Item Search

NameAudit NamePluginCategory
2.2.1 Enable "Set time and date automatically"CIS Apple OSX 10.9 L2 v1.3.0Unix

AUDIT AND ACCOUNTABILITY

2.3.2 Secure screen saver corners - bottom left cornerCIS Apple OSX 10.9 L2 v1.3.0Unix

ACCESS CONTROL

2.3.2 Secure screen saver corners - bottom right cornerCIS Apple OSX 10.9 L2 v1.3.0Unix

ACCESS CONTROL

2.3.2 Secure screen saver corners - top left cornerCIS Apple OSX 10.9 L2 v1.3.0Unix

ACCESS CONTROL

2.3.2 Secure screen saver corners - top right cornerCIS Apple OSX 10.9 L2 v1.3.0Unix

ACCESS CONTROL

2.5.1 Disable "Wake for network access"CIS Apple OSX 10.9 L2 v1.3.0Unix

ACCESS CONTROL

2.5.2 Disable sleeping the computer when connected to powerCIS Apple OSX 10.9 L2 v1.3.0Unix

ACCESS CONTROL

2.6.6 Enable Location ServicesCIS Apple OSX 10.9 L2 v1.3.0Unix

CONFIGURATION MANAGEMENT

2.6.7 Monitor Location Services AccessCIS Apple OSX 10.9 L2 v1.3.0Unix

CONFIGURATION MANAGEMENT

2.7.1 iCloud configurationCIS Apple OSX 10.9 L2 v1.3.0Unix
2.7.2 iCloud keychainCIS Apple OSX 10.9 L2 v1.3.0Unix
2.8.1 Time Machine Auto-BackupCIS Apple OSX 10.9 L2 v1.3.0Unix

CONTINGENCY PLANNING

2.9 Pair the remote control infrared receiver if enabled - 'DeviceEnabled = 0'CIS Apple OSX 10.10 Yosemite L1 v1.2.0Unix

CONFIGURATION MANAGEMENT

2.11 Java 6 is not the default Java runtimeCIS Apple OSX 10.9 L2 v1.3.0Unix

CONFIGURATION MANAGEMENT

2.12 Configure Secure Empty TrashCIS Apple OSX 10.9 L2 v1.3.0Unix

CONFIGURATION MANAGEMENT

3.1.1 Retain system.log for 90 or more daysCIS Apple OSX 10.10 Yosemite L1 v1.2.0Unix

AUDIT AND ACCOUNTABILITY

3.1.2 Retain appfirewall.log for 90 or more daysCIS Apple OSX 10.10 Yosemite L1 v1.2.0Unix

AUDIT AND ACCOUNTABILITY

3.4 Enable remote logging for Desktops on trusted networksCIS Apple OSX 10.9 L2 v1.3.0Unix

AUDIT AND ACCOUNTABILITY

4.1 Disable Bonjour advertising serviceCIS Apple OSX 10.9 L2 v1.3.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION

4.3 Create network specific locationsCIS Apple OSX 10.9 L2 v1.3.0Unix
4.4 Ensure http server is not runningCIS Apple OSX 10.10 Yosemite L1 v1.2.0Unix

CONFIGURATION MANAGEMENT

5.1.5 Check Library folder for world writable filesCIS Apple OSX 10.9 L2 v1.3.0Unix

ACCESS CONTROL

5.2.3 Complex passwords must contain an Alphabetic Character - 'RequiresAlpha'CIS Apple OSX 10.10 Yosemite L1 v1.2.0Unix
5.2.7 Password AgeCIS Apple OSX 10.10 Yosemite L1 v1.2.0Unix

IDENTIFICATION AND AUTHENTICATION

5.6 Enable OCSP and CRL certificate checking - CRLCIS Apple OSX 10.9 L2 v1.3.0Unix

IDENTIFICATION AND AUTHENTICATION

5.6 Enable OCSP and CRL certificate checking - OCSPCIS Apple OSX 10.9 L2 v1.3.0Unix

IDENTIFICATION AND AUTHENTICATION

5.8 Disable automatic loginCIS Apple OSX 10.10 Yosemite L1 v1.2.0Unix

ACCESS CONTROL

5.11 Disable ability to login to another user's active and locked sessionCIS Apple OSX 10.10 Yosemite L1 v1.2.0Unix

ACCESS CONTROL

5.12 Create a custom message for the Login ScreenCIS Apple OSX 10.10 Yosemite L1 v1.2.0Unix

ACCESS CONTROL

5.15 Disable Fast User SwitchingCIS Apple OSX 10.9 L2 v1.3.0Unix

ACCESS CONTROL

5.16 Secure individual keychains and itemsCIS Apple OSX 10.9 L2 v1.3.0Unix
5.17 Create specialized keychains for different purposesCIS Apple OSX 10.9 L2 v1.3.0Unix
5.18 Install an approved tokend for smartcard authenticationCIS Apple OSX 10.9 L2 v1.3.0Unix

IDENTIFICATION AND AUTHENTICATION

6.1.3 Disable guest account loginCIS Apple OSX 10.10 Yosemite L1 v1.2.0Unix

ACCESS CONTROL

6.4 Use parental controls for systems that are not centrally managedCIS Apple OSX 10.9 L2 v1.3.0Unix
7.1 Wireless technology on OS XCIS Apple OSX 10.9 L2 v1.3.0Unix
7.3 Computer Name ConsiderationsCIS Apple OSX 10.9 L2 v1.3.0Unix
7.7 App Store Automatically download apps purchased on other Macs ConsiderationsCIS Apple OSX 10.9 L2 v1.3.0Unix
7.8 Extensible Firmware Interface (EFI) passwordCIS Apple OSX 10.9 L2 v1.3.0Unix
7.9 Apple ID password resetCIS Apple OSX 10.9 L2 v1.3.0Unix
CIS_Apple_macOS_12.0_Monterey_Cloud-tailored_v1.1.0_L1.audit from CIS Apple macOS 12.0 Monterey Cloud-tailored Benchmark v1.1.0CIS Apple macOS 12.0 Monterey Cloud-tailored v1.1.0 L1Unix
CIS_Apple_macOS_12.0_Monterey_Cloud-tailored_v1.1.0_L2.audit from CIS Apple macOS 12.0 Monterey Cloud-tailored Benchmark v1.1.0CIS Apple macOS 12.0 Monterey Cloud-tailored v1.1.0 L2Unix
CIS_Apple_macOS_13.0_Ventura_Cloud-tailored_v1.1.0_L1.audit from CIS Apple macOS 13.0 Ventura Cloud-tailored Benchmark v1.1.0CIS Apple macOS 13.0 Ventura Cloud-tailored v1.1.0 L1Unix
CIS_Apple_macOS_13.0_Ventura_Cloud-tailored_v1.1.0_L2.audit from CIS Apple macOS 13.0 Ventura Cloud-tailored Benchmark v1.1.0CIS Apple macOS 13.0 Ventura Cloud-tailored v1.1.0 L2Unix
CIS_Apple_macOS_14.0_Sonoma_Cloud-tailored_v1.1.0_L1.audit from CIS Apple macOS 14.0 Sonoma Cloud-tailored Benchmark v1.1.0CIS Apple macOS 14.0 Sonoma Cloud-tailored v1.1.0 L1Unix
CIS_Apple_macOS_14.0_Sonoma_Cloud-tailored_v1.1.0_L2.audit from CIS Apple macOS 14.0 Sonoma Cloud-tailored Benchmark v1.1.0CIS Apple macOS 14.0 Sonoma Cloud-tailored v1.1.0 L2Unix
DKER-EE-001810 - On Linux, a non-AUFS storage driver in the Docker Engine - Enterprise component of Docker Enterprise must be used.DISA STIG Docker Enterprise 2.x Linux/Unix v2r2Unix

CONFIGURATION MANAGEMENT

DKER-EE-001830 - The userland proxy capability in the Docker Engine - Enterprise component of Docker Enterprise must be disabled.DISA STIG Docker Enterprise 2.x Linux/Unix v2r2Unix

CONFIGURATION MANAGEMENT

ESXI-70-000081 - The ESXi host must not suppress warnings about unmitigated hyperthreading vulnerabilities.DISA STIG VMware vSphere 7.0 ESXi v1r4VMware

CONFIGURATION MANAGEMENT

ESXI-80-000223 - The ESXi host must not suppress warnings about unmitigated hyperthreading vulnerabilities.DISA VMware vSphere 8.0 ESXi STIG v2r3VMware

CONFIGURATION MANAGEMENT