Item Search

NameAudit NamePluginCategory
1.1 Keep ESXi system properly patchedCIS VMware ESXi 5.5 v1.2.0 Level 1VMware
1.2 Verify Image Profile and VIB Acceptance LevelsCIS VMware ESXi 5.5 v1.2.0 Level 1VMware
1.3 Verify no unauthorized kernel modules are loaded on the hostCIS VMware ESXi 5.5 v1.2.0 Level 1VMware
1.4 Enable system data files and security update installs - 'ConfigDataInstall'CIS Apple OSX 10.10 Yosemite L1 v1.2.0Unix

SYSTEM AND INFORMATION INTEGRITY

1.6.3 Ensure that the Certificate Securing Remote Access VPNs is ValidCIS Palo Alto Firewall 10 v1.2.0 L2Palo_Alto

CONFIGURATION MANAGEMENT

2.1 Ensure that IP addresses are mapped to usernamesCIS Palo Alto Firewall 10 v1.2.0 L2Palo_Alto

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

2.2.1 Enable 'Set time and date automatically'CIS Apple OSX 10.10 Yosemite L2 v1.2.0Unix

AUDIT AND ACCOUNTABILITY

2.4 Disable X-Powered-By HTTP Header and Rename the Server Value for all ConnectorsCIS Apache Tomcat 9 L2 v1.2.0 MiddlewareUnix

CONFIGURATION MANAGEMENT

2.4 Do not use default self-signed certificates for ESXi communicationCIS VMware ESXi 5.5 v1.2.0 Level 1VMware
2.4.4 Disable Printer SharingCIS Apple OSX 10.10 Yosemite L1 v1.2.0Unix

CONFIGURATION MANAGEMENT

2.4.5 Disable Remote LoginCIS Apple OSX 10.10 Yosemite L1 v1.2.0Unix

ACCESS CONTROL

2.4.7 Disable Bluetooth SharingCIS Apple OSX 10.10 Yosemite L1 v1.2.0Unix
2.5 Disable client facing Stack Traces - check for defined exception typeCIS Apache Tomcat 9 L1 v1.2.0 MiddlewareUnix

CONFIGURATION MANAGEMENT

2.6.1 Enable FileVault - Encryption StatusCIS Apple OSX 10.10 Yosemite L1 v1.2.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION

2.6.7 Monitor Location Services AccessCIS Apple OSX 10.10 Yosemite L2 v1.2.0Unix
2.7.2 iCloud keychainCIS Apple OSX 10.10 Yosemite L2 v1.2.0Unix
4.2 Restrict access to $CATALINA_BASECIS Apache Tomcat 9 L1 v1.2.0 MiddlewareUnix

ACCESS CONTROL, MEDIA PROTECTION

4.3 Ensure Encryption of Data in Transit TLS or SSL (Transport Encryption)CIS MongoDB 5 L1 OS Linux v1.2.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION

4.12 Restrict access to Tomcat server.xmlCIS Apache Tomcat 9 L1 v1.2.0 MiddlewareUnix

ACCESS CONTROL, MEDIA PROTECTION

5.2 Use LockOut RealmsCIS Apache Tomcat 9 L2 v1.2.0 MiddlewareUnix

CONFIGURATION MANAGEMENT

5.6 Remove keys from SSH authorized_keys fileCIS VMware ESXi 5.5 v1.2.0 Level 2VMware

SYSTEM AND INFORMATION INTEGRITY

5.7 Set a timeout to automatically terminate idle ESXi Shell and SSH sessionsCIS VMware ESXi 5.5 v1.2.0 Level 1VMware

ACCESS CONTROL

6.1 Setup Client-cert AuthenticationCIS Apache Tomcat 9 L2 v1.2.0 MiddlewareUnix

IDENTIFICATION AND AUTHENTICATION

6.3 Ensure scheme is set accuratelyCIS Apache Tomcat 9 L1 v1.2.0 MiddlewareUnix

CONFIGURATION MANAGEMENT

7.2 Specify file handler in logging.properties files - check if org.apache.juli.FileHandler logging is enabled in web applicationCIS Apache Tomcat 9 L1 v1.2.0 MiddlewareUnix

AUDIT AND ACCOUNTABILITY

7.5 Ensure that port groups are not configured to VLAN values reserved by upstream physical switchesCIS VMware ESXi 5.5 v1.2.0 Level 1VMware
7.6 Ensure directory in logging.properties is a secure location - check log directory locationCIS Apache Tomcat 9 L1 v1.2.0 MiddlewareUnix

ACCESS CONTROL

8.2.2 Disconnect unauthorized devices - CD/DVD DevicesCIS VMware ESXi 5.5 v1.2.0 Level 2VMware
8.2.6 Prevent unauthorized removal and modification of devices.CIS VMware ESXi 5.5 v1.2.0 Level 1VMware

ACCESS CONTROL

8.3 Ensure that the Certificate used for Decryption is TrustedCIS Palo Alto Firewall 10 v1.2.0 L2Palo_Alto

CONFIGURATION MANAGEMENT

8.4.9 Disable Unity ActiveCIS VMware ESXi 5.5 v1.2.0 Level 2VMware

CONFIGURATION MANAGEMENT

8.4.10 Disable Unity Window ContentsCIS VMware ESXi 5.5 v1.2.0 Level 2VMware

CONFIGURATION MANAGEMENT

8.4.13 Disable Drag and Drop Version SetCIS VMware ESXi 5.5 v1.2.0 Level 2VMware

CONFIGURATION MANAGEMENT

8.4.21 Disable Host Guest File System ServerCIS VMware ESXi 5.5 v1.2.0 Level 2VMware

CONFIGURATION MANAGEMENT

8.4.25 Disable VM Console Drag and Drop operationsCIS VMware ESXi 5.5 v1.2.0 Level 1VMware

CONFIGURATION MANAGEMENT

8.4.27 Disable VM Console Paste operationsCIS VMware ESXi 5.5 v1.2.0 Level 1VMware

CONFIGURATION MANAGEMENT

8.4.28 Control access to VM console via VNC protocolCIS VMware ESXi 5.5 v1.2.0 Level 1VMware

CONFIGURATION MANAGEMENT

8.6.2 Disable virtual disk shrinkingCIS VMware ESXi 5.5 v1.2.0 Level 1VMware

CONFIGURATION MANAGEMENT

8.7.1 Disable VIX messages from the VMCIS VMware ESXi 5.5 v1.2.0 Level 2VMware

CONFIGURATION MANAGEMENT

8.7.2 Limit number of VM log filesCIS VMware ESXi 5.5 v1.2.0 Level 1VMware

AUDIT AND ACCOUNTABILITY

8.7.3 Do not send host information to guestsCIS VMware ESXi 5.5 v1.2.0 Level 2VMware

SYSTEM AND COMMUNICATIONS PROTECTION

8.7.4 Limit VM log file sizeCIS VMware ESXi 5.5 v1.2.0 Level 1VMware

AUDIT AND ACCOUNTABILITY

10.5 Rename the manager application - host-manager/manager.xmlCIS Apache Tomcat 9 L2 v1.2.0 MiddlewareUnix

CONFIGURATION MANAGEMENT

10.7 Turn off session facade recyclingCIS Apache Tomcat 9 L1 v1.2.0 MiddlewareUnix

CONFIGURATION MANAGEMENT

10.8 Do not allow additional path delimiters - ALLOW_ENCODED_SLASHCIS Apache Tomcat 9 L2 v1.2.0 MiddlewareUnix

CONFIGURATION MANAGEMENT

10.9 Configure connectionTimeoutCIS Apache Tomcat 9 L2 v1.2.0 MiddlewareUnix

CONFIGURATION MANAGEMENT

10.12 Do not allow symbolic linkingCIS Apache Tomcat 9 L1 v1.2.0 MiddlewareUnix

CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY

10.17 Setting Security Lifecycle Listener - check for umask present in startupCIS Apache Tomcat 9 L1 v1.2.0 MiddlewareUnix

ACCESS CONTROL

18.10.10.3.7 (BL) Ensure 'Choose how BitLocker-protected removable drives can be recovered: Save BitLocker recovery information to AD DS for removable data drives' is set to 'Enabled: False'CIS Microsoft Windows 10 Enterprise v4.0.0 L1 BL NGWindows

MEDIA PROTECTION

18.10.37.1 (L2) Ensure 'Turn off location' is set to 'Enabled'CIS Microsoft Windows Server 2016 v4.0.0 L2 MSWindows

CONFIGURATION MANAGEMENT