo_Alto | IDENTIFICATION AND AUTHENTICATION |
1.3.10 Ensure 'Password Profiles' do not exist | CIS Palo Alto Firewall 8 Benchmark L1 v1.0.0 | Palo_Alto | ACCESS CONTROL |
1.3.10 Ensure 'Password Profiles' do not exist | CIS Palo Alto Firewall 9 v1.1.0 L1 | Palo_Alto | IDENTIFICATION AND AUTHENTICATION |
1.4.2 Ensure 'Failed Attempts' and 'Lockout Time' for Authentication Profile are properly configured - Failed Attempts | CIS Palo Alto Firewall 8 Benchmark L1 v1.0.0 | Palo_Alto | ACCESS CONTROL |
2.4.3 (L2) Ensure Microsoft Defender for Cloud Apps is enabled and configured | CIS Microsoft 365 Foundations v4.0.0 L2 E5 | microsoft_azure | SYSTEM AND INFORMATION INTEGRITY |
3.2.1.25 Ensure 'Allow proximity based password sharing requests' is set to 'Disabled' | AirWatch - CIS Apple iOS 13 and iPadOS 13 Institution Owned L1 | MDM | ACCESS CONTROL |
5.1.8 Ensure at/cron is restricted to authorized users - at.deny | CIS Debian 9 Server L1 v1.0.1 | Unix | ACCESS CONTROL |
5.1.8 Ensure at/cron is restricted to authorized users - cron.deny | CIS Distribution Independent Linux Server L1 v2.0.0 | Unix | ACCESS CONTROL |
5.1.8 Ensure at/cron is restricted to authorized users - cron.deny | CIS Debian 9 Workstation L1 v1.0.1 | Unix | ACCESS CONTROL |
5.1.8 Ensure cron is restricted to authorized users - /etc/cron.allow | CIS CentOS 6 Server L1 v3.0.0 | Unix | ACCESS CONTROL |
5.1.8 Ensure cron is restricted to authorized users - /etc/cron.deny | CIS CentOS 6 Workstation L1 v3.0.0 | Unix | ACCESS CONTROL |
5.1.9 Ensure at is restricted to authorized users - /etc/at.allow | CIS Oracle Linux 6 Server L1 v2.0.0 | Unix | ACCESS CONTROL |
5.1.9 Ensure at is restricted to authorized users - /etc/at.allow | CIS Oracle Linux 6 Workstation L1 v2.0.0 | Unix | ACCESS CONTROL |
5.1.9 Ensure at is restricted to authorized users - /etc/at.deny | CIS CentOS 6 Server L1 v3.0.0 | Unix | ACCESS CONTROL |
5.1.9 Ensure at is restricted to authorized users - /etc/at.deny | CIS Oracle Linux 6 Workstation L1 v2.0.0 | Unix | ACCESS CONTROL |
5.3.3 Ensure password reuse is limited | CIS Ubuntu Linux 18.04 LXD Host L1 Server v1.0.0 | Unix | ACCESS CONTROL |
5.3.3 Ensure password reuse is limited | CIS Distribution Independent Linux Workstation L1 v2.0.0 | Unix | ACCESS CONTROL |
5.3.3 Ensure password reuse is limited | CIS Ubuntu Linux 18.04 LXD Host L1 Workstation v1.0.0 | Unix | ACCESS CONTROL |
5.4.1.2 Ensure minimum days between password changes is 7 or more - users | CIS Debian 9 Server L1 v1.0.1 | Unix | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION |
5.4.2 Ensure system accounts are non-login | CIS Debian 8 Workstation L1 v2.0.2 | Unix | ACCESS CONTROL |
5.4.2 Ensure system accounts are secured - non login | CIS Distribution Independent Linux Workstation L1 v2.0.0 | Unix | ACCESS CONTROL |
6.2.15 Ensure all groups in /etc/passwd exist in /etc/group | CIS Distribution Independent Linux Server L1 v2.0.0 | Unix | ACCESS CONTROL |
6.2.15 Ensure all groups in /etc/passwd exist in /etc/group | CIS Oracle Linux 6 Server L1 v2.0.0 | Unix | ACCESS CONTROL |
6.2.15 Ensure all groups in /etc/passwd exist in /etc/group | CIS CentOS 6 Workstation L1 v3.0.0 | Unix | ACCESS CONTROL |
6.2.15 Ensure all groups in /etc/passwd exist in /etc/group | CIS Red Hat 6 Server L1 v3.0.0 | Unix | ACCESS CONTROL |
6.2.16 Ensure no duplicate UIDs exist | CIS Oracle Linux 6 Server L1 v2.0.0 | Unix | ACCESS CONTROL |
6.2.16 Ensure no duplicate UIDs exist | CIS Distribution Independent Linux Server L1 v2.0.0 | Unix | ACCESS CONTROL |
6.2.16 Ensure no duplicate UIDs exist | CIS CentOS 6 Server L1 v3.0.0 | Unix | ACCESS CONTROL |
6.2.16 Ensure no duplicate UIDs exist | CIS Ubuntu Linux 18.04 LXD Host L1 Workstation v1.0.0 | Unix | ACCESS CONTROL |
6.2.16 Ensure no duplicate UIDs exist | CIS Oracle Linux 6 Workstation L1 v2.0.0 | Unix | ACCESS CONTROL |
6.2.17 Ensure no duplicate GIDs exist | CIS Oracle Linux 6 Workstation L1 v2.0.0 | Unix | ACCESS CONTROL |
6.2.18 Ensure no duplicate user names exist | CIS Ubuntu Linux 18.04 LXD Host L1 Server v1.0.0 | Unix | ACCESS CONTROL |
6.2.18 Ensure no duplicate user names exist | CIS Ubuntu Linux 18.04 LXD Host L1 Workstation v1.0.0 | Unix | ACCESS CONTROL |
6.2.19 Ensure no duplicate group names exist | CIS Distribution Independent Linux Workstation L1 v2.0.0 | Unix | ACCESS CONTROL |
6.2.19 Ensure no duplicate group names exist | CIS Ubuntu Linux 18.04 LXD Container L1 v1.0.0 | Unix | ACCESS CONTROL |
6.2.19 Ensure no duplicate group names exist | CIS CentOS 6 Workstation L1 v3.0.0 | Unix | ACCESS CONTROL |
6.3.2 Ensure Local Accounts can ONLY be used during loss of external AAA | CIS Juniper OS Benchmark v2.1.0 L1 | Juniper | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION |
6.6.2 Ensure Login Class is set for all Users Accounts | CIS Juniper OS Benchmark v2.1.0 L1 | Juniper | ACCESS CONTROL |
6.6.3 Ensure Idle Timeout is set for all Login Classes | CIS Juniper OS Benchmark v2.1.0 L1 | Juniper | ACCESS CONTROL |
6.6.4 Ensure Custom Login Classes have Permissions Defined | CIS Juniper OS Benchmark v2.1.0 L1 | Juniper | ACCESS CONTROL |
7.9 FileVault and Local Account Password Reset using AppleID | CIS Apple macOS 10.13 L2 v1.1.0 | Unix | ACCESS CONTROL |
7.11 App Store Password Settings | CIS Apple macOS 10.12 L2 v1.2.0 | Unix | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
7.11 App Store Password Settings | CIS Apple macOS 10.13 L2 v1.1.0 | Unix | ACCESS CONTROL, CONFIGURATION MANAGEMENT |