Item Search

NameAudit NamePluginCategory
1.1.1.6 Ensure mounting of squashfs filesystems is disabled - modprobeCIS Debian 8 Server L1 v2.0.2Unix

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

1.1.1.6 Ensure mounting of squashfs filesystems is disabled - modprobeCIS Debian 8 Workstation L1 v2.0.2Unix

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

1.1.6 Ensure /dev/shm is configuredCIS SUSE Linux Enterprise 12 v3.2.1 L1 WorkstationUnix

ACCESS CONTROL, MEDIA PROTECTION

1.1.7 Ensure noexec option set on /dev/shm partitionCIS SUSE Linux Enterprise 12 v3.2.1 L1 ServerUnix

ACCESS CONTROL, MEDIA PROTECTION

1.1.7 Ensure noexec option set on /dev/shm partitionCIS SUSE Linux Enterprise 12 v3.2.1 L1 WorkstationUnix

ACCESS CONTROL, MEDIA PROTECTION

1.1.8 Ensure nodev option set on /dev/shm partitionCIS SUSE Linux Enterprise 12 v3.2.1 L1 WorkstationUnix

ACCESS CONTROL, MEDIA PROTECTION

1.1.9 Ensure nosuid option set on /dev/shm partitionCIS SUSE Linux Enterprise 12 v3.2.1 L1 WorkstationUnix

ACCESS CONTROL, MEDIA PROTECTION

1.1.9 Ensure nosuid option set on /dev/shm partitionCIS SUSE Linux Enterprise 12 v3.2.1 L1 ServerUnix

ACCESS CONTROL, MEDIA PROTECTION

1.1.11 Ensure separate partition exists for /var/tmpCIS SUSE Linux Enterprise 12 v3.2.1 L2 ServerUnix

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

1.1.13 Ensure nodev option set on /var/tmp partitionCIS SUSE Linux Enterprise 12 v3.2.1 L1 WorkstationUnix

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

1.1.16 Add noexec Option to /dev/shm PartitionCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

1.1.17 Ensure separate partition exists for /homeCIS Amazon Linux 2 STIG v2.0.0 L2 ServerUnix

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

1.1.17 Ensure separate partition exists for /homeCIS SUSE Linux Enterprise 12 v3.2.1 L2 WorkstationUnix

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

1.1.18 Ensure nodev option set on /home partitionCIS SUSE Linux Enterprise 12 v3.2.1 L1 WorkstationUnix

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

1.1.20 Ensure nodev option set on removable media partitionsCIS SUSE Linux Enterprise 12 v3.2.1 L1 WorkstationUnix

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

1.1.20 Ensure noexec option set on removable media partitionsCIS SUSE Linux Enterprise Server 11 L1 v2.1.1Unix

ACCESS CONTROL, MEDIA PROTECTION

1.1.21 Ensure nosuid option set on removable media partitionsCIS SUSE Linux Enterprise 12 v3.2.1 L1 WorkstationUnix

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

1.5.1 Ensure core dumps are restricted - sysctlCIS Debian 8 Server L1 v2.0.2Unix

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

4.1.13 Ensure file deletion events by users are collectedCIS SUSE Linux Enterprise 12 v3.2.1 L2 ServerUnix

AUDIT AND ACCOUNTABILITY

4.1.13 Ensure file deletion events by users are collectedCIS SUSE Linux Enterprise 12 v3.2.1 L2 WorkstationUnix

AUDIT AND ACCOUNTABILITY

4.1.14 Ensure file deletion events by users are collected - auditctl b32 unlinkCIS SUSE Linux Enterprise Server 11 L2 v2.1.1Unix

AUDIT AND ACCOUNTABILITY

4.1.14 Ensure file deletion events by users are collected - auditctl b32 unlinkCIS SUSE Linux Enterprise Workstation 11 L2 v2.1.1Unix

AUDIT AND ACCOUNTABILITY

4.1.14 Ensure file deletion events by users are collected - auditctl b64 unlinkCIS SUSE Linux Enterprise Workstation 11 L2 v2.1.1Unix

AUDIT AND ACCOUNTABILITY

4.1.14 Ensure file deletion events by users are collected - auditctl b64 unlinkCIS SUSE Linux Enterprise Server 11 L2 v2.1.1Unix

AUDIT AND ACCOUNTABILITY

4.1.14 Ensure file deletion events by users are collected - auditctl deleteCIS Debian 8 Workstation L2 v2.0.2Unix

AUDIT AND ACCOUNTABILITY

4.1.14 Ensure file deletion events by users are collected - auditctl deleteCIS Debian 8 Server L2 v2.0.2Unix

AUDIT AND ACCOUNTABILITY

4.1.14 Ensure file deletion events by users are collected - auditctl delete x64CIS Debian 8 Workstation L2 v2.0.2Unix

AUDIT AND ACCOUNTABILITY

4.1.14 Ensure file deletion events by users are collected - auditctl delete x64CIS Debian 8 Server L2 v2.0.2Unix

AUDIT AND ACCOUNTABILITY

4.1.14 Ensure file deletion events by users are collected - b32 unlinkCIS SUSE Linux Enterprise Workstation 11 L2 v2.1.1Unix

AUDIT AND ACCOUNTABILITY

4.1.14 Ensure file deletion events by users are collected - b32 unlinkCIS SUSE Linux Enterprise Server 11 L2 v2.1.1Unix

AUDIT AND ACCOUNTABILITY

4.1.14 Ensure file deletion events by users are collected - b64 unlinkCIS SUSE Linux Enterprise Workstation 11 L2 v2.1.1Unix

AUDIT AND ACCOUNTABILITY

4.1.14 Ensure file deletion events by users are collected - b64 unlinkCIS SUSE Linux Enterprise Server 11 L2 v2.1.1Unix

AUDIT AND ACCOUNTABILITY

4.1.14 Ensure file deletion events by users are collected - deleteCIS Debian 8 Workstation L2 v2.0.2Unix

AUDIT AND ACCOUNTABILITY

4.1.14 Ensure file deletion events by users are collected - deleteCIS Debian 8 Server L2 v2.0.2Unix

AUDIT AND ACCOUNTABILITY

4.1.14 Ensure file deletion events by users are collected - delete x64CIS Debian 8 Server L2 v2.0.2Unix

AUDIT AND ACCOUNTABILITY

4.1.14 Ensure file deletion events by users are collected - delete x64CIS Debian 8 Workstation L2 v2.0.2Unix

AUDIT AND ACCOUNTABILITY

5.4.4 Ensure default user umask is 027 or more restrictive - /etc/bash.bashrcCIS Debian 8 Server L1 v2.0.2Unix

ACCESS CONTROL, MEDIA PROTECTION

5.4.4 Ensure default user umask is 027 or more restrictive - /etc/bash.bashrcCIS Debian 8 Workstation L1 v2.0.2Unix

ACCESS CONTROL, MEDIA PROTECTION

5.4.4 Ensure default user umask is 027 or more restrictive - /etc/profileCIS Debian 8 Workstation L1 v2.0.2Unix

ACCESS CONTROL, MEDIA PROTECTION

5.4.4 Ensure default user umask is 027 or more restrictive - /etc/profileCIS Debian 8 Server L1 v2.0.2Unix

ACCESS CONTROL, MEDIA PROTECTION

5.4.4 Ensure default user umask is 027 or more restrictive - /etc/profile.d/*.shCIS Debian 8 Workstation L1 v2.0.2Unix

ACCESS CONTROL, MEDIA PROTECTION

5.4.4 Ensure default user umask is 027 or more restrictive - /etc/profile.d/*.shCIS Debian 8 Server L1 v2.0.2Unix

ACCESS CONTROL, MEDIA PROTECTION

5.4.5 Ensure default user umask is configuredCIS SUSE Linux Enterprise 12 v3.2.1 L1 WorkstationUnix

ACCESS CONTROL, MEDIA PROTECTION

5.5.5 Ensure default user umask is configured - system wide defaultCIS Red Hat 6 Server L1 v3.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

5.5.5 Ensure default user umask is configured - system wide defaultCIS Red Hat Enterprise Linux 7 STIG v2.0.0 L1 WorkstationUnix

ACCESS CONTROL, MEDIA PROTECTION

5.5.5 Ensure default user umask is configured - system wide umaskCIS Red Hat 6 Server L1 v3.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

5.5.5 Ensure default user umask is configured - system wide umaskCIS Red Hat Enterprise Linux 7 STIG v2.0.0 L1 ServerUnix

ACCESS CONTROL, MEDIA PROTECTION

5.5.5 Ensure default user umask is configured - system wide umaskCIS Red Hat Enterprise Linux 7 STIG v2.0.0 L1 WorkstationUnix

ACCESS CONTROL, MEDIA PROTECTION

6.1.10 Ensure no world writable files existCIS Debian 8 Workstation L1 v2.0.2Unix

ACCESS CONTROL, MEDIA PROTECTION

6.1.10 Ensure no world writable files existCIS Debian 8 Server L1 v2.0.2Unix

ACCESS CONTROL, MEDIA PROTECTION