Item Search

NameAudit NamePluginCategory
1.1.2 Ensure /tmp is configuredCIS Red Hat 6 Workstation L2 v3.0.0Unix

CONFIGURATION MANAGEMENT

1.1.2 Ensure /tmp is configuredCIS Red Hat 6 Server L2 v3.0.0Unix

CONFIGURATION MANAGEMENT

1.1.4 (L1) Ensure administrative accounts use licenses with a reduced application footprintCIS Microsoft 365 Foundations v6.0.1 L1 E5microsoft_azure

ACCESS CONTROL

1.1.11 Ensure separate partition exists for /var/tmpCIS Fedora 19 Family Linux Workstation L2 v1.0.0Unix

CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

1.1.11 Ensure separate partition exists for /var/tmpCIS Fedora 19 Family Linux Server L2 v1.0.0Unix

CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

2.1.1.3 Ensure iCloud Drive Document and Desktop Sync Is DisabledCIS Apple macOS 26 Tahoe v1.0.0 L2Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

2.1.1.3 Ensure iCloud Drive Document and Desktop Sync Is DisabledCIS Apple macOS 15.0 Sequoia v2.0.0 L2Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

2.1.1.3 Ensure iCloud Drive Document and Desktop Sync Is DisabledCIS Apple macOS 13.0 Ventura v4.0.0 L2Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

3.3.1.1 Ensure net.ipv4.ip_forward is configuredCIS Amazon Linux 2 v4.0.0 L1 ServerUnix

CONFIGURATION MANAGEMENT

3.3.1.2 Ensure net.ipv4.conf.all.forwarding is configuredCIS Amazon Linux 2 v4.0.0 L1 ServerUnix

CONFIGURATION MANAGEMENT

3.3.1.3 Ensure net.ipv4.conf.default.forwarding is configuredCIS Amazon Linux 2 v4.0.0 L1 ServerUnix

CONFIGURATION MANAGEMENT

3.3.2.1 Ensure net.ipv6.conf.all.forwarding is configuredCIS Amazon Linux 2 v4.0.0 L1 ServerUnix

CONFIGURATION MANAGEMENT

3.3.2.2 Ensure net.ipv6.conf.default.forwarding is configuredCIS Amazon Linux 2 v4.0.0 L1 ServerUnix

CONFIGURATION MANAGEMENT

5.1.1 Ensure Home Folders Are SecureCIS Apple macOS 10.15 Catalina v3.0.0 L1Unix

ACCESS CONTROL, MEDIA PROTECTION

5.1.1 Ensure Home Folders Are SecureCIS Apple macOS 11.0 Big Sur v4.0.0 L1Unix

ACCESS CONTROL, MEDIA PROTECTION

5.1.1 Ensure Home Folders Are SecureCIS Apple macOS 10.14 v2.0.0 L1Unix

ACCESS CONTROL, MEDIA PROTECTION

5.1.1 Secure Home FoldersCIS Apple macOS 10.12 L1 v1.2.0Unix

CONFIGURATION MANAGEMENT

5.1.1 Secure Home FoldersCIS Apple macOS 10.13 L1 v1.1.0Unix

CONFIGURATION MANAGEMENT

5.1.4.5 (L1) Ensure Local Administrator Password Solution is enabledCIS Microsoft 365 Foundations v6.0.1 L1 E3microsoft_azure

IDENTIFICATION AND AUTHENTICATION

5.1.4.5 (L1) Ensure Local Administrator Password Solution is enabledCIS Microsoft 365 Foundations v6.0.1 L1 E5microsoft_azure

IDENTIFICATION AND AUTHENTICATION

5.4.1 Ensure the GKE Metadata Server is EnabledCIS Google Kubernetes Engine GKE v1.9.0 L2 GCPGCP

CONFIGURATION MANAGEMENT

5.5.2 Ensure Node Auto-Repair is Enabled for GKE NodesCIS Google Kubernetes Engine GKE v1.9.0 L2 GCPGCP

RISK ASSESSMENT

5.5.4 When creating New Clusters - Automate GKE version management using Release ChannelsCIS Google Kubernetes Engine GKE v1.9.0 L1 GCPGCP

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

5.5.5 Ensure Shielded GKE Nodes are EnabledCIS Google Kubernetes Engine GKE v1.9.0 L1 GCPGCP

CONFIGURATION MANAGEMENT

5.5.6 Ensure Integrity Monitoring for Shielded GKE Nodes is EnabledCIS Google Kubernetes Engine GKE v1.9.0 L1 GCPGCP

RISK ASSESSMENT

5.5.7 Ensure Secure Boot for Shielded GKE Nodes is EnabledCIS Google Kubernetes Engine GKE v1.9.0 L2 GCPGCP

RISK ASSESSMENT

5.6.2 Ensure use of VPC-native clustersCIS Google Kubernetes Engine GKE v1.9.0 L1 GCPGCP

SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION

6.3 Use CloudFront Content Distribution NetworkCIS Amazon Web Services Three-tier Web Architecture L1 1.0.0amazon_aws

CONFIGURATION MANAGEMENT

6.4 Ensure DNS sinkholing is configured on all anti-spyware profiles in useCIS Palo Alto Firewall 9 v1.1.0 L1Palo_Alto

SYSTEM AND INFORMATION INTEGRITY

6.19 Create the Web tier Security Group and ensure it allows inbound connections from Web tier ELB Security Group for explicit portsCIS Amazon Web Services Three-tier Web Architecture L1 1.0.0amazon_aws

SYSTEM AND COMMUNICATIONS PROTECTION

6.22 Create the App tier Security Group and ensure it allows inbound connections from App tier ELB Security Group for explicit portsCIS Amazon Web Services Three-tier Web Architecture L1 1.0.0amazon_aws

SYSTEM AND COMMUNICATIONS PROTECTION

6.24 Create the Data tier Security Group and ensure it allows inbound connections from App tier Security Group for explicit portsCIS Amazon Web Services Three-tier Web Architecture L1 1.0.0amazon_aws

SYSTEM AND COMMUNICATIONS PROTECTION

7.4 Software Inventory ConsiderationsCIS Apple OSX 10.11 El Capitan L2 v1.1.0Unix
7.4 Software Inventory ConsiderationsCIS Apple OSX 10.9 L2 v1.3.0Unix
8.1.12 Ensure That 'All users with the following roles' is set to 'Owner'CIS Microsoft Azure Foundations v5.0.0 L1microsoft_azure

INCIDENT RESPONSE

18.10.17.1 (L1) Ensure 'Download Mode' is NOT set to 'Enabled: Internet'CIS Microsoft Windows 10 Enterprise v4.0.0 L1Windows

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

18.10.17.1 (L1) Ensure 'Download Mode' is NOT set to 'Enabled: Internet'CIS Microsoft Windows 10 Enterprise v4.0.0 L1 NGWindows

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

18.10.17.1 (L1) Ensure 'Download Mode' is NOT set to 'Enabled: Internet'CIS Microsoft Windows 10 Stand-alone v4.0.0 L1Windows

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

18.10.17.1 (L1) Ensure 'Download Mode' is NOT set to 'Enabled: Internet'CIS Microsoft Windows 10 Stand-alone v4.0.0 L1 NGWindows

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

18.10.17.1 (L1) Ensure 'Download Mode' is NOT set to 'Enabled: Internet'CIS Microsoft Windows 10 Stand-alone v4.0.0 L1 BLWindows

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

18.10.17.1 (L1) Ensure 'Download Mode' is NOT set to 'Enabled: Internet'CIS Microsoft Windows 10 Stand-alone v4.0.0 L1 BL NGWindows

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

18.10.17.1 (L1) Ensure 'Download Mode' is NOT set to 'Enabled: Internet'CIS Microsoft Windows 10 Enterprise v4.0.0 L1 BL NGWindows

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

18.10.17.1 Ensure 'Download Mode' is NOT set to 'Enabled: Internet'CIS Microsoft Windows 11 Enterprise v5.0.1 L1Windows

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

18.10.93.4.3 (L1) Ensure 'Select when Quality Updates are received' is set to 'Enabled: 0 days'CIS Microsoft Windows 10 Stand-alone v4.0.0 L1 BLWindows

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

18.10.93.4.3 (L1) Ensure 'Select when Quality Updates are received' is set to 'Enabled: 0 days'CIS Microsoft Windows 10 Stand-alone v4.0.0 L1 NGWindows

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

18.10.93.4.3 (L1) Ensure 'Select when Quality Updates are received' is set to 'Enabled: 0 days'CIS Microsoft Windows Server 2019 Stand-alone v3.0.0 L1 MSWindows

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

18.10.94.4.2 Ensure 'Select when Quality Updates are received' is set to 'Enabled: 0 days'CIS Microsoft Windows 11 Stand-alone v5.0.0 L1Windows

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

18.10.94.4.2 Ensure 'Select when Quality Updates are received' is set to 'Enabled: 0 days'CIS Microsoft Windows Server 2022 Stand-alone v2.0.0 L1 MSWindows

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

Ensure that the 'local-infile' database flag for a Cloud Databases Mysql instance is set to '0'Tenable Best Practices RackSpace v2.0.0Rackspace

SYSTEM AND COMMUNICATIONS PROTECTION

WPAW-00-002200 - The Windows PAW must be configured so that all outbound connections to the Internet from a PAW are blocked.DISA Microsoft Windows PAW STIG v3r2Windows

CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION