Item Search

NameAudit NamePluginCategory
1.1.1.5 Ensure mounting of hfsplus filesystems is disabled - lsmodCIS Debian 8 Workstation L1 v2.0.2Unix

CONFIGURATION MANAGEMENT

1.1.1.5 Ensure mounting of hfsplus filesystems is disabled - lsmodCIS Debian 8 Server L1 v2.0.2Unix

CONFIGURATION MANAGEMENT

1.1.1.5 Ensure mounting of hfsplus filesystems is disabled - modprobeCIS Debian 8 Server L1 v2.0.2Unix

CONFIGURATION MANAGEMENT

1.1.1.5 Ensure mounting of hfsplus filesystems is disabled - modprobeCIS Debian 8 Workstation L1 v2.0.2Unix

CONFIGURATION MANAGEMENT

1.1.9 Ensure noexec option set on /var/tmp partitionCIS Debian 8 Server L1 v2.0.2Unix

CONFIGURATION MANAGEMENT

1.1.9 Ensure noexec option set on /var/tmp partitionCIS Debian 8 Workstation L1 v2.0.2Unix

CONFIGURATION MANAGEMENT

1.1.16 Ensure noexec option set on /dev/shm partitionCIS Debian 8 Server L1 v2.0.2Unix

CONFIGURATION MANAGEMENT

1.1.16 Ensure noexec option set on /dev/shm partitionCIS Debian 8 Workstation L1 v2.0.2Unix

CONFIGURATION MANAGEMENT

1.1.19 Ensure noexec option set on removable media partitionsCIS Debian 8 Workstation L1 v2.0.2Unix

CONFIGURATION MANAGEMENT

1.1.19 Ensure noexec option set on removable media partitionsCIS Debian 8 Server L1 v2.0.2Unix

CONFIGURATION MANAGEMENT

2.5 (L1) Host must only run binaries delivered via signed VIBCIS VMware ESXi 8.0 v1.2.0 L1VMware

CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY

2.5.4 Audit Location Services AccessCIS Apple macOS 12.0 Monterey v4.0.0 L2Unix

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

2.5.4 Audit Location Services AccessCIS Apple macOS 10.15 Catalina v3.0.0 L2Unix

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

2.5.4 Audit Location Services AccessCIS Apple macOS 11.0 Big Sur v4.0.0 L2Unix

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

2.5.4 Audit Location Services AccessCIS Apple macOS 10.14 v2.0.0 L2Unix

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

2.6.1.1 Audit iCloud ConfigurationCIS Apple macOS 10.14 v2.0.0 L2Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

2.6.1.3 Audit Location Services AccessCIS Apple macOS 13.0 Ventura v3.0.0 L2Unix

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

2.6.1.3 Audit Location Services AccessCIS Apple macOS 14.0 Sonoma v2.0.0 L2Unix

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

2.6.1.3 Audit Location Services AccessCIS Apple macOS 15.0 Sequoia v1.0.0 L2Unix

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

5.1.2 Ensure Apple Mobile File Integrity (AMFI) Is EnabledCIS Apple macOS 12.0 Monterey Cloud-tailored v1.1.0 L1Unix

CONFIGURATION MANAGEMENT

5.1.2 Ensure Apple Mobile File Integrity (AMFI) Is EnabledCIS Apple macOS 14.0 Sonoma Cloud-tailored v1.1.0 L1Unix

CONFIGURATION MANAGEMENT

5.1.2 Ensure Apple Mobile File Integrity (AMFI) Is EnabledCIS Apple macOS 15.0 Sequoia Cloud-tailored v1.0.0 L1Unix

CONFIGURATION MANAGEMENT

5.1.2 Ensure Apple Mobile File Integrity (AMFI) Is EnabledCIS Apple macOS 13.0 Ventura Cloud-tailored v1.1.0 L1Unix

CONFIGURATION MANAGEMENT

5.1.2 Ensure System Integrity Protection Status (SIP) Is EnabledCIS Apple macOS 10.15 Catalina v3.0.0 L1Unix

CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY

5.1.2 Ensure System Integrity Protection Status (SIP) Is EnabledCIS Apple macOS 13.0 Ventura v3.0.0 L1Unix

CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY

5.1.2 Ensure System Integrity Protection Status (SIP) Is EnabledCIS Apple macOS 15.0 Sequoia v1.0.0 L1Unix

CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY

5.1.2 Ensure System Integrity Protection Status (SIP) Is EnabledCIS Apple macOS 11.0 Big Sur v4.0.0 L1Unix

CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY

5.1.2 Ensure System Integrity Protection Status (SIP) Is EnabledCIS Apple macOS 14.0 Sonoma v2.0.0 L1Unix

CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY

5.1.2 Ensure System Integrity Protection Status (SIP) Is EnabledCIS Apple macOS 12.0 Monterey v4.0.0 L1Unix

CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY

5.1.2 Ensure System Integrity Protection Status (SIPS) Is EnabledCIS Apple macOS 10.14 v2.0.0 L1Unix

CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY

5.1.3 Ensure Apple Mobile File Integrity (AMFI) Is EnabledCIS Apple macOS 10.15 Catalina v3.0.0 L1Unix

CONFIGURATION MANAGEMENT

5.1.3 Ensure Apple Mobile File Integrity (AMFI) Is EnabledCIS Apple macOS 11.0 Big Sur v4.0.0 L1Unix

CONFIGURATION MANAGEMENT

5.1.3 Ensure Apple Mobile File Integrity (AMFI) Is EnabledCIS Apple macOS 14.0 Sonoma v2.0.0 L1Unix

CONFIGURATION MANAGEMENT

5.1.3 Ensure Apple Mobile File Integrity (AMFI) Is EnabledCIS Apple macOS 15.0 Sequoia v1.0.0 L1Unix

CONFIGURATION MANAGEMENT

5.1.3 Ensure Apple Mobile File Integrity (AMFI) Is EnabledCIS Apple macOS 12.0 Monterey v4.0.0 L1Unix

CONFIGURATION MANAGEMENT

5.1.3 Ensure Apple Mobile File Integrity (AMFI) Is EnabledCIS Apple macOS 13.0 Ventura v3.0.0 L1Unix

CONFIGURATION MANAGEMENT

5.1.3 Ensure Apple Mobile File Integrity Is EnabledCIS Apple macOS 10.14 v2.0.0 L1Unix

CONFIGURATION MANAGEMENT

5.1.4 Ensure Library Validation Is EnabledCIS Apple macOS 10.14 v2.0.0 L1Unix

CONFIGURATION MANAGEMENT

5.11 Ensure Show All Filename Extensions Setting is EnabledCIS Apple macOS 15.0 Sequoia Cloud-tailored v1.0.0 L1Unix

CONFIGURATION MANAGEMENT

6.12 Ensure that 'User consent for applications' is set to 'Do not allow user consent'CIS Microsoft Azure Foundations v4.0.0 L1microsoft_azure

ACCESS CONTROL, CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION

6.13 Ensure that 'User consent for applications' is set to 'Allow user consent for apps from verified publishers, for selected permissions'CIS Microsoft Azure Foundations v4.0.0 L2microsoft_azure

CONFIGURATION MANAGEMENT

6.14 Ensure that 'Users can register applications' is set to 'No'CIS Microsoft Azure Foundations v4.0.0 L1microsoft_azure

ACCESS CONTROL, CONFIGURATION MANAGEMENT

18.10.15.8 (L1) Ensure 'Toggle user control over Insider builds' is set to 'Disabled'CIS Microsoft Windows Server 2019 v3.0.1 L1 MSWindows

CONFIGURATION MANAGEMENT

20.3 (L1) Ensure 'Microsoft Internet Explorer is not installed on the system'CIS Microsoft Windows 10 EMS Gateway v3.0.0 L1Windows

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

JUSX-DM-000165 - The Juniper SRX Services Gateway must reveal log messages or management console alerts only to the ISSO, ISSM, and SA roles).DISA Juniper SRX Services Gateway NDM v3r2Juniper

CONFIGURATION MANAGEMENT

MS.SHAREPOINT.2.2v1 - File and folder default sharing permissions SHALL be set to View.CISA SCuBA Microsoft 365 SharePoint Online OneDrive v1.5.0microsoft_azure

ACCESS CONTROL, SECURITY ASSESSMENT AND AUTHORIZATION, CONFIGURATION MANAGEMENT, CONTINGENCY PLANNING, SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY

MS.SHAREPOINT.3.2v1 - The allowable file and folder permissions for links SHALL be set to View only.CISA SCuBA Microsoft 365 SharePoint Online OneDrive v1.5.0microsoft_azure

ACCESS CONTROL, SECURITY ASSESSMENT AND AUTHORIZATION, CONFIGURATION MANAGEMENT, CONTINGENCY PLANNING, SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY

MS.SHAREPOINT.3.3v1 - Reauthentication days for people who use a verification code SHALL be set to 30 days or less.CISA SCuBA Microsoft 365 SharePoint Online OneDrive v1.5.0microsoft_azure

ACCESS CONTROL, SECURITY ASSESSMENT AND AUTHORIZATION, CONFIGURATION MANAGEMENT, CONTINGENCY PLANNING, SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY

MS.TEAMS.8.1v1 - URL comparison with a blocklist SHOULD be enabled.CISA SCuBA Microsoft 365 Teams v1.5.0microsoft_azure

ACCESS CONTROL, SECURITY ASSESSMENT AND AUTHORIZATION, CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND SERVICES ACQUISITION, SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY

MS.TEAMS.8.2v1 - User click tracking SHOULD be enabled.CISA SCuBA Microsoft 365 Teams v1.5.0microsoft_azure

ACCESS CONTROL, SECURITY ASSESSMENT AND AUTHORIZATION, CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND SERVICES ACQUISITION, SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY