1.1.1 (L1) Ensure Administrative accounts are cloud-only | CIS Microsoft 365 Foundations v5.0.0 L1 E3 | microsoft_azure | ACCESS CONTROL |
1.1.1 (L1) Ensure Administrative accounts are cloud-only | CIS Microsoft 365 Foundations v5.0.0 L1 E5 | microsoft_azure | ACCESS CONTROL |
1.4 Ensure that only one user ID has write access to the WebSphere Liberty configuration files | CIS IBM WebSphere Liberty v1.0.0 L1 | Unix | ACCESS CONTROL |
1.4.1 Set 'password' for 'enable secret' | CIS Cisco IOS XE 17.x v2.1.1 L1 | Cisco | ACCESS CONTROL |
1.5 Ensure Interactive Login is Disabled | CIS MariaDB 10.6 on Linux L2 v1.1.0 | Unix | ACCESS CONTROL |
4.1.1 Ensure that the cluster-admin role is only used where required | CIS Google Kubernetes Engine (GKE) v1.7.0 L1 | GCP | ACCESS CONTROL |
4.3.4 Ensure users must provide password for escalation | CIS AlmaLinux OS 8 Server L2 v3.0.0 | Unix | ACCESS CONTROL |
4.3.4 Ensure users must provide password for escalation | CIS AlmaLinux OS 8 Workstation L2 v3.0.0 | Unix | ACCESS CONTROL |
4.3.4 Ensure users must provide password for privilege escalation | CIS Ubuntu Linux 20.04 LTS Server L2 v2.0.1 | Unix | ACCESS CONTROL |
5.1.20 Ensure sshd PermitRootLogin is disabled | CIS Oracle Linux 9 v2.0.0 L1 Server | Unix | ACCESS CONTROL |
5.1.20 Ensure sshd PermitRootLogin is disabled | CIS Red Hat Enterprise Linux 9 v2.0.0 L1 Server | Unix | ACCESS CONTROL |
5.1.20 Ensure sshd PermitRootLogin is disabled | CIS Rocky Linux 9 v2.0.0 L1 Server | Unix | ACCESS CONTROL |
5.1.20 Ensure sshd PermitRootLogin is disabled | CIS Rocky Linux 9 v2.0.0 L1 Workstation | Unix | ACCESS CONTROL |
5.2.1 Ensure sudo is installed | CIS Oracle Linux 9 v2.0.0 L1 Server | Unix | ACCESS CONTROL |
5.2.1 Ensure sudo is installed | CIS Rocky Linux 9 v2.0.0 L1 Server | Unix | ACCESS CONTROL |
5.2.2 Ensure sudo commands use pty | CIS Ubuntu Linux 24.04 LTS v1.0.0 L1 Server | Unix | ACCESS CONTROL |
5.2.2 Ensure sudo commands use pty | CIS AlmaLinux OS 9 v2.0.0 L1 Server | Unix | ACCESS CONTROL |
5.2.2 Ensure sudo commands use pty | CIS Rocky Linux 9 v2.0.0 L1 Workstation | Unix | ACCESS CONTROL |
5.2.4 Ensure users must provide password for escalation | CIS Rocky Linux 9 v2.0.0 L2 Server | Unix | ACCESS CONTROL |
5.2.4 Ensure users must provide password for escalation | CIS Rocky Linux 9 v2.0.0 L2 Workstation | Unix | ACCESS CONTROL |
5.2.4 Ensure users must provide password for privilege escalation | CIS Debian Linux 12 v1.1.0 L2 Server | Unix | ACCESS CONTROL |
5.2.6 Ensure sudo authentication timeout is configured correctly | CIS Debian Linux 11 v2.0.0 L1 Server | Unix | ACCESS CONTROL |
5.3.1 Ensure sudo is installed | CIS Fedora 28 Family Linux Server L1 v2.0.0 | Unix | ACCESS CONTROL |
5.3.4 Ensure users must provide password for escalation | CIS Fedora 28 Family Linux Server L2 v2.0.0 | Unix | ACCESS CONTROL |
6.2 Restrict Access to SYSCAT.AUDITUSE | CIS IBM DB2 v10 v1.1.0 Database Level 1 | IBM_DB2DB | ACCESS CONTROL |
6.6 Restrict Access to SYSCAT.EVENTTABLES | CIS IBM DB2 v10 v1.1.0 Database Level 2 | IBM_DB2DB | ACCESS CONTROL |
6.6 Restrict Access to SYSCAT.EVENTTABLES | CIS IBM DB2 9 Benchmark v3.0.1 Level 1 DB | IBM_DB2DB | ACCESS CONTROL |
6.9 Restrict Access to SYSCAT.PACKAGEAUTH | CIS IBM DB2 9 Benchmark v3.0.1 Level 1 DB | IBM_DB2DB | ACCESS CONTROL |
6.10 Restrict Access to SYSCAT.PACKAGES | CIS IBM DB2 v10 v1.1.0 Database Level 2 | IBM_DB2DB | ACCESS CONTROL |
6.11 Restrict Access to SYSCAT.PASSTHRUAUTH | CIS IBM DB2 v10 v1.1.0 Database Level 2 | IBM_DB2DB | ACCESS CONTROL |
6.11 Restrict Access to SYSCAT.PASSTHRUAUTH | CIS IBM DB2 9 Benchmark v3.0.1 Level 1 DB | IBM_DB2DB | ACCESS CONTROL |
6.12 Restrict Access to SYSCAT.SECURITYPOLICIES | CIS IBM DB2 v10 v1.1.0 Database Level 2 | IBM_DB2DB | ACCESS CONTROL |
6.14 Restrict Access to SYSCAT.SECURITYLABELCOMPONENTS | CIS IBM DB2 9 Benchmark v3.0.1 Level 1 DB | IBM_DB2DB | ACCESS CONTROL |
6.15 Restrict Access to SYSCAT.ROLEAUTH | CIS IBM DB2 v10 v1.1.0 Database Level 1 | IBM_DB2DB | ACCESS CONTROL |
6.18 Restrict Access to SYSCAT.SCHEMAAUTH | CIS IBM DB2 v10 v1.1.0 Database Level 1 | IBM_DB2DB | ACCESS CONTROL |
6.18 Restrict Access to SYSCAT.SECURITYPOLICYEXEMPTIONS | CIS IBM DB2 9 Benchmark v3.0.1 Level 1 DB | IBM_DB2DB | ACCESS CONTROL |
6.19 Restrict Access to SYSCAT.SCHEMATA | CIS IBM DB2 v10 v1.1.0 Database Level 2 | IBM_DB2DB | ACCESS CONTROL |
6.24 Restrict Access to Tablespaces | CIS IBM DB2 v10 v1.1.0 Database Level 1 | IBM_DB2DB | ACCESS CONTROL |
6.26 Restrict Access to SYSCAT.VARIABLEAUTH | CIS IBM DB2 v10 v1.1.0 Database Level 2 | IBM_DB2DB | ACCESS CONTROL |
6.27 Restrict Access to SYSCAT.PROCEDURES | CIS IBM DB2 9 Benchmark v3.0.1 Level 1 DB | IBM_DB2DB | ACCESS CONTROL |
6.28 Restrict Access to SYSCAT.XSROBJECTAUTH | CIS IBM DB2 v10 v1.1.0 Database Level 2 | IBM_DB2DB | ACCESS CONTROL |
6.29 Restrict Access to SYSCAT.TBSPACEAUTH | CIS IBM DB2 9 Benchmark v3.0.1 Level 2 DB | IBM_DB2DB | ACCESS CONTROL |
6.36 Restrict Access to SYSIBMADM.PRIVILEGES | CIS IBM DB2 9 Benchmark v3.0.1 Level 2 DB | IBM_DB2DB | ACCESS CONTROL |
9.4 Ensure 'super_priv' is Not Set to 'Y' for Replication Users | CIS Oracle MySQL Community Server 8.4 v1.0.0 L1 Database | MySQLDB | ACCESS CONTROL |
9.4 Ensure 'super_priv' is Not Set to 'Y' for Replication Users | CIS MySQL 8.4 Enterprise v1.0.0 L1 Database | MySQLDB | ACCESS CONTROL |
10.13 Do not run applications as privileged | CIS Apache Tomcat 10.1 v1.1.0 L1 | Unix | ACCESS CONTROL |
18.10.81.2 (L1) Ensure 'Always install with elevated privileges' is set to 'Disabled' | CIS Windows Server 2012 R2 DC L1 v3.0.0 | Windows | ACCESS CONTROL |
19.7.40.1 (L1) Ensure 'Always install with elevated privileges' is set to 'Disabled' | CIS Windows Server 2012 R2 DC L1 v3.0.0 | Windows | ACCESS CONTROL |
19.7.43.1 (L1) Ensure 'Always install with elevated privileges' is set to 'Disabled' | CIS Microsoft Windows Server 2008 Domain Controller Level 1 v3.3.1 | Windows | ACCESS CONTROL |
20.36 Ensure 'Members of the Backup Operators group have separate accounts for backup duties and normal operational tasks' | CIS Microsoft Windows Server 2019 STIG v3.0.0 STIG MS | Windows | ACCESS CONTROL |