Item Search

NameAudit NamePluginCategory
1.4.3 Ensure authentication required for single user modeCIS SUSE Linux Enterprise Workstation 11 L1 v2.1.1Unix

ACCESS CONTROL

1.5.1 Ensure core dumps are restricted - hard core 0CIS SUSE Linux Enterprise Server 11 L1 v2.1.1Unix

ACCESS CONTROL

1.6 Only allow trusted users to control Docker daemonCIS Docker 1.11.0 v1.0.0 L1 LinuxUnix

ACCESS CONTROL

1.7 Only allow trusted users to control Docker daemonCIS Docker 1.6 v1.0.0 L1 LinuxUnix

ACCESS CONTROL

2.1 Enable Secure Admin Access - 'telnet.distinct.enable = on'TNS NetApp Data ONTAP 7GNetApp

ACCESS CONTROL

2.1.3 Ensure 'ADMIN_RESTRICTIONS_<listener_name>' Is Set to 'ON'CIS Oracle Server 11g R2 Windows v2.2.0Windows

ACCESS CONTROL

2.3.10.12 Ensure 'Network access: Restrict anonymous access to Named Pipes and Shares' is set to 'Enabled'CIS Microsoft Windows Server 2016 STIG v3.0.0 L1 Domain ControllerWindows

ACCESS CONTROL

2.3.10.12 Ensure 'Network access: Restrict anonymous access to Named Pipes and Shares' is set to 'Enabled'CIS Microsoft Windows Server 2016 STIG v3.0.0 STIG DCWindows

ACCESS CONTROL

2.3.11.2 Ensure 'Network security: Allow LocalSystem NULL session fallback' is set to 'Disabled'CIS Microsoft Windows Server 2016 STIG v3.0.0 L1 Domain ControllerWindows

ACCESS CONTROL

2.3.11.2 Ensure 'Network security: Allow LocalSystem NULL session fallback' is set to 'Disabled'CIS Microsoft Windows Server 2016 STIG v3.0.0 STIG DCWindows

ACCESS CONTROL

2.3.17.3 (L1) Ensure 'User Account Control: Behavior of the elevation prompt for standard users' is set to 'Automatically deny elevation requests'CIS Microsoft Windows Server 2016 v3.0.0 L1 DCWindows

ACCESS CONTROL

2.3.17.5 (L1) Ensure 'User Account Control: Only elevate UIAccess applications that are installed in secure locations' is set to 'Enabled'CIS Microsoft Windows Server 2019 v3.0.1 L1 MSWindows

ACCESS CONTROL

2.3.17.5 Ensure 'User Account Control: Detect application installations and prompt for elevation' is set to 'Enabled'CIS Microsoft Windows Server 2016 STIG v3.0.0 STIG DCWindows

ACCESS CONTROL

2.3.17.7 (L1) Ensure 'User Account Control: Switch to the secure desktop when prompting for elevation' is set to 'Enabled'CIS Microsoft Windows Server 2016 v3.0.0 L1 DCWindows

ACCESS CONTROL

2.3.17.7 Ensure 'User Account Control: Run all administrators in Admin Approval Mode' is set to 'Enabled'CIS Microsoft Windows Server 2016 STIG v3.0.0 L1 Domain ControllerWindows

ACCESS CONTROL

2.3.17.7 Ensure 'User Account Control: Run all administrators in Admin Approval Mode' is set to 'Enabled'CIS Microsoft Windows Server 2016 STIG v3.0.0 STIG DCWindows

ACCESS CONTROL

2.8 Ensure an IAM policy that allows admin privileges for all services used is created - Policy ExistCIS Amazon Web Services Three-tier Web Architecture L1 1.0.0amazon_aws

ACCESS CONTROL

3.1 Restrict Core Dumps to Protected Directory - global core dumps = enabledCIS Solaris 11.2 L1 v1.1.0Unix

ACCESS CONTROL

3.1 Restrict Core Dumps to Protected Directory - global core file patternCIS Solaris 11.1 L1 v1.0.0Unix

ACCESS CONTROL

3.1 Restrict Core Dumps to Protected Directory - init core file patternCIS Solaris 11 L1 v1.1.0Unix

ACCESS CONTROL

3.1 Restrict Core Dumps to Protected Directory - per-process core dumps = disabledCIS Solaris 11.1 L1 v1.0.0Unix

ACCESS CONTROL

3.1 Restrict Core Dumps to Protected Directory - per-process setid core dumps = disabledCIS Solaris 11.1 L1 v1.0.0Unix

ACCESS CONTROL

3.2 Restrict Core Dumps to Protected Directory - Check if COREADM_GLOB_CONTENT is set to defaultCIS Solaris 10 L1 v5.2Unix

ACCESS CONTROL

3.2 Restrict Core Dumps to Protected Directory - Check if COREADM_GLOB_LOG_ENABLED is set to yesCIS Solaris 10 L1 v5.2Unix

ACCESS CONTROL

4.1 Restrict Core Dumps - 'hard core 0'CIS Ubuntu 12.04 LTS Benchmark L1 v1.1.0Unix

ACCESS CONTROL

4.3 Review Users, Groups, and Roles - Groups listCIS IBM DB2 v10 v1.1.0 Windows OS Level 1Windows

ACCESS CONTROL

5.4 Do not use privileged containersCIS Docker 1.13.0 v1.0.0 L1 DockerUnix

ACCESS CONTROL

5.4.2.1 Ensure root is the only UID 0 accountCIS Ubuntu Linux 22.04 LTS v2.0.0 L1 WorkstationUnix

ACCESS CONTROL

6.5 Restrict FTP Use - Audit the list of users in /etc/ftpd/ftpusers.CIS Solaris 10 L1 v5.2Unix

ACCESS CONTROL

6.9 Restrict at/cron To Authorized Users - should pass if 'root' exists in /etc/cron.d/cron.allow.CIS Solaris 10 L1 v5.2Unix

ACCESS CONTROL

6.13 Restrict at/cron to Authorized Users - /etc/cron.d/cron.allowCIS Solaris 11.2 L1 v1.1.0Unix

ACCESS CONTROL

6.14 Restrict root Login to System Console - CONSOLE = /dev/consoleCIS Solaris 11.2 L1 v1.1.0Unix

ACCESS CONTROL

9.23 Find SUID/SGID System ExecutablesCIS Solaris 10 L1 v5.2Unix

ACCESS CONTROL

9.23 Find SUID/SGID System ExecutablesCIS Solaris 11 L1 v1.1.0Unix

ACCESS CONTROL

10.1 SN.1 Restrict access to suspend featureCIS Solaris 11 L2 v1.1.0Unix

ACCESS CONTROL

12.10 Find SUID System ExecutablesCIS Debian Linux 7 L1 v1.0.0Unix

ACCESS CONTROL

18.6.11.4 (L1) Ensure 'Require domain users to elevate when setting a network's location' is set to 'Enabled'CIS Microsoft Windows Server 2016 v3.0.0 L1 DCWindows

ACCESS CONTROL

18.9.28.3 Ensure 'Do not enumerate connected users on domain-joined computers' is set to 'Enabled'CIS Microsoft Windows Server 2016 STIG v3.0.0 L1 Domain ControllerWindows

ACCESS CONTROL

18.9.28.4 Ensure 'Enumerate local users on domain-joined computers' is set to 'Disabled' (MS only)CIS Microsoft Windows Server 2016 STIG v3.0.0 STIG MSWindows

ACCESS CONTROL

18.10.14.2 (L1) Ensure 'Enumerate administrator accounts on elevation' is set to 'Disabled'CIS Microsoft Windows Server 2016 v3.0.0 L1 DCWindows

ACCESS CONTROL

18.10.80.1 (L1) Ensure 'Allow user control over installs' is set to 'Disabled'CIS Microsoft Windows Server 2016 v3.0.0 L1 DCWindows

ACCESS CONTROL

18.10.80.1 Ensure 'Allow user control over installs' is set to 'Disabled'CIS Microsoft Windows Server 2016 STIG v3.0.0 L1 Domain ControllerWindows

ACCESS CONTROL

Brocade - SCP server host is approvedTenable Best Practices Brocade FabricOSBrocade

ACCESS CONTROL

Ensure nodev option set on /tmp partitionTenable Cisco Firepower Management Center OS Best Practices AuditUnix

ACCESS CONTROL

ESXi : enable-strict-lockdown-modeVMWare vSphere 6.5 Hardening GuideVMware

ACCESS CONTROL

IBM i : Limit Security Officer (QLMTSECOFR) - '1'IBM System i Security Reference for V7R1 and V6R1AS/400

ACCESS CONTROL

IBM i : Limit Security Officer (QLMTSECOFR) - '1'IBM System i Security Reference for V7R3AS/400

ACCESS CONTROL

IBM i : Remote power-on and restart (QRMTIPL) - '0'IBM System i Security Reference for V7R3AS/400

ACCESS CONTROL

Physical Security - Auxiliary Port - Configure the insecure featureJuniper Hardening JunOS 12 Devices ChecklistJuniper

ACCESS CONTROL

VM : prevent-device-interaction-editVMWare vSphere 6.0 Hardening GuideVMware

ACCESS CONTROL