Item Search

NameAudit NamePluginCategory
1.13 Schedule Configuration Backup JobCIS HPE Aruba Networking CX Switch v1.0.1 Optional Security RecommendationsArubaOS

CONTINGENCY PLANNING

1.13 Schedule Configuration Backup JobCIS HPE Aruba Networking CX Switch v1.0.1 L1ArubaOS

CONTINGENCY PLANNING

2.3.1.1 Ensure AirDrop Is Disabled When Not Actively Transferring FilesCIS Apple macOS 26 Tahoe v1.0.0 L1Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

2.3.1.1 Ensure AirDrop Is Disabled When Not Actively Transferring FilesCIS Apple macOS 14.0 Sonoma v3.0.0 L1Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

2.3.1.1 Ensure AirDrop Is Disabled When Not Actively Transferring FilesCIS Apple macOS 13.0 Ventura v4.0.0 L1Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

2.3.1.1 Ensure AirDrop Is Disabled When Not Actively Transferring FilesCIS Apple macOS 15.0 Sequoia v2.0.0 L1Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

2.4.11 Ensure AirDrop Is DisabledCIS Apple macOS 10.15 Catalina v3.0.0 L1Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

2.4.11 Ensure AirDrop Is Disabled When Not Actively Transferring FilesCIS Apple macOS 11.0 Big Sur v4.0.0 L1Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

2.4.11 Ensure AirDrop Is Disabled When Not Actively Transferring FilesCIS Apple macOS 12.0 Monterey v4.0.0 L1Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

3.2.1.6 Review 'Allow iCloud Keychain' settingsMobileIron - CIS Apple iOS 17 Institution Owned L1MDM

ACCESS CONTROL, CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

3.3.1 (L1) Ensure Information Protection sensitivity label policies are publishedCIS Microsoft 365 Foundations v6.0.1 L1 E5microsoft_azure

RISK ASSESSMENT

3.3.1 Ensure ip forwarding is disabledCIS Ubuntu Linux 18.04 LTS v2.2.0 L1 ServerUnix

CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION

3.3.1 Ensure ip forwarding is disabledCIS Ubuntu Linux 20.04 LTS v3.0.0 L1 WorkstationUnix

CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION

3.3.1 Ensure ip forwarding is disabledCIS Debian Linux 12 v1.1.0 L1 WorkstationUnix

CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION

3.3.1 Ensure ip forwarding is disabledCIS Oracle Linux 9 v2.0.0 L1 WorkstationUnix

CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION

3.3.1 Ensure ip forwarding is disabledCIS Ubuntu Linux 18.04 LTS v2.2.0 L1 WorkstationUnix

CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION

3.3.1 Ensure ip forwarding is disabledCIS AlmaLinux OS 9 v2.0.0 L1 ServerUnix

CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION

3.3.1 Ensure ip forwarding is disabledCIS Oracle Linux 7 v4.0.0 L1 WorkstationUnix

CONFIGURATION MANAGEMENT

3.3.1 Ensure ip forwarding is disabledCIS Red Hat Enterprise Linux 7 v4.0.0 L1 ServerUnix

CONFIGURATION MANAGEMENT

3.3.1 Ensure ip forwarding is disabledCIS Red Hat Enterprise Linux 9 v2.0.0 L1 ServerUnix

CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION

3.3.1 Ensure ip forwarding is disabledCIS Ubuntu Linux 20.04 LTS v3.0.0 L1 ServerUnix

CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION

3.3.1 Ensure ip forwarding is disabledCIS Ubuntu Linux 24.04 LTS v1.0.0 L1 WorkstationUnix

CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION

3.4.1 Configure LLDPCIS Cisco NX-OS v1.2.0 L1Cisco

SECURITY ASSESSMENT AND AUTHORIZATION, CONFIGURATION MANAGEMENT, CONTINGENCY PLANNING, PLANNING, PROGRAM MANAGEMENT, SYSTEM AND SERVICES ACQUISITION, SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY

3.4.2 Configure CDPCIS Cisco NX-OS v1.2.0 L2Cisco

CONFIGURATION MANAGEMENT, CONTINGENCY PLANNING, PLANNING, PROGRAM MANAGEMENT, SYSTEM AND SERVICES ACQUISITION, SYSTEM AND COMMUNICATIONS PROTECTION

3.6 Audit Software InventoryCIS Apple macOS 15.0 Sequoia v2.0.0 L2Unix

CONFIGURATION MANAGEMENT, MAINTENANCE

3.6 Audit Software InventoryCIS Apple macOS 26 Tahoe v1.0.0 L2Unix

CONFIGURATION MANAGEMENT, MAINTENANCE

3.7 Audit Software InventoryCIS Apple macOS 13.0 Ventura v4.0.0 L2Unix

CONFIGURATION MANAGEMENT, MAINTENANCE

3.7 Audit Software InventoryCIS Apple macOS 11.0 Big Sur v4.0.0 L2Unix

CONFIGURATION MANAGEMENT, MAINTENANCE

3.7 Audit Software InventoryCIS Apple macOS 10.14 v2.0.0 L2Unix

CONFIGURATION MANAGEMENT, MAINTENANCE

3.7 Audit Software InventoryCIS Apple macOS 10.15 Catalina v3.0.0 L2Unix

CONFIGURATION MANAGEMENT, MAINTENANCE

3.7 Audit Software InventoryCIS Apple macOS 12.0 Monterey v4.0.0 L2Unix

CONFIGURATION MANAGEMENT, MAINTENANCE

3.7 Audit Software InventoryCIS Apple macOS 14.0 Sonoma v3.0.0 L2Unix

CONFIGURATION MANAGEMENT, MAINTENANCE

5.1.4 Ensure only trusted container images are usedCIS Google Kubernetes Engine GKE Autopilot v1.3.0 L2GCP

CONFIGURATION MANAGEMENT

5.1.4 Ensure only trusted container images are usedCIS Google Kubernetes Engine GKE v1.9.0 L2 GCPGCP

CONFIGURATION MANAGEMENT

5.2.2.3 (L1) Enable Conditional Access policies to block legacy authenticationCIS Microsoft 365 Foundations v6.0.1 L1 E3microsoft_azure

CONFIGURATION MANAGEMENT

5.2.2.3 (L1) Enable Conditional Access policies to block legacy authenticationCIS Microsoft 365 Foundations v6.0.1 L1 E5microsoft_azure

CONFIGURATION MANAGEMENT

5.2.2.6 (L1) Enable Identity Protection user risk policiesCIS Microsoft 365 Foundations v6.0.1 L1 E5microsoft_azure

SYSTEM AND INFORMATION INTEGRITY

5.2.2.8 (L2) Ensure 'sign-in risk' is blocked for medium and high riskCIS Microsoft 365 Foundations v6.0.1 L2 E5microsoft_azure

SYSTEM AND INFORMATION INTEGRITY

5.2.2.9 (L1) Ensure a managed device is required for authenticationCIS Microsoft 365 Foundations v6.0.1 L1 E3microsoft_azure

IDENTIFICATION AND AUTHENTICATION

5.2.2.9 (L1) Ensure a managed device is required for authenticationCIS Microsoft 365 Foundations v6.0.1 L1 E5microsoft_azure

IDENTIFICATION AND AUTHENTICATION

5.2.5 Ensure that multifactor authentication is required for risky sign-insCIS Microsoft Azure Foundations v5.0.0 L2microsoft_azure

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

5.5.3 Ensure Node Auto-Upgrade is Enabled for GKE NodesCIS Google Kubernetes Engine GKE v1.9.0 L2 GCPGCP

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

7.4 Software Inventory ConsiderationsCIS Apple macOS 10.13 L2 v1.1.0Unix

CONFIGURATION MANAGEMENT

8.1.16 Ensure that Microsoft Defender External Attack Surface Monitoring (EASM) is enabledCIS Microsoft Azure Foundations v5.0.0 L2microsoft_azure

RISK ASSESSMENT

18.10.93.4.2 (L1) Ensure 'Select when Preview Builds and Feature Updates are received' is set to 'Enabled: 180 or more days'CIS Microsoft Windows 10 Enterprise v4.0.0 L1Windows

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

18.10.93.4.2 (L1) Ensure 'Select when Preview Builds and Feature Updates are received' is set to 'Enabled: 180 or more days'CIS Microsoft Windows 10 Enterprise v4.0.0 L1 BLWindows

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

18.10.93.4.2 (L1) Ensure 'Select when Preview Builds and Feature Updates are received' is set to 'Enabled: 180 or more days'CIS Microsoft Windows 10 Enterprise v4.0.0 L1 BL NGWindows

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

18.10.93.4.2 (L1) Ensure 'Select when Preview Builds and Feature Updates are received' is set to 'Enabled: 180 or more days'CIS Microsoft Windows 10 Enterprise v4.0.0 L1 NGWindows

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

103.2 (L1) Ensure 'Defer Feature Updates Period in Days' is set to 'Enabled: 180 or more days'CIS Microsoft Intune for Windows 10 v4.0.0 L1Windows

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

MYS8-00-008100 - The MySQL Database Server 8.0 must protect its audit configuration from unauthorized modification.DISA Oracle MySQL 8.0 v2r2 DBMySQLDB

AUDIT AND ACCOUNTABILITY