Item Search

NameAudit NamePluginCategory
1.1 Remove extraneous files and directories - /webapps/docsCIS Apache Tomcat 9 L2 v1.2.0 MiddlewareUnix

CONFIGURATION MANAGEMENT

1.3.4 Ensure 'Minimum Lowercase Letters' is greater than or equal to 1CIS Palo Alto Firewall 10 v1.2.0 L1Palo_Alto

IDENTIFICATION AND AUTHENTICATION

1.3.5 Ensure 'Minimum Numeric Letters' is greater than or equal to 1CIS Palo Alto Firewall 10 v1.2.0 L1Palo_Alto

IDENTIFICATION AND AUTHENTICATION

1.3.6 Ensure 'Minimum Special Characters' is greater than or equal to 1CIS Palo Alto Firewall 10 v1.2.0 L1Palo_Alto

IDENTIFICATION AND AUTHENTICATION

1.4 Enable system data files and security update installs - 'ConfigDataInstall'CIS Apple OSX 10.10 Yosemite L1 v1.2.0Unix

SYSTEM AND INFORMATION INTEGRITY

2.2 Configure the ESXi host firewall to restrict access to services running on the hostCIS VMware ESXi 5.5 v1.2.0 Level 1VMware

ACCESS CONTROL

2.4.4 Disable Printer SharingCIS Apple OSX 10.10 Yosemite L1 v1.2.0Unix

CONFIGURATION MANAGEMENT

2.4.5 Disable Remote LoginCIS Apple OSX 10.10 Yosemite L1 v1.2.0Unix

ACCESS CONTROL

2.4.7 Disable Bluetooth SharingCIS Apple OSX 10.10 Yosemite L1 v1.2.0Unix
2.6 Prevent unintended use of dvfilter network APIsCIS VMware ESXi 5.5 v1.2.0 Level 1VMware

ACCESS CONTROL

2.6.1 Enable FileVault - Encryption StatusCIS Apple OSX 10.10 Yosemite L1 v1.2.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION

2.6.5 Review Application Firewall RulesCIS Apple OSX 10.10 Yosemite L1 v1.2.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION

2.6.7 Monitor Location Services AccessCIS Apple OSX 10.10 Yosemite L2 v1.2.0Unix
2.7 Remove expired or revoked SSL certificates from the ESXi serverCIS VMware ESXi 5.5 v1.2.0 Level 1VMware
2.7.2 iCloud keychainCIS Apple OSX 10.10 Yosemite L2 v1.2.0Unix
3.2 Disable the Shutdown portCIS Apache Tomcat 9 L2 v1.2.0 MiddlewareUnix

SECURITY ASSESSMENT AND AUTHORIZATION, CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

3.2 Enable security auditingCIS Apple OSX 10.10 Yosemite L1 v1.2.0Unix

AUDIT AND ACCOUNTABILITY

3.3 Configure remote logging for ESXi hostsCIS VMware ESXi 5.5 v1.2.0 Level 1VMware

AUDIT AND ACCOUNTABILITY

4.1 Create a non-root user account for local admin accessCIS VMware ESXi 5.5 v1.2.0 Level 1VMware
4.1 Ensure 'Antivirus Update Schedule' is set to download and install updates hourlyCIS Palo Alto Firewall 10 v1.2.0 L1Palo_Alto

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

4.6 Ensure nfs server is not runningCIS Apple OSX 10.10 Yosemite L1 v1.2.0Unix

CONFIGURATION MANAGEMENT

4.7 Restrict access to Tomcat web application directoryCIS Apache Tomcat 9 L1 v1.2.0 MiddlewareUnix

ACCESS CONTROL, MEDIA PROTECTION

5.2 Disable ESXi Shell unless needed for diagnostics or troubleshootingCIS VMware ESXi 5.5 v1.2.0 Level 1VMware

CONFIGURATION MANAGEMENT

5.2.4 Complex passwords must contain a Numeric Character - '1 number'CIS Apple OSX 10.10 Yosemite L1 v1.2.0Unix

IDENTIFICATION AND AUTHENTICATION

5.10 Require an administrator password to access system-wide preferencesCIS Apple OSX 10.10 Yosemite L1 v1.2.0Unix

CONFIGURATION MANAGEMENT

6.10 Ensure that access to every URL is loggedCIS Palo Alto Firewall 10 v1.2.0 L1Palo_Alto

AUDIT AND ACCOUNTABILITY, SYSTEM AND COMMUNICATIONS PROTECTION

6.12 Ensure secure URL filtering is enabled for all security policies allowing traffic to the InternetCIS Palo Alto Firewall 10 v1.2.0 L1Palo_Alto

SYSTEM AND COMMUNICATIONS PROTECTION

6.14 Ensure a secure Data Filtering profile is applied to all security policies allowing traffic to or from the InternetCIS Palo Alto Firewall 10 v1.2.0 L1Palo_Alto

SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION

6.17 Ensure that all zones have Zone Protection Profiles with all Reconnaissance Protection settings enabled, tuned, and set to appropriate actionsCIS Palo Alto Firewall 10 v1.2.0 L1Palo_Alto

SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION

6.19 Ensure that User Credential Submission uses the action of 'block' or 'continue' on the URL categoriesCIS Palo Alto Firewall 10 v1.2.0 L1Palo_Alto

SYSTEM AND INFORMATION INTEGRITY

7.2 Specify file handler in logging.properties files - check if java.util.logging.ConsoleHandler logging is enabled in web applicationCIS Apache Tomcat 9 L1 v1.2.0 MiddlewareUnix

AUDIT AND ACCOUNTABILITY

7.2 Specify file handler in logging.properties files - check if org.apache.juli.FileHandler logging is enabled in defaultCIS Apache Tomcat 9 L1 v1.2.0 MiddlewareUnix

AUDIT AND ACCOUNTABILITY

7.4 Ensure directory in context.xml is a secure location - configurationCIS Apache Tomcat 9 L1 v1.2.0 MiddlewareUnix

ACCESS CONTROL, MEDIA PROTECTION

8.1 Ensure 'SSL Forward Proxy Policy' for traffic destined to the Internet is configuredCIS Palo Alto Firewall 10 v1.2.0 L1Palo_Alto

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

9.1 Starting Tomcat with Security ManagerCIS Apache Tomcat 9 L1 v1.2.0 MiddlewareUnix

CONFIGURATION MANAGEMENT

9.2 Disabling auto deployment of applicationsCIS Apache Tomcat 9 L2 v1.2.0 MiddlewareUnix

CONFIGURATION MANAGEMENT

10.15 Do not resolve hosts on logging valvesCIS Apache Tomcat 9 L2 v1.2.0 MiddlewareUnix

SYSTEM AND INFORMATION INTEGRITY

10.18 Use the logEffectiveWebXml and metadata-complete settings for deploying applications in production - context.xmlCIS Apache Tomcat 9 L1 v1.2.0 MiddlewareUnix

AUDIT AND ACCOUNTABILITY

18.9.31.2 Ensure 'Turn off Data Execution Prevention for Explorer' is set to 'Disabled'CIS Azure Compute Microsoft Windows Server 2022 v1.0.0 L1 DCWindows

SYSTEM AND INFORMATION INTEGRITY

18.10.9.2.13 (BL) Ensure 'Require additional authentication at startup' is set to 'Enabled'CIS Microsoft Windows 10 Stand-alone v3.0.0 L2 BLWindows

ACCESS CONTROL

18.10.9.2.13 (L1) Ensure 'Require additional authentication at startup' is set to 'Enabled'CIS Microsoft Windows 10 EMS Gateway v3.0.0 L1Windows

ACCESS CONTROL

18.10.9.2.14 (BL) Ensure 'Require additional authentication at startup: Allow BitLocker without a compatible TPM' is set to 'Enabled: False'CIS Microsoft Windows 10 Stand-alone v3.0.0 L1 BLWindows

ACCESS CONTROL

18.10.9.2.14 (BL) Ensure 'Require additional authentication at startup: Allow BitLocker without a compatible TPM' is set to 'Enabled: False'CIS Microsoft Windows 10 Stand-alone v3.0.0 L1 BL NGWindows

ACCESS CONTROL

18.10.9.2.14 (BL) Ensure 'Require additional authentication at startup: Allow BitLocker without a compatible TPM' is set to 'Enabled: False'CIS Microsoft Windows 10 Stand-alone v3.0.0 L2 BL NGWindows

ACCESS CONTROL

18.10.9.2.14 (L1) Ensure 'Require additional authentication at startup: Allow BitLocker without a compatible TPM' is set to 'Enabled: False'CIS Microsoft Windows 10 EMS Gateway v3.0.0 L1Windows

ACCESS CONTROL

18.10.10.2.11 (BL) Ensure 'Require additional authentication at startup: Allow BitLocker without a compatible TPM' is set to 'Enabled: False'CIS Microsoft Windows 11 Stand-alone v4.0.0 BLWindows

ACCESS CONTROL

18.10.36.1 (L1) Ensure 'Turn off location' is set to 'Enabled'CIS Microsoft Windows 10 EMS Gateway v3.0.0 L1Windows

CONFIGURATION MANAGEMENT

18.10.36.1 (L2) Ensure 'Turn off location' is set to 'Enabled'CIS Microsoft Windows 10 Stand-alone v3.0.0 L2 BLWindows

CONFIGURATION MANAGEMENT

18.10.36.1 (L2) Ensure 'Turn off location' is set to 'Enabled'CIS Microsoft Windows 10 Stand-alone v3.0.0 L2 NGWindows

CONFIGURATION MANAGEMENT

JUEX-NM-000520 - The Juniper EX switch must be configured to implement cryptographic mechanisms using a FIPS 140-2 approved algorithm to protect the confidentiality of remote maintenance sessions.DISA Juniper EX Series Network Device Management v2r2Juniper

MAINTENANCE