Item Search

NameAudit NamePluginCategory
1.1.8 Ensure nodev option set on /var partitionCIS Google Container-Optimized OS v1.2.0 L2 ServerUnix

ACCESS CONTROL, MEDIA PROTECTION

1.5.1.4 Ensure permissions on /etc/motd are configuredCIS Google Container-Optimized OS v1.2.0 L2 ServerUnix

ACCESS CONTROL, MEDIA PROTECTION

1.7.3 Ensure the Standard Mandatory DoD Notice and Consent Banner are configuredCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIGUnix

ACCESS CONTROL

4.1.3 Ensure permissions on all logfiles are configuredCIS Google Container-Optimized OS v1.2.0 L2 ServerUnix

ACCESS CONTROL, MEDIA PROTECTION

4.2.3 Ensure permissions on all logfiles are configuredCIS CentOS Linux 8 Server L1 v2.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

4.2.3 Ensure permissions on all logfiles are configuredCIS SUSE Linux Enterprise 12 v3.2.1 L1 WorkstationUnix

ACCESS CONTROL, MEDIA PROTECTION

4.2.3 Ensure permissions on SSH public host key files are configuredCIS AlmaLinux OS 8 Workstation L1 v3.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

4.2.3 Ensure permissions on SSH public host key files are configuredCIS CentOS Linux 7 v4.0.0 L1 WorkstationUnix

ACCESS CONTROL, MEDIA PROTECTION

4.2.3 Ensure permissions on SSH public host key files are configuredCIS Red Hat Enterprise Linux 7 v4.0.0 L1 WorkstationUnix

ACCESS CONTROL, MEDIA PROTECTION

4.2.3 Ensure permissions on SSH public host key files are configuredCIS Rocky Linux 8 Server L1 v2.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

4.2.3 Ensure permissions on SSH public host key files are configuredCIS Debian 10 Server L1 v2.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

4.2.3 Ensure permissions on SSH public host key files are configuredCIS Debian 10 Workstation L1 v2.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

4.2.4 Ensure permissions on all logfiles are configuredCIS Amazon Linux 2 STIG v2.0.0 L1 WorkstationUnix

ACCESS CONTROL, MEDIA PROTECTION

4.3.7 Ensure access to the su command is restrictedCIS CentOS Linux 7 v4.0.0 L1 ServerUnix

ACCESS CONTROL, MEDIA PROTECTION

4.3.7 Ensure access to the su command is restrictedCIS CentOS Linux 7 v4.0.0 L1 WorkstationUnix

ACCESS CONTROL, MEDIA PROTECTION

4.3.7 Ensure access to the su command is restrictedCIS Oracle Linux 7 v4.0.0 L1 ServerUnix

ACCESS CONTROL, MEDIA PROTECTION

4.3.7 Ensure access to the su command is restrictedCIS Oracle Linux 7 v4.0.0 L1 WorkstationUnix

ACCESS CONTROL, MEDIA PROTECTION

5.1.1 Ensure permissions on /etc/ssh/sshd_config are configuredCIS Google Container-Optimized OS v1.2.0 L1 ServerUnix

ACCESS CONTROL, MEDIA PROTECTION

5.1.2 Ensure permissions on /etc/crontab are configuredCIS CentOS Linux 8 Workstation L1 v2.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

5.1.2 Ensure permissions on /etc/crontab are configuredCIS CentOS Linux 8 Server L1 v2.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

5.1.3 Ensure permissions on /etc/cron.hourly are configuredCIS SUSE Linux Enterprise 12 v3.2.1 L1 ServerUnix

ACCESS CONTROL, MEDIA PROTECTION

5.1.3 Ensure permissions on /etc/cron.hourly are configuredCIS SUSE Linux Enterprise 12 v3.2.1 L1 WorkstationUnix

ACCESS CONTROL, MEDIA PROTECTION

5.1.3 Ensure permissions on /etc/cron.hourly are configuredCIS CentOS Linux 8 Server L1 v2.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

5.1.3 Ensure permissions on /etc/cron.hourly are configuredCIS Amazon Linux 2 STIG v2.0.0 L1 ServerUnix

ACCESS CONTROL, MEDIA PROTECTION

5.1.3 Ensure permissions on SSH public host key files are configuredCIS Google Container-Optimized OS v1.2.0 L1 ServerUnix

ACCESS CONTROL, MEDIA PROTECTION

5.1.5 Ensure permissions on /etc/cron.weekly are configuredCIS CentOS Linux 8 Server L1 v2.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

5.1.6 Ensure permissions on /etc/cron.monthly are configuredCIS CentOS Linux 8 Server L1 v2.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

5.1.6 Ensure permissions on /etc/cron.monthly are configuredCIS CentOS Linux 8 Workstation L1 v2.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

5.1.7 Ensure permissions on /etc/cron.d are configuredCIS CentOS Linux 8 Workstation L1 v2.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

5.1.7 Ensure permissions on /etc/cron.d are configuredCIS CentOS Linux 8 Server L1 v2.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

5.2.1 Ensure permissions on /etc/ssh/sshd_config are configuredCIS CentOS Linux 8 Server L1 v2.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

5.2.2 Ensure permissions on SSH private host key files are configuredCIS CentOS Linux 8 Server L1 v2.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

5.2.2 Ensure permissions on SSH private host key files are configuredCIS Debian 8 Workstation L1 v2.0.2Unix

ACCESS CONTROL, MEDIA PROTECTION

5.2.2 Ensure permissions on SSH private host key files are configuredCIS CentOS Linux 8 Workstation L1 v2.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

5.2.2 Ensure permissions on SSH private host key files are configuredCIS Fedora 28 Family Linux Server L1 v2.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

5.2.2 Ensure permissions on SSH private host key files are configuredCIS Fedora 28 Family Linux Workstation L1 v2.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

5.2.3 Ensure permissions on SSH public host key files are configuredCIS Fedora 28 Family Linux Server L1 v2.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

5.2.7 Ensure access to the su command is restrictedCIS Red Hat Enterprise Linux 9 v2.0.0 L1 ServerUnix

ACCESS CONTROL, MEDIA PROTECTION

5.2.7 Ensure access to the su command is restrictedCIS Red Hat Enterprise Linux 9 v2.0.0 L1 WorkstationUnix

ACCESS CONTROL, MEDIA PROTECTION

5.3.3 Ensure default group for the root account is GID 0CIS Google Container-Optimized OS v1.2.0 L1 ServerUnix

ACCESS CONTROL, MEDIA PROTECTION

5.3.4 Ensure default user umask is 027 or more restrictiveCIS Google Container-Optimized OS v1.2.0 L2 ServerUnix

ACCESS CONTROL, MEDIA PROTECTION

5.3.7 Ensure access to the su command is restrictedCIS Fedora 28 Family Linux Server L1 v2.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

5.6 Ensure access to the su command is restrictedCIS SUSE Linux Enterprise 12 v3.2.1 L1 ServerUnix

ACCESS CONTROL, MEDIA PROTECTION

6.1.11 Ensure no world writable files existCIS Fedora 28 Family Linux Server L1 v2.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

6.1.11 Ensure no world writable files existCIS Fedora 28 Family Linux Workstation L1 v2.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

6.1.14 Audit SUID executablesCIS CentOS Linux 8 Workstation L1 v2.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

6.1.15 Audit SGID executablesCIS Fedora 28 Family Linux Server L1 v2.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

6.2.18 Ensure there are no unnecessary accountsCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIGUnix

CONFIGURATION MANAGEMENT

18.9.69.1 Ensure 'Turn off Automatic Download and Install of updates' is set to 'Disabled'CIS Microsoft Windows 8.1 v2.4.1 L1Windows

CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY

18.9.69.2 Ensure 'Turn off the offer to update to the latest version of Windows' is set to 'Enabled'CIS Microsoft Windows 8.1 v2.4.1 L1Windows

CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY