Item Search

NameAudit NamePluginCategory
1.1 Create local-settings.js file - general.config.filenameCIS Mozilla Firefox 102 ESR Linux L1 v1.0.0Unix

ACCESS CONTROL

1.1.10 Ensure that the Container Network Interface file ownership is set to root:rootCIS Kubernetes v1.10.0 L1 MasterUnix

ACCESS CONTROL

1.1.16 Ensure that the scheduler.conf file ownership is set to root:rootCIS Kubernetes v1.10.0 L1 MasterUnix

ACCESS CONTROL

1.1.20 Ensure that the Kubernetes PKI certificate file permissions are set to 600 or more restrictiveCIS Kubernetes v1.10.0 L1 MasterUnix

ACCESS CONTROL

1.2 Use Dedicated Least Privileged Account for MySQL Daemon/ServiceCIS MySQL 5.7 Community Linux OS L1 v2.0.0Unix

ACCESS CONTROL

1.4 Configure 'Do not allow users to enable or disable add- ons'CIS IE 9 v1.0.0Windows

ACCESS CONTROL

1.10 Limit the number of users with ACCOUNTADMIN and SECURITYADMINCIS Snowflake Foundations v1.0.0 L1Snowflake

ACCESS CONTROL

2.1.3 Ensure chrony is not run as the root userCIS Rocky Linux 8 Server L1 v2.0.0Unix

ACCESS CONTROL

2.1.3 Ensure chrony is not run as the root userCIS Amazon Linux 2 v3.0.0 L1Unix

ACCESS CONTROL

2.2 Configure the ESXi host firewall to restrict access to services running on the hostCIS VMware ESXi 5.1 v1.0.1 Level 1VMware

ACCESS CONTROL

2.2 Configure the ESXi host firewall to restrict access to services running on the hostCIS VMware ESXi 5.5 v1.2.0 Level 1VMware

ACCESS CONTROL

2.3.3 Ensure chrony is not run as the root userCIS Oracle Linux 9 v2.0.0 L1 ServerUnix

ACCESS CONTROL

2.3.3 Ensure chrony is not run as the root userCIS Red Hat Enterprise Linux 9 v2.0.0 L1 WorkstationUnix

ACCESS CONTROL

2.3.3 Ensure chrony is not run as the root userCIS Rocky Linux 9 v2.0.0 L1 ServerUnix

ACCESS CONTROL

3.1 Configure 'Prevent Deleting Cookies'CIS IE 9 v1.0.0Windows

ACCESS CONTROL

3.11 Ensure 'encryption providers' are locked downCIS IIS 8.0 v1.5.1 Level 2Windows

ACCESS CONTROL

3.11 Ensure 'encryption providers' are locked downCIS IIS 7 L2 v1.8.0Windows

ACCESS CONTROL

3.12 Ensure the 'SYSADMIN' Role is Limited to Administrative or Built-in AccountsCIS SQL Server 2022 Database L1 DB v1.1.0MS_SQLDB

ACCESS CONTROL

4 - Restrict access to $JETTY_HOME - modeTNS Best Practice Jetty 9 LinuxUnix

ACCESS CONTROL

4.1 Create a user for the containerCIS Docker 1.11.0 v1.0.0 L1 DockerUnix

ACCESS CONTROL

4.1.6 Ensure that the --kubeconfig kubelet.conf file ownership is set to root:rootCIS Kubernetes v1.10.0 L1 WorkerUnix

ACCESS CONTROL

4.2 Restrict access to $CATALINA_BASECIS Apache Tomcat 7 L1 v1.1.0Unix

ACCESS CONTROL

4.3 Restrict access to Tomcat configuration directoryCIS Apache Tomcat 7 L1 v1.1.0Unix

ACCESS CONTROL

4.3 Restrict access to Tomcat configuration directoryCIS Apache Tomcat 7 L1 v1.1.0 MiddlewareUnix

ACCESS CONTROL

4.5.4 Ensure 'ALL' Is Revoked from Unauthorized 'GRANTEE' on 'SYS.USER$'CIS Oracle Server 11g R2 DB v2.2.0OracleDB

ACCESS CONTROL

4.8 Ensure Handler is not granted Write and Script/Execute - DefaultCIS IIS 7 L1 v1.8.0Windows

ACCESS CONTROL

4.10 Restrict access to Tomcat context.xmlCIS Apache Tomcat 7 L1 v1.1.0 MiddlewareUnix

ACCESS CONTROL

5.1 Set Sticky Bit on World Writable DirectoriesCIS Solaris 11.2 L1 v1.1.0Unix

ACCESS CONTROL

5.4 CIFS - 'cifs.restrict_anonymous = 2'TNS NetApp Data ONTAP 7GNetApp

ACCESS CONTROL

5.6 Set 'Disable changing certificate settings' to 'Enabled'CIS IE 11 v1.0.0Windows

ACCESS CONTROL

5.7 Do not enable the 'root' accountCIS Apple macOS 10.13 L1 v1.1.0Unix

ACCESS CONTROL

6.7 Restrict Access to SYSCAT.ROUTINESCIS IBM DB2 9 Benchmark v3.0.1 Level 2 DBIBM_DB2DB

ACCESS CONTROL

7.1 Disable System Accounts - Ensure account 'gdm' is locked.CIS Solaris 10 L1 v5.2Unix

ACCESS CONTROL

7.1 Disable System Accounts - Ensure account 'sys' disallows password loginCIS Solaris 10 L1 v5.2Unix

ACCESS CONTROL

7.1 Disable System Accounts - should pass if the default shell for 'lp' is set to /usr/bin/false.CIS Solaris 10 L1 v5.2Unix

ACCESS CONTROL

7.1 Disable System Accounts - should pass if the default shell for 'uucp' is set to /usr/bin/false.CIS Solaris 10 L1 v5.2Unix

ACCESS CONTROL

8.1 Restrict runtime access to sensitive packagesCIS Apache Tomcat 7 L1 v1.1.0Unix

ACCESS CONTROL

8.2 Restrict access to starting and stopping the DB2 administration serverCIS IBM DB2 9 Benchmark v3.0.1 Level 2 OS WindowsWindows

ACCESS CONTROL

9.6 Ensure root PATH Integrity - writeable dir in pathCIS Solaris 11.2 L1 v1.1.0Unix

ACCESS CONTROL

9.22 Find World Writable FilesCIS Solaris 10 L1 v5.2Unix

ACCESS CONTROL

10.14 Do not allow symbolic linkingCIS Apache Tomcat 7 L1 v1.1.0Unix

ACCESS CONTROL

12.7 Find World Writable FilesCIS Debian Linux 7 L1 v1.0.0Unix

ACCESS CONTROL

18 - Restrict access to context.xml - modeTNS Best Practice Jetty 9 LinuxUnix

ACCESS CONTROL

18 - Restrict access to context.xml - ownerTNS Best Practice Jetty 9 LinuxUnix

ACCESS CONTROL

18.4.9 (L1) Ensure 'Remove 'Run as Different User' from context menus' is set to 'Enabled (recommended)'CIS Microsoft Windows 10 EMS Gateway v3.0.0 L1Windows

ACCESS CONTROL

20.29 Ensure 'FTP servers are configured to prevent access to the system drive'CIS Microsoft Windows Server 2019 STIG v3.0.0 STIG MSWindows

ACCESS CONTROL

20.51 Ensure 'Permissions for the system drive root directory must conform to minimum requirements'CIS Microsoft Windows Server 2016 STIG v3.0.0 STIG MSWindows

ACCESS CONTROL

20.51 Ensure 'Permissions for the system drive root directory must conform to minimum requirements'CIS Microsoft Windows Server 2019 STIG v3.0.0 STIG MSWindows

ACCESS CONTROL

21 - Restrict access to users.xml - modeTNS Best Practice Jetty 9 LinuxUnix

ACCESS CONTROL

45 - Restrict runtime access to sensitive packagesTNS Best Practice Jetty 9 LinuxUnix

ACCESS CONTROL