Item Search

NameAudit NamePluginCategory
1.1.1 (L1) Ensure Administrative accounts are cloud-onlyCIS Microsoft 365 Foundations v5.0.0 L1 E3microsoft_azure

ACCESS CONTROL

1.1.1 (L1) Ensure Administrative accounts are cloud-onlyCIS Microsoft 365 Foundations v5.0.0 L1 E5microsoft_azure

ACCESS CONTROL

1.4 Ensure that only one user ID has write access to the WebSphere Liberty configuration filesCIS IBM WebSphere Liberty v1.0.0 L1Unix

ACCESS CONTROL

1.4.1 Set 'password' for 'enable secret'CIS Cisco IOS XE 17.x v2.1.1 L1Cisco

ACCESS CONTROL

1.5 Ensure Interactive Login is DisabledCIS MariaDB 10.6 on Linux L2 v1.1.0Unix

ACCESS CONTROL

4.1.1 Ensure that the cluster-admin role is only used where requiredCIS Google Kubernetes Engine (GKE) v1.7.0 L1GCP

ACCESS CONTROL

4.3.4 Ensure users must provide password for escalationCIS AlmaLinux OS 8 Server L2 v3.0.0Unix

ACCESS CONTROL

4.3.4 Ensure users must provide password for escalationCIS AlmaLinux OS 8 Workstation L2 v3.0.0Unix

ACCESS CONTROL

4.3.4 Ensure users must provide password for privilege escalationCIS Ubuntu Linux 20.04 LTS Server L2 v2.0.1Unix

ACCESS CONTROL

5.1.20 Ensure sshd PermitRootLogin is disabledCIS Oracle Linux 9 v2.0.0 L1 ServerUnix

ACCESS CONTROL

5.1.20 Ensure sshd PermitRootLogin is disabledCIS Red Hat Enterprise Linux 9 v2.0.0 L1 ServerUnix

ACCESS CONTROL

5.1.20 Ensure sshd PermitRootLogin is disabledCIS Rocky Linux 9 v2.0.0 L1 ServerUnix

ACCESS CONTROL

5.1.20 Ensure sshd PermitRootLogin is disabledCIS Rocky Linux 9 v2.0.0 L1 WorkstationUnix

ACCESS CONTROL

5.2.1 Ensure sudo is installedCIS Oracle Linux 9 v2.0.0 L1 ServerUnix

ACCESS CONTROL

5.2.1 Ensure sudo is installedCIS Rocky Linux 9 v2.0.0 L1 ServerUnix

ACCESS CONTROL

5.2.2 Ensure sudo commands use ptyCIS Ubuntu Linux 24.04 LTS v1.0.0 L1 ServerUnix

ACCESS CONTROL

5.2.2 Ensure sudo commands use ptyCIS AlmaLinux OS 9 v2.0.0 L1 ServerUnix

ACCESS CONTROL

5.2.2 Ensure sudo commands use ptyCIS Rocky Linux 9 v2.0.0 L1 WorkstationUnix

ACCESS CONTROL

5.2.4 Ensure users must provide password for escalationCIS Rocky Linux 9 v2.0.0 L2 ServerUnix

ACCESS CONTROL

5.2.4 Ensure users must provide password for escalationCIS Rocky Linux 9 v2.0.0 L2 WorkstationUnix

ACCESS CONTROL

5.2.4 Ensure users must provide password for privilege escalationCIS Debian Linux 12 v1.1.0 L2 ServerUnix

ACCESS CONTROL

5.2.6 Ensure sudo authentication timeout is configured correctlyCIS Debian Linux 11 v2.0.0 L1 ServerUnix

ACCESS CONTROL

5.3.1 Ensure sudo is installedCIS Fedora 28 Family Linux Server L1 v2.0.0Unix

ACCESS CONTROL

5.3.4 Ensure users must provide password for escalationCIS Fedora 28 Family Linux Server L2 v2.0.0Unix

ACCESS CONTROL

6.2 Restrict Access to SYSCAT.AUDITUSECIS IBM DB2 v10 v1.1.0 Database Level 1IBM_DB2DB

ACCESS CONTROL

6.6 Restrict Access to SYSCAT.EVENTTABLESCIS IBM DB2 v10 v1.1.0 Database Level 2IBM_DB2DB

ACCESS CONTROL

6.6 Restrict Access to SYSCAT.EVENTTABLESCIS IBM DB2 9 Benchmark v3.0.1 Level 1 DBIBM_DB2DB

ACCESS CONTROL

6.9 Restrict Access to SYSCAT.PACKAGEAUTHCIS IBM DB2 9 Benchmark v3.0.1 Level 1 DBIBM_DB2DB

ACCESS CONTROL

6.10 Restrict Access to SYSCAT.PACKAGESCIS IBM DB2 v10 v1.1.0 Database Level 2IBM_DB2DB

ACCESS CONTROL

6.11 Restrict Access to SYSCAT.PASSTHRUAUTHCIS IBM DB2 v10 v1.1.0 Database Level 2IBM_DB2DB

ACCESS CONTROL

6.11 Restrict Access to SYSCAT.PASSTHRUAUTHCIS IBM DB2 9 Benchmark v3.0.1 Level 1 DBIBM_DB2DB

ACCESS CONTROL

6.12 Restrict Access to SYSCAT.SECURITYPOLICIESCIS IBM DB2 v10 v1.1.0 Database Level 2IBM_DB2DB

ACCESS CONTROL

6.14 Restrict Access to SYSCAT.SECURITYLABELCOMPONENTSCIS IBM DB2 9 Benchmark v3.0.1 Level 1 DBIBM_DB2DB

ACCESS CONTROL

6.15 Restrict Access to SYSCAT.ROLEAUTHCIS IBM DB2 v10 v1.1.0 Database Level 1IBM_DB2DB

ACCESS CONTROL

6.18 Restrict Access to SYSCAT.SCHEMAAUTHCIS IBM DB2 v10 v1.1.0 Database Level 1IBM_DB2DB

ACCESS CONTROL

6.18 Restrict Access to SYSCAT.SECURITYPOLICYEXEMPTIONSCIS IBM DB2 9 Benchmark v3.0.1 Level 1 DBIBM_DB2DB

ACCESS CONTROL

6.19 Restrict Access to SYSCAT.SCHEMATACIS IBM DB2 v10 v1.1.0 Database Level 2IBM_DB2DB

ACCESS CONTROL

6.24 Restrict Access to TablespacesCIS IBM DB2 v10 v1.1.0 Database Level 1IBM_DB2DB

ACCESS CONTROL

6.26 Restrict Access to SYSCAT.VARIABLEAUTHCIS IBM DB2 v10 v1.1.0 Database Level 2IBM_DB2DB

ACCESS CONTROL

6.27 Restrict Access to SYSCAT.PROCEDURESCIS IBM DB2 9 Benchmark v3.0.1 Level 1 DBIBM_DB2DB

ACCESS CONTROL

6.28 Restrict Access to SYSCAT.XSROBJECTAUTHCIS IBM DB2 v10 v1.1.0 Database Level 2IBM_DB2DB

ACCESS CONTROL

6.29 Restrict Access to SYSCAT.TBSPACEAUTHCIS IBM DB2 9 Benchmark v3.0.1 Level 2 DBIBM_DB2DB

ACCESS CONTROL

6.36 Restrict Access to SYSIBMADM.PRIVILEGESCIS IBM DB2 9 Benchmark v3.0.1 Level 2 DBIBM_DB2DB

ACCESS CONTROL

9.4 Ensure 'super_priv' is Not Set to 'Y' for Replication UsersCIS Oracle MySQL Community Server 8.4 v1.0.0 L1 DatabaseMySQLDB

ACCESS CONTROL

9.4 Ensure 'super_priv' is Not Set to 'Y' for Replication UsersCIS MySQL 8.4 Enterprise v1.0.0 L1 DatabaseMySQLDB

ACCESS CONTROL

10.13 Do not run applications as privilegedCIS Apache Tomcat 10.1 v1.1.0 L1Unix

ACCESS CONTROL

18.10.81.2 (L1) Ensure 'Always install with elevated privileges' is set to 'Disabled'CIS Windows Server 2012 R2 DC L1 v3.0.0Windows

ACCESS CONTROL

19.7.40.1 (L1) Ensure 'Always install with elevated privileges' is set to 'Disabled'CIS Windows Server 2012 R2 DC L1 v3.0.0Windows

ACCESS CONTROL

19.7.43.1 (L1) Ensure 'Always install with elevated privileges' is set to 'Disabled'CIS Microsoft Windows Server 2008 Domain Controller Level 1 v3.3.1Windows

ACCESS CONTROL

20.36 Ensure 'Members of the Backup Operators group have separate accounts for backup duties and normal operational tasks'CIS Microsoft Windows Server 2019 STIG v3.0.0 STIG MSWindows

ACCESS CONTROL