Item Search

NameAudit NamePluginCategory
1.3.1 Set the 'banner-text' for 'banner exec'CIS Cisco IOS 15 L1 v4.1.1Cisco

ACCESS CONTROL

1.3.2 Ensure sudo commands use ptyCIS Fedora 19 Family Linux Workstation L1 v1.0.0Unix

ACCESS CONTROL

1.3.2 Set the 'banner-text' for 'banner login'CIS Cisco IOS 15 L1 v4.1.1Cisco

ACCESS CONTROL

2.2.12 Ensure 'SSL_CERT_REVOCATION' Is Set To 'REQUIRED'CIS Oracle Database 23ai v1.1.0 L1 RDBMS On Windows Server Host OS WindowsWindows

ACCESS CONTROL

2.3.8 Ensure 'SEC_MAX_FAILED_LOGIN_ATTEMPTS' Is Set To '3' Or LessCIS Oracle Database 23ai v1.1.0 L1 RDBMSOracleDB

ACCESS CONTROL

3.1 Ensure 'FAILED_LOGIN_ATTEMPTS' Is Less Than Or Equal To '5'CIS Oracle Database 23ai v1.1.0 L1 RDBMSOracleDB

ACCESS CONTROL

3.2 Ensure 'PASSWORD_LOCK_TIME' Is Greater Than Or Equal To '1'CIS Oracle Database 23ai v1.1.0 L1 RDBMSOracleDB

ACCESS CONTROL

3.3 Ensure that MongoDB is run using a non-privileged, dedicated service accountCIS MongoDB 5 L1 OS Linux v1.2.0Unix

ACCESS CONTROL

3.3 Ensure that MongoDB is run using a non-privileged, dedicated service accountCIS MongoDB 5 L1 OS Windows v1.2.0Windows

ACCESS CONTROL

4.7 Ensure account lockout is set to 15 minutesCIS VMware ESXi 6.5 v1.0.0 Level 1VMware

ACCESS CONTROL

5.1.9 Ensure at is restricted to authorized users - at.allowCIS Fedora 19 Family Linux Workstation L1 v1.0.0Unix

ACCESS CONTROL

5.2.2 Ensure sudo commands use ptyCIS CentOS 6 Workstation L1 v3.0.0Unix

ACCESS CONTROL

5.3.2 Ensure lockout for failed password attempts is configured - auth requiredCIS SUSE Linux Enterprise Workstation 11 L1 v2.1.1Unix

ACCESS CONTROL

5.3.2 Ensure lockout for failed password attempts is configured - pam_deny.soCIS Debian Family Server L1 v1.0.0Unix

ACCESS CONTROL

5.3.2.1.2 Ensure password unlock time is configuredCIS Red Hat Enterprise Linux 10 v1.0.1 L1 WorkstationUnix

ACCESS CONTROL

5.3.3 Ensure password reuse is limitedCIS Debian Family Workstation L1 v1.0.0Unix

ACCESS CONTROL

5.3.3 Ensure password reuse is limitedCIS Debian 9 Server L1 v1.0.1Unix

ACCESS CONTROL

5.3.3.1.1 Ensure password failed attempts lockout is configuredCIS AlmaLinux OS 8 v4.0.0 L1 ServerUnix

ACCESS CONTROL

5.3.3.1.1 Ensure password failed attempts lockout is configuredCIS Oracle Linux 9 v2.0.0 L1 ServerUnix

ACCESS CONTROL

5.3.3.1.1 Ensure password failed attempts lockout is configuredCIS Oracle Linux 9 v2.0.0 L1 WorkstationUnix

ACCESS CONTROL

5.3.3.1.1 Ensure password failed attempts lockout is configuredCIS Red Hat Enterprise Linux 9 v2.0.0 L1 ServerUnix

ACCESS CONTROL

5.3.3.1.1 Ensure password failed attempts lockout is configuredCIS Rocky Linux 8 v3.0.0 L1 ServerUnix

ACCESS CONTROL

5.3.3.1.1 Ensure password failed attempts lockout is configuredCIS Rocky Linux 9 v2.0.0 L1 ServerUnix

ACCESS CONTROL

5.3.3.1.2 Ensure password unlock time is configuredCIS Rocky Linux 8 v3.0.0 L1 WorkstationUnix

ACCESS CONTROL

5.3.3.1.2 Ensure password unlock time is configuredCIS Rocky Linux 9 v2.0.0 L1 ServerUnix

ACCESS CONTROL

5.3.3.1.3 Ensure password failed attempts lockout includes root accountCIS AlmaLinux OS 9 v2.0.0 L2 ServerUnix

ACCESS CONTROL

5.3.3.1.3 Ensure password failed attempts lockout includes root accountCIS Oracle Linux 9 v2.0.0 L2 ServerUnix

ACCESS CONTROL

5.3.3.1.3 Ensure password failed attempts lockout includes root accountCIS Red Hat Enterprise Linux 8 v4.0.0 L2 ServerUnix

ACCESS CONTROL

5.3.3.1.3 Ensure password failed attempts lockout includes root accountCIS Red Hat Enterprise Linux 8 v4.0.0 L2 WorkstationUnix

ACCESS CONTROL

5.4.2 Ensure lockout for failed password attempts is configured - auth pam_tally2.soCIS Ubuntu Linux 16.04 LTS Server L1 v2.0.0Unix

ACCESS CONTROL

5.4.2 Ensure lockout for failed password attempts is configured - password-authCIS CentOS 6 Workstation L1 v3.0.0Unix

ACCESS CONTROL

5.4.2 Ensure lockout for failed password attempts is configured - system-authCIS CentOS 6 Workstation L1 v3.0.0Unix

ACCESS CONTROL

5.4.2 Ensure system accounts are non-loginCIS Debian 9 Workstation L1 v1.0.1Unix

ACCESS CONTROL

6.2.13 Ensure all groups in /etc/passwd exist in /etc/groupCIS Fedora 19 Family Linux Server L1 v1.0.0Unix

ACCESS CONTROL

6.2.13 Ensure no duplicate UIDs existCIS Ubuntu Linux 16.04 LTS Workstation L1 v2.0.0Unix

ACCESS CONTROL

6.2.14 Ensure no duplicate GIDs existCIS Debian Family Workstation L1 v1.0.0Unix

ACCESS CONTROL

6.2.14 Ensure no duplicate GIDs existCIS Ubuntu Linux 16.04 LTS Server L1 v2.0.0Unix

ACCESS CONTROL

6.2.14 Ensure no duplicate UIDs existCIS Fedora 19 Family Linux Server L1 v1.0.0Unix

ACCESS CONTROL

6.2.15 Ensure all groups in /etc/passwd exist in /etc/groupCIS Debian 9 Server L1 v1.0.1Unix

ACCESS CONTROL

6.2.15 Ensure no duplicate GIDs existCIS Fedora 19 Family Linux Server L1 v1.0.0Unix

ACCESS CONTROL

6.2.15 Ensure no duplicate GIDs existCIS Fedora 19 Family Linux Workstation L1 v1.0.0Unix

ACCESS CONTROL

6.2.15 Ensure no duplicate user names existCIS Debian Family Workstation L1 v1.0.0Unix

ACCESS CONTROL

6.2.16 Ensure no duplicate group names existCIS Debian Family Workstation L1 v1.0.0Unix

ACCESS CONTROL

6.2.16 Ensure no duplicate group names existCIS Ubuntu Linux 16.04 LTS Workstation L1 v2.0.0Unix

ACCESS CONTROL

6.2.17 Ensure no duplicate GIDs existCIS SUSE Linux Enterprise Server 11 L1 v2.1.1Unix

ACCESS CONTROL

6.2.17 Ensure no duplicate group names existCIS Fedora 19 Family Linux Workstation L1 v1.0.0Unix

ACCESS CONTROL

6.2.18 Ensure no duplicate user names existCIS SUSE Linux Enterprise Workstation 11 L1 v2.1.1Unix

ACCESS CONTROL

6.6.1.3 Ensure Minimum Backoff Factor of 5CIS Juniper OS Benchmark v2.1.0 L1Juniper

ACCESS CONTROL

6.6.1.4 Ensure Minimum Session Time of at least 20 secondsCIS Juniper OS Benchmark v2.1.0 L1Juniper

ACCESS CONTROL

6.6.8 Ensure login message is setCIS Juniper OS Benchmark v2.1.0 L1Juniper

ACCESS CONTROL