1.5.5 Ensure that the --peer-client-cert-auth argument is set to true | CIS Kubernetes 1.13 Benchmark v1.4.1 L1 | Unix | ACCESS CONTROL |
1.6.1.2 Ensure SELinux is not disabled in bootloader configuration - enforcing=0 | CIS CentOS 6 Workstation L1 v3.0.0 | Unix | ACCESS CONTROL |
1.6.1.2 Ensure SELinux is not disabled in bootloader configuration - selinux=0 | CIS CentOS 6 Server L1 v3.0.0 | Unix | ACCESS CONTROL |
1.6.1.6 Ensure no unconfined daemons exist | CIS CentOS 6 Workstation L1 v3.0.0 | Unix | CONFIGURATION MANAGEMENT |
1.6.2.2 Ensure the SELinux state is enforcing | CIS Distribution Independent Linux Workstation L2 v2.0.0 | Unix | ACCESS CONTROL |
1.6.3.1 Ensure AppArmor is not disabled in bootloader configuration | CIS Distribution Independent Linux Server L2 v2.0.0 | Unix | ACCESS CONTROL |
1.6.3.1 Ensure AppArmor is not disabled in bootloader configuration | CIS Distribution Independent Linux Workstation L2 v2.0.0 | Unix | ACCESS CONTROL |
2.2.1.9 Ensure 'Allow Handoff' is set to 'Disabled' | MobileIron - CIS Apple iOS 13 and iPadOS 13 v1.0.0 End User Owned L2 | MDM | ACCESS CONTROL |
2.2.1.9 Ensure 'Allow Handoff' is set to 'Disabled' | AirWatch - CIS Apple iOS 14 and iPadOS 14 v1.0.0 End User Owned L2 | MDM | ACCESS CONTROL |
2.2.1.9 Ensure 'Allow Handoff' is set to 'Disabled' | MobileIron - CIS Apple iOS 14 and iPadOS 14 v1.0.0 End User Owned L2 | MDM | ACCESS CONTROL |
2.2.1.10 Ensure 'Force Apple Watch wrist detection' is set to 'Enabled' | AirWatch - CIS Apple iOS 13 and iPadOS 13 v1.0.0 End User Owned L1 | MDM | ACCESS CONTROL |
2.2.1.10 Ensure 'Force Apple Watch wrist detection' is set to 'Enabled' | MobileIron - CIS Apple iOS 14 and iPadOS 14 v1.0.0 End User Owned L1 | MDM | ACCESS CONTROL |
2.2.7 Ensure that the certificate authorities file permissions are set to 644 or more restrictive | CIS Kubernetes 1.7.0 Benchmark v1.1.0 L1 | Unix | CONFIGURATION MANAGEMENT |
2.3.1 Ensure 'Managed Safari Web Domains' is 'Configured' | AirWatch - CIS Apple iOS 14 and iPadOS 14 v1.0.0 End User Owned L1 | MDM | ACCESS CONTROL |
2.4 Set root Ownership of BIND Directories | CIS BIND DNS v1.0.0 L1 Caching Only Name Server | Unix | ACCESS CONTROL |
2.5 Set root Ownership of BIND Configuration Files | CIS BIND DNS v1.0.0 L1 Authoritative Name Server | Unix | ACCESS CONTROL |
2.5 Set root Ownership of BIND Configuration Files | CIS BIND DNS v1.0.0 L1 Caching Only Name Server | Unix | ACCESS CONTROL |
2.7 Set Group Read-Only for BIND Files and Non-Runtime Directories - directories | CIS BIND DNS v1.0.0 L1 Caching Only Name Server | Unix | ACCESS CONTROL |
2.7 Set Group Read-Only for BIND Files and Non-Runtime Directories - files | CIS BIND DNS v1.0.0 L1 Authoritative Name Server | Unix | ACCESS CONTROL |
2.8 Set Other Permissions Read-Only for All BIND Directories and Files - directories | CIS BIND DNS v1.0.0 L1 Authoritative Name Server | Unix | ACCESS CONTROL |
2.9 Ensure 'Trustworthy' Database Property is set to 'Off' | CIS SQL Server 2012 Database L1 DB v1.6.0 | MS_SQLDB | ACCESS CONTROL |
3.2.1.1 Ensure 'Allow screenshots and screen recording' is set to 'Disabled' | AirWatch - CIS Apple iOS 13 and iPadOS 13 Institution Owned L2 | MDM | ACCESS CONTROL |
3.2.1.20 Ensure 'Allow documents from unmanaged sources in managed destinations' is set to 'Disabled' | AirWatch - CIS Apple iOS 14 and iPadOS 14 Institution Owned L1 | MDM | ACCESS CONTROL |
3.2.1.20 Ensure 'Allow documents from unmanaged sources in managed destinations' is set to 'Disabled' | MobileIron - CIS Apple iOS 14 and iPadOS 14 Institution Owned L1 | MDM | ACCESS CONTROL |
3.2.1.22 Ensure 'Allow Handoff' is set to 'Disabled' | MobileIron - CIS Apple iOS 14 and iPadOS 14 Institution Owned L1 | MDM | ACCESS CONTROL |
3.2.1.22 Ensure 'Require Touch ID / Face ID authentication before AutoFill' is set to 'Enabled' | MobileIron - CIS Apple iOS 13 and iPadOS 13 Institution Owned L1 | MDM | ACCESS CONTROL |
3.6 Ensure Other Write Access on Apache Directories and Files Is Restricted | CIS Apache HTTP Server 2.2 L1 v3.6.0 Middleware | Unix | ACCESS CONTROL |
3.6 Ensure Other Write Access on Apache Directories and Files Is Restricted | CIS Apache HTTP Server 2.2 L2 v3.6.0 | Unix | ACCESS CONTROL |
3.6.1 Ensure 'Allow user to move messages from this account' is set to 'Disabled' | MobileIron - CIS Apple iOS 14 and iPadOS 14 Institution Owned L1 | MDM | ACCESS CONTROL |
3.10 Ensure Windows local groups are not SQL Logins | CIS SQL Server 2012 Database L1 AWS RDS v1.6.0 | MS_SQLDB | ACCESS CONTROL |
3.10 Ensure Windows local groups are not SQL Logins | CIS SQL Server 2014 Database L1 AWS RDS v1.5.0 | MS_SQLDB | ACCESS CONTROL |
3.10 Ensure Windows local groups are not SQL Logins | CIS SQL Server 2014 Database L1 DB v1.5.0 | MS_SQLDB | ACCESS CONTROL |
3.12 Ensure Group Write Access for the Document Root Directories and Files Is Properly Restricted | CIS Apache HTTP Server 2.2 L2 v3.6.0 | Unix | ACCESS CONTROL |
3.13 Ensure Access to Special Purpose Application Writable Directories is Properly Restricted | CIS Apache HTTP Server 2.2 L2 v3.6.0 | Unix | ACCESS CONTROL |
4.1 Ensure Access to OS Root Directory Is Denied By Default - 'httpd.conf no Deny directives exist' | CIS Apache HTTP Server 2.2 L1 v3.6.0 Middleware | Unix | ACCESS CONTROL |
4.1 Ensure Access to OS Root Directory Is Denied By Default - 'httpd.conf no Deny directives exist' | CIS Apache HTTP Server 2.2 L2 v3.6.0 | Unix | ACCESS CONTROL |
4.1 Ensure Access to OS Root Directory Is Denied By Default - 'httpd.conf no Require directives exist' | CIS Apache HTTP Server 2.2 L1 v3.6.0 | Unix | ACCESS CONTROL |
4.3 Ensure OverRide Is Disabled for the OS Root Directory | CIS Apache HTTP Server 2.2 L1 v3.6.0 Middleware | Unix | ACCESS CONTROL |
4.4 Ensure OverRide Is Disabled for All Directories | CIS Apache HTTP Server 2.2 L2 v3.6.0 | Unix | ACCESS CONTROL |
4.4 Restrict Access to All Key Files - user root/named | CIS BIND DNS v1.0.0 L1 Caching Only Name Server | Unix | ACCESS CONTROL |
6.1.1 Audit system file permissions | CIS CentOS 6 Server L2 v3.0.0 | Unix | ACCESS CONTROL |
6.2.10 Ensure users' dot files are not group or world writable | CIS Distribution Independent Linux Server L1 v2.0.0 | Unix | ACCESS CONTROL |
6.2.13 Ensure users' .netrc Files are not group or world accessible | CIS Distribution Independent Linux Workstation L1 v2.0.0 | Unix | ACCESS CONTROL |
11.2 Ensure Apache Processes Run in the httpd_t Confined Context - httpd | CIS Apache HTTP Server 2.2 L2 v3.6.0 | Unix | ACCESS CONTROL |
System objects: Strengthen default permissions of internal system objects (e.g. Symbolic Links) | MSCT Windows 10 v2004 v1.0.0 | Windows | CONFIGURATION MANAGEMENT |
System objects: Strengthen default permissions of internal system objects (e.g. Symbolic Links) | MSCT Windows Server v1909 MS v1.0.0 | Windows | CONFIGURATION MANAGEMENT |
System objects: Strengthen default permissions of internal system objects (e.g. Symbolic Links) | MSCT Windows Server 2019 MS v1.0.0 | Windows | CONFIGURATION MANAGEMENT |
System objects: Strengthen default permissions of internal system objects (e.g. Symbolic Links) | MSCT Windows Server v20H2 DC v1.0.0 | Windows | CONFIGURATION MANAGEMENT |
System objects: Strengthen default permissions of internal system objects (e.g., Symbolic Links) | MSCT Windows Server 2012 R2 DC v1.0.0 | Windows | CONFIGURATION MANAGEMENT |
System objects: Strengthen default permissions of internal system objects (e.g., Symbolic Links) | MSCT Windows Server 2012 R2 MS v1.0.0 | Windows | CONFIGURATION MANAGEMENT |