1.1.3 (L1) Ensure that between two and four global admins are designated | CIS Microsoft 365 Foundations v5.0.0 L1 E3 | microsoft_azure | ACCESS CONTROL |
1.3.3 Set the 'banner-text' for 'banner motd' | CIS Cisco IOS 15 L1 v4.1.1 | Cisco | ACCESS CONTROL |
2.5 Do Not Reuse Usernames | CIS Oracle MySQL Community Server 8.4 v1.0.0 L1 Database | MySQLDB | ACCESS CONTROL |
3.1.1 Client certificate authentication should not be used for users | CIS Kubernetes v1.23 Benchmark v1.0.1 L1 Master | Unix | ACCESS CONTROL |
3.1.1 Client certificate authentication should not be used for users | CIS Kubernetes v1.24 Benchmark v1.0.0 L1 Master | Unix | ACCESS CONTROL |
3.1.1 Client certificate authentication should not be used for users | CIS Kubernetes v1.11.1 L1 Master Node | Unix | ACCESS CONTROL |
3.1.6 Ensure that usage is restricted and expiry is enforced for Databricks personal access tokens | CIS Microsoft Azure Foundations v4.0.0 L1 | microsoft_azure | ACCESS CONTROL |
3.2 Ensure 'PASSWORD_LOCK_TIME' Is Greater Than Or Equal To '1' | CIS Oracle Database 23ai v1.0.0 L1 RDBMS | OracleDB | ACCESS CONTROL |
3.8 Ensure 'SESSIONS_PER_USER' Is Less than or Equal to '10' | CIS Oracle Server 19c DB Unified Auditing v1.2.0 | OracleDB | ACCESS CONTROL |
4.2 Ensure No Custom 'ORACLE_MAINTAINED' Users Exist | CIS Oracle Database 23ai v1.0.0 L1 RDBMS | OracleDB | ACCESS CONTROL |
4.3 Ensure the maximum failed login attempts is set to 5 | CIS VMware ESXi 6.7 v1.3.0 Level 1 | VMware | ACCESS CONTROL |
4.4.2 Ensure lockout for failed password attempts is configured | CIS Debian 10 Server L1 v2.0.0 | Unix | ACCESS CONTROL |
4.4.2.1.2 Ensure password failed attempts lockout is configured | CIS Red Hat Enterprise Linux 7 v4.0.0 L1 Server | Unix | ACCESS CONTROL |
4.4.2.1.2 Ensure password failed attempts lockout is configured | CIS CentOS Linux 7 v4.0.0 L1 Workstation | Unix | ACCESS CONTROL |
4.4.2.1.3 Ensure password unlock time is configured | CIS Red Hat Enterprise Linux 7 v4.0.0 L1 Server | Unix | ACCESS CONTROL |
4.4.2.1.3 Ensure password unlock time is configured | CIS Oracle Linux 7 v4.0.0 L1 Workstation | Unix | ACCESS CONTROL |
4.4.2.1.3 Ensure password unlock time is configured | CIS Amazon Linux 2 v3.0.0 L1 | Unix | ACCESS CONTROL |
4.4.2.1.4 Ensure password failed attempts lockout includes root account | CIS CentOS Linux 7 v4.0.0 L2 Workstation | Unix | ACCESS CONTROL |
4.4.2.1.4 Ensure password failed attempts lockout includes root account | CIS Oracle Linux 7 v4.0.0 L2 Workstation | Unix | ACCESS CONTROL |
4.4.2.1.4 Ensure password failed attempts lockout includes root account | CIS Amazon Linux 2 v3.0.0 L2 | Unix | ACCESS CONTROL |
4.4.3.1.1 Ensure password failed attempts lockout is configured | CIS Red Hat EL8 Server L1 v3.0.0 | Unix | ACCESS CONTROL |
4.4.3.1.3 Ensure password failed attempts lockout includes root account | CIS Oracle Linux 8 Workstation L2 v3.0.0 | Unix | ACCESS CONTROL |
5.2.1 Ensure Password Account Lockout Threshold Is Configured | CIS Apple macOS 14.0 Sonoma Cloud-tailored v1.1.0 L1 | Unix | ACCESS CONTROL |
5.2.1 Ensure Password Account Lockout Threshold Is Configured | CIS Apple macOS 14.0 Sonoma v2.1.0 L1 | Unix | ACCESS CONTROL |
5.2.2 Ensure sudo commands use pty | CIS CentOS 6 Server L1 v3.0.0 | Unix | ACCESS CONTROL |
5.3.2 Ensure lockout for failed password attempts is configured - pam_deny.so | CIS Debian Family Workstation L1 v1.0.0 | Unix | ACCESS CONTROL |
5.3.2.1.2 Ensure password unlock time is configured | CIS SUSE Linux Enterprise 15 v2.0.1 L1 Workstation | Unix | ACCESS CONTROL |
5.3.2.1.3 Ensure password failed attempts lockout includes root account | CIS SUSE Linux Enterprise 15 v2.0.1 L2 Workstation | Unix | ACCESS CONTROL |
5.3.2.2 Ensure pam_faillock module is enabled | CIS Debian Linux 12 v1.1.0 L1 Server | Unix | ACCESS CONTROL |
5.3.3.1.1 Ensure password failed attempts lockout is configured | CIS AlmaLinux OS 9 v2.0.0 L1 Server | Unix | ACCESS CONTROL |
5.3.3.1.1 Ensure password failed attempts lockout is configured | CIS Red Hat Enterprise Linux 9 v2.0.0 L1 Workstation | Unix | ACCESS CONTROL |
5.3.3.1.1 Ensure password failed attempts lockout is configured | CIS Debian Linux 11 v2.0.0 L1 Server | Unix | ACCESS CONTROL |
5.3.3.1.1 Ensure password failed attempts lockout is configured | CIS Ubuntu Linux 24.04 LTS v1.0.0 L1 Server | Unix | ACCESS CONTROL |
5.3.3.1.1 Ensure password failed attempts lockout is configured | CIS Ubuntu Linux 24.04 LTS v1.0.0 L1 Workstation | Unix | ACCESS CONTROL |
5.3.3.1.2 Ensure password unlock time is configured | CIS AlmaLinux OS 9 v2.0.0 L1 Workstation | Unix | ACCESS CONTROL |
5.3.3.1.2 Ensure password unlock time is configured | CIS Oracle Linux 9 v2.0.0 L1 Server | Unix | ACCESS CONTROL |
5.3.3.1.2 Ensure password unlock time is configured | CIS Red Hat Enterprise Linux 9 v2.0.0 L1 Server | Unix | ACCESS CONTROL |
5.3.3.1.2 Ensure password unlock time is configured | CIS Ubuntu Linux 22.04 LTS v2.0.0 L1 Server | Unix | ACCESS CONTROL |
5.9 DB2DOMAINLIST Registry Variable (Windows only) | CIS IBM DB2 11 v1.1.0 Windows OS Level 1 | Windows | ACCESS CONTROL |
6.2.15 Ensure no duplicate user names exist | CIS Debian Family Server L1 v1.0.0 | Unix | ACCESS CONTROL |
6.2.16 Ensure no duplicate UIDs exist | CIS Debian 9 Server L1 v1.0.1 | Unix | ACCESS CONTROL |
6.2.16 Ensure no duplicate UIDs exist | CIS Debian 9 Workstation L1 v1.0.1 | Unix | ACCESS CONTROL |
6.2.17 Ensure no duplicate GIDs exist | CIS Debian 9 Server L1 v1.0.1 | Unix | ACCESS CONTROL |
6.11.5 Ensure Log-out-on-disconnect is Set for Console | CIS Juniper OS Benchmark v2.1.0 L1 | Juniper | ACCESS CONTROL |
6.17 Set Retry Limit for Account Lockout | CIS Oracle Solaris 11.4 L1 v1.1.0 | Unix | ACCESS CONTROL |
Catalina - Disable Guest Access to Shared Apple File Protocol Folders | NIST macOS Catalina v1.5.0 - 800-53r4 Moderate | Unix | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION |
Catalina - Disable Guest Access to Shared Apple File Protocol Folders | NIST macOS Catalina v1.5.0 - CNSSI 1253 | Unix | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION |
Catalina - Disable Guest Access to Shared SMB Folders | NIST macOS Catalina v1.5.0 - 800-53r4 Moderate | Unix | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION |
Catalina - Disable Guest Access to Shared SMB Folders | NIST macOS Catalina v1.5.0 - 800-53r5 High | Unix | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION |
Catalina - Disable Guest Access to Shared SMB Folders | NIST macOS Catalina v1.5.0 - 800-53r5 Moderate | Unix | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION |