2.3.1 Ensure 'Managed Safari Web Domains' is 'Configured' | AirWatch - CIS Apple iPadOS 17 v1.1.0 End User Owned L1 | MDM | ACCESS CONTROL, MEDIA PROTECTION |
2.3.1 Ensure 'Managed Safari Web Domains' is 'Configured' | MobileIron - CIS Apple iPadOS 17 v1.1.0 End User Owned L1 | MDM | ACCESS CONTROL, MEDIA PROTECTION |
2.3.1 Ensure 'Managed Safari Web Domains' is 'Configured' | AirWatch - CIS Apple iOS 14 and iPadOS 14 v1.0.0 End User Owned L1 | MDM | ACCESS CONTROL |
2.3.2.2 Ensure the Time Service Is Enabled | CIS Apple macOS 13.0 Ventura v3.1.0 L1 | Unix | AUDIT AND ACCOUNTABILITY |
2.3.2.2 Ensure the Time Service Is Enabled | CIS Apple macOS 14.0 Sonoma v2.1.0 L1 | Unix | AUDIT AND ACCOUNTABILITY |
2.3.10.3 Ensure 'Network access: Do not allow anonymous enumeration of SAM accounts' is set to 'Enabled' (STIG only) | CIS Microsoft Windows Server 2016 STIG v3.0.0 STIG MS | Windows | ACCESS CONTROL |
2.3.10.5 Ensure 'Network access: Do not allow anonymous enumeration of SAM accounts and shares' is set to 'Enabled' (STIG only) | CIS Microsoft Windows Server 2016 STIG v3.0.0 STIG MS | Windows | ACCESS CONTROL |
2.10.1.2 Ensure Sleep and Display Sleep Is Enabled on Apple Silicon Devices | CIS Apple macOS 15.0 Sequoia v1.1.0 L2 | Unix | CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION |
3.2.1.8 Ensure 'Allow USB drive access in Files app' is set to 'Disabled' | MobileIron - CIS Apple iOS 13 and iPadOS 13 Institution Owned L2 | MDM | MEDIA PROTECTION |
3.3.1 Ensure 'Managed Safari Web Domains' is 'Configured' | AirWatch - CIS Apple iOS 14 and iPadOS 14 Institution Owned L1 | MDM | ACCESS CONTROL |
3.3.1 Ensure 'Managed Safari Web Domains' is 'Configured' | MobileIron - CIS Apple iOS 14 and iPadOS 14 Institution Owned L1 | MDM | ACCESS CONTROL |
4.1.2 Review Emergency Reset | AirWatch - CIS Apple iOS 18 Benchmark v1.0.0 L1 End User Owned | MDM | CONFIGURATION MANAGEMENT |
5.2 Ensure External File System Access is disabled - enable file access | CIS Sybase 15.0 L1 DB v1.1.0 | SybaseDB | |
6.3 Disable the automatic run of safe files in Safari | CIS Apple macOS 10.12 L1 v1.2.0 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
6.3 Disable the automatic run of safe files in Safari | CIS Apple macOS 10.13 L1 v1.1.0 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
6.3 Ensure Automatic Opening of Safe Files in Safari Is Disabled | CIS Apple macOS 10.14 v2.0.0 L1 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
7.2.1 Ensure Automatic Opening of Safe Files in Safari Is Disabled | CIS Apple macOS 10.15 Catalina v3.0.0 L1 | Unix | CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY |
7.2.1 Ensure Automatic Opening of Safe Files in Safari Is Disabled | CIS Apple macOS 11.0 Big Sur v4.0.0 L1 | Unix | CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY |
90.1 (L1) Ensure 'Hypervisor Enforced Code Integrity' is set to 'Enabled with UEFI lock' | CIS Microsoft Intune for Windows 11 v4.0.0 L1 | Windows | SYSTEM AND INFORMATION INTEGRITY |
AIOS-18-011900 - Apple iOS/iPadOS 18 users must complete required training. | MobileIron - DISA Apple iOS/iPadOS 18 v1r1 | MDM | CONFIGURATION MANAGEMENT |
APPL-12-003013 - The macOS system must be configured with a firmware password to prevent access to single user mode and booting from alternative media. | DISA STIG Apple macOS 12 v1r9 | Unix | CONFIGURATION MANAGEMENT |
Big Sur - Configure Apple System Log Files To Mode 640 or Less Permissive | NIST macOS Big Sur v1.4.0 - 800-53r5 High | Unix | SYSTEM AND INFORMATION INTEGRITY |
Catalina - Configure Apple System Log Files To Mode 640 or Less Permissive | NIST macOS Catalina v1.5.0 - All Profiles | Unix | SYSTEM AND INFORMATION INTEGRITY |
CIS AIX 5.3 and 6.1 v1.1.0 Level 1 | CIS AIX 5.3/6.1 L1 v1.1.0 | Unix | |
CIS AIX 5.3 and 6.1 v1.1.0 Level 2 | CIS AIX 5.3/6.1 L2 v1.1.0 | Unix | |
CIS Control 6 (6.2(b)) Activate Audit Logging | CAS Implementation Group 1 Audit File | Unix | AUDIT AND ACCOUNTABILITY |
CIS Control 13 (13.6) Encrypt Mobile Device Data | CAS Implementation Group 1 Audit File | Unix | ACCESS CONTROL |
CIS_AlmaLinux_OS_9_v2.0.0_L1_Server.audit from CIS AlmaLinux OS 9 Benchmark v2.0.0 | CIS AlmaLinux OS 9 v2.0.0 L1 Server | Unix | |
CIS_AlmaLinux_OS_9_v2.0.0_L2_Workstation.audit from CIS AlmaLinux OS 9 Benchmark v2.0.0 | CIS AlmaLinux OS 9 v2.0.0 L2 Workstation | Unix | |
CIS_Apache_Tomcat_9_L2_v1.2.0.audit from CIS Apache Tomcat 9 Benchmark | CIS Apache Tomcat 9 L2 v1.2.0 | Unix | |
CIS_CentOS_Linux_7_v4.0.0_L1_Server.audit from CIS CentOS Linux 7 Benchmark v4.0.0 | CIS CentOS Linux 7 v4.0.0 L1 Server | Unix | |
CIS_CentOS_Linux_7_v4.0.0_L2_Server.audit from CIS CentOS Linux 7 Benchmark v4.0.0 | CIS CentOS Linux 7 v4.0.0 L2 Server | Unix | |
CIS_Cisco_IOS_15_v4.1.1_Level_2.audit from CIS Cisco IOS 15 Benchmark | CIS Cisco IOS 15 L2 v4.1.1 | Cisco | |
CIS_Debian_Linux_9_Server_v1.0.1_L2.audit from CIS Debian Linux 9 Benchmark | CIS Debian 9 Server L2 v1.0.1 | Unix | |
CIS_Debian_Linux_9_Workstation_v1.0.1_L1.audit from CIS Debian Linux 9 Benchmark | CIS Debian 9 Workstation L1 v1.0.1 | Unix | |
CIS_Debian_Linux_9_Workstation_v1.0.1_L1.audit from CIS Debian Linux 9 Benchmark | CIS Debian 9 Workstation L2 v1.0.1 | Unix | |
CIS_Debian_Linux_12_v1.1.0_L1_Workstation.audit from CIS Debian Linux 12 Benchmark v1.1.0 | CIS Debian Linux 12 v1.1.0 L1 Workstation | Unix | |
CIS_IBM_DB2_9_Benchmark_v3.0.1_Level_1_OS_Linux.audit from CIS IBM DB2 9 Benchmark v3.0.1 | CIS IBM DB2 9 Benchmark v3.0.1 Level 1 OS Linux | Unix | |
CIS_IBM_DB2_9_Benchmark_v3.0.1_Level_2_OS_Windows.audit from CIS IBM DB2 9 Benchmark v3.0.1 | CIS IBM DB2 9 Benchmark v3.0.1 Level 1 OS Windows | Windows | |
CIS_IBM_DB2_10_v1.1.0_Level_1_OS_Windows.audit from CIS DB2 10.x Windows OS | CIS IBM DB2 v10 v1.1.0 Windows OS Level 1 | Windows | |
CIS_IBM_DB2_11_v1.1.0_Level_1_OS_Windows.audit from CIS IBM DB2 11 v1.1.0 Benchmark | CIS IBM DB2 11 v1.1.0 Windows OS Level 1 | Windows | |
CIS_MacOS_Safari_Benchmark_v2.0.0_L1.audit from CIS MacOS Safari Benchmark v2.0.0 | CIS MacOS Safari v2.0.0 L1 | Unix | |
CIS_Microsoft_Edge_v3.0.0_L1.audit from CIS Microsoft Edge Benchmark v3.0.0 | CIS Microsoft Edge v3.0.0 L1 | Windows | |
CIS_Oracle_Linux_9_v2.0.0_L1_Workstation.audit from CIS Oracle Linux 9 Benchmark v2.0.0 | CIS Oracle Linux 9 v2.0.0 L1 Workstation | Unix | |
CIS_Oracle_Server_12c_v3.0.0_L1_Windows.audit from CIS Oracle Database 12c Benchmark v3.0.0 | CIS Oracle Server 12c Windows v3.0.0 | Windows | |
CIS_Rocky_Linux_8_v2.0.0_L2_Server.audit from CIS Rocky Linux 8 Benchmark v2.0.0 | CIS Rocky Linux 8 Server L2 v2.0.0 | Unix | |
CIS_Ubuntu_20.04_LTS_v2.0.1_L1_Workstation.audit from CIS Ubuntu Linux 20.04 LTS Benchmark | CIS Ubuntu Linux 20.04 LTS Workstation L1 v2.0.1 | Unix | |
CIS_VMware_ESXi_6.7_v1.3.0_L1_Bare_Metal.audit from CIS VMware ESXi 6.7 Benchmark v1.3.0 | CIS VMware ESXi 6.7 v1.3.0 Level 1 Bare Metal | Unix | |
Monterey - Configure Apple System Log Files To Mode 640 or Less Permissive | NIST macOS Monterey v1.0.0 - All Profiles | Unix | SYSTEM AND INFORMATION INTEGRITY |
Monterey - Configure Apple System Log Files To Mode 640 or Less Permissive | NIST macOS Monterey v1.0.0 - 800-53r5 Moderate | Unix | SYSTEM AND INFORMATION INTEGRITY |