Item Search

NameAudit NamePluginCategory
1.2.4 Ensure HTTP and Telnet options are disabled for all management profiles - TelnetCIS Palo Alto Firewall 9 v1.1.0 L1Palo_Alto

ACCESS CONTROL, CONFIGURATION MANAGEMENT

1.2.5 Ensure valid certificate is set for browser-based administrator interface - Authentication ProfileCIS Palo Alto Firewall 9 v1.1.0 L2Palo_Alto

ACCESS CONTROL, CONFIGURATION MANAGEMENT

1.2.5 Ensure valid certificate is set for browser-based administrator interface - Certificate ProfilesCIS Palo Alto Firewall 9 v1.1.0 L2Palo_Alto

ACCESS CONTROL, CONFIGURATION MANAGEMENT

1.2.5 Ensure valid certificate is set for browser-based administrator interface - CertificatesCIS Palo Alto Firewall 9 v1.1.0 L2Palo_Alto

ACCESS CONTROL, CONFIGURATION MANAGEMENT

1.2.9 Ensure that the APIPriorityAndFairness feature gate is enabledCIS Red Hat OpenShift Container Platform v1.7.0 L1OpenShift

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

1.3.1 Pre-authentication BannerCIS Cisco NX-OS v1.2.0 L1Cisco

ACCESS CONTROL, CONFIGURATION MANAGEMENT

1.3.7 Ensure that the --bind-address argument is set to 127.0.0.1CIS Kubernetes v1.10.0 L1 MasterUnix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

1.3.7 Ensure that the --bind-address argument is set to 127.0.0.1CIS Kubernetes v1.24 Benchmark v1.0.0 L1 MasterUnix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

1.3.7 Ensure that the --bind-address argument is set to 127.0.0.1CIS Kubernetes v1.23 Benchmark v1.0.1 L1 MasterUnix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

1.4.2 Ensure that the --bind-address argument is set to 127.0.0.1CIS Kubernetes v1.20 Benchmark v1.0.1 L1 MasterUnix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

1.4.2 Ensure that the --bind-address argument is set to 127.0.0.1CIS Kubernetes v1.23 Benchmark v1.0.1 L1 MasterUnix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

1.4.2 Ensure that the --bind-address argument is set to 127.0.0.1CIS Kubernetes v1.10.0 L1 MasterUnix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

1.5.5 Set the ACL for each 'snmp-server community'CIS Cisco IOS 15 L1 v4.1.1Cisco

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

1.5.6 Create an 'access-list' for use with SNMP - 'SNMP deny secured by ACL'CIS Cisco IOS 15 L1 v4.1.1Cisco

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

1.5.7 Set 'snmp-server host' when using SNMPCIS Cisco IOS 15 L1 v4.1.1Cisco

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

1.5.10 Require 'aes 128' as minimum for 'snmp-server user' when using SNMPv3CIS Cisco IOS 15 L2 v4.1.1Cisco

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

1.7.2 Disable iPXE (Pre-boot eXecution Environment)CIS Cisco NX-OS v1.2.0 L2Cisco

ACCESS CONTROL, CONFIGURATION MANAGEMENT

1.7.2 Post-authentication BannerCIS Cisco IOS XR 7.x v1.0.0 L1Cisco

ACCESS CONTROL, CONFIGURATION MANAGEMENT

2.1.1.1.3 Set 'modulus' to greater than or equal to 2048 for 'crypto key generate rsa'CIS Cisco IOS 15 L1 v4.1.1Cisco

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

2.1.1.1.4 Set 'seconds' for 'ip ssh timeout'CIS Cisco IOS 15 L1 v4.1.1Cisco

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

2.1.2 Set 'no cdp run'CIS Cisco IOS 15 L1 v4.1.1Cisco

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

2.1.3 Set 'no ip bootp server'CIS Cisco IOS 15 L1 v4.1.1Cisco

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

2.1.5 Set 'no ip identd'CIS Cisco IOS 15 L1 v4.1.1Cisco

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

2.1.6 Set 'service tcp-keepalives-in'CIS Cisco IOS 15 L1 v4.1.1Cisco

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

2.1.8 Set 'no service pad'CIS Cisco IOS 15 L1 v4.1.1Cisco

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

3.2 Ensure that MongoDB only listens for network connections on authorized interfacesCIS MongoDB 3.6 L1 Windows Audit v1.1.0Windows

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

3.2 Ensure that MongoDB only listens for network connections on authorized interfacesCIS MongoDB 3.6 L1 Unix Audit v1.1.0Unix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

3.2.4 Ensure that the --read-only-port is disabledCIS Google Kubernetes Engine (GKE) v1.7.0 L1Unix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

3.2.5 Ensure that the --streaming-connection-idle-timeout argument is not set to 0CIS Google Kubernetes Engine (GKE) v1.7.0 L1Unix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

5.7 Ensure HTTP Request Methods Are RestrictedCIS Apache HTTP Server 2.4 v2.2.0 L1Unix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

5.9 Ensure Old HTTP Protocol Versions Are DisallowedCIS Apache HTTP Server 2.4 v2.2.0 L1Unix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

6.1.1 Apply a Trusted Signed Certificate for VPN PortalCIS Fortigate 7.0.x v1.3.0 L2FortiGate

ACCESS CONTROL, CONFIGURATION MANAGEMENT

6.18 Ensure that all zones have Zone Protection Profiles with all Reconnaissance Protection settings enabled, tuned, and set to appropriate actionsCIS Palo Alto Firewall 9 v1.1.0 L1Palo_Alto

ACCESS CONTROL, CONFIGURATION MANAGEMENT

6.19 Ensure all zones have Zone Protection Profiles that drop specially crafted packetsCIS Palo Alto Firewall 9 v1.1.0 L1Palo_Alto

ACCESS CONTROL, CONFIGURATION MANAGEMENT

7.1 Wireless technology on macOSCIS Apple macOS 10.12 L2 v1.2.0Unix

ACCESS CONTROL

8.3 Ensure that the Certificate used for Decryption is TrustedCIS Palo Alto Firewall 9 v1.1.0 L1Palo_Alto

ACCESS CONTROL, CONFIGURATION MANAGEMENT

8.3 Ensure that the Certificate used for Decryption is TrustedCIS Palo Alto Firewall 9 v1.1.0 L2Palo_Alto

ACCESS CONTROL, CONFIGURATION MANAGEMENT

9.3 Ensure 'safkeyringhw:' is set to use a hardware crypto cardCIS IBM WebSphere Liberty v1.0.0 L2Unix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

10.10 Configure maxHttpHeaderSizeCIS Apache Tomcat 11 v1.0.0 L2Unix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

18.5.10 (L2) Ensure 'MSS: (TcpMaxDataRetransmissions IPv6) How many times unacknowledged data is retransmitted' is set to 'Enabled: 3'CIS Microsoft Windows Server 2019 v3.0.1 L2 MSWindows

ACCESS CONTROL, CONFIGURATION MANAGEMENT

Big Sur - Disable Bluetooth When no Approved Device is ConnectedNIST macOS Big Sur v1.4.0 - 800-53r5 ModerateUnix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

Big Sur - Disable Bluetooth When no Approved Device is ConnectedNIST macOS Big Sur v1.4.0 - CNSSI 1253Unix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

Catalina - Disable Bluetooth SharingNIST macOS Catalina v1.5.0 - 800-53r5 LowUnix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

Catalina - Disable Bluetooth SharingNIST macOS Catalina v1.5.0 - All ProfilesUnix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

Catalina - Disable Bluetooth SharingNIST macOS Catalina v1.5.0 - CNSSI 1253Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

Catalina - Disable Bluetooth When no Approved Device is ConnectedNIST macOS Catalina v1.5.0 - 800-53r5 LowUnix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

Catalina - Disable Bluetooth When no Approved Device is ConnectedNIST macOS Catalina v1.5.0 - 800-53r5 HighUnix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

Catalina - Disable Bluetooth When no Approved Device is ConnectedNIST macOS Catalina v1.5.0 - All ProfilesUnix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

Catalina - Disable Wi-Fi InterfaceNIST macOS Catalina v1.5.0 - 800-53r5 ModerateUnix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

Catalina - Disable Wi-Fi InterfaceNIST macOS Catalina v1.5.0 - 800-53r5 LowUnix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION