1.1.3 Ensure that between two and four global admins are designated | CIS Microsoft 365 Foundations E3 L1 v3.1.0 | microsoft_azure | ACCESS CONTROL |
1.3.2 Ensure sudo commands use pty | CIS Fedora 19 Family Linux Server L1 v1.0.0 | Unix | ACCESS CONTROL |
1.13 Ensure access keys are rotated every 90 days or less | CIS Amazon Web Services Foundations v5.0.0 L1 | amazon_aws | ACCESS CONTROL |
2.2.5 Ensure 'Allow log on locally' is set to 'Administrators, Users' | CIS Microsoft Windows 8.1 v2.4.1 L1 | Windows | ACCESS CONTROL |
2.2.26 (L1) Ensure 'Enable computer and user accounts to be trusted for delegation' is set to 'No One' (MS only) | CIS Azure Compute Microsoft Windows Server 2019 v1.0.0 L1 MS | Windows | ACCESS CONTROL |
2.2.27 (L1) Ensure 'Enable computer and user accounts to be trusted for delegation' is set to 'Administrators' (DC only) | CIS Windows Server 2012 R2 DC L1 v3.0.0 | Windows | ACCESS CONTROL |
2.4 Do Not Reuse Usernames | CIS MariaDB 10.6 Database L1 v1.1.0 | MySQLDB | ACCESS CONTROL |
2.4 Do Not Reuse Usernames | CIS MySQL 5.6 Community Database L1 v2.0.0 | MySQLDB | ACCESS CONTROL |
2.11 Implement Connection Delays to Limit Failed Login Attempts - CONNECTION_CONTROL | CIS MySQL 5.6 Community Database L1 v2.0.0 | MySQLDB | ACCESS CONTROL |
2.11 Implement Connection Delays to Limit Failed Login Attempts - CONNECTION_CONTROL_FAILED_LOGIN_ATTEMPTS | CIS MySQL 5.6 Enterprise Database L1 v2.0.0 | MySQLDB | ACCESS CONTROL |
2.18 Implement Connection Delays to Limit Failed Login Attempts | CIS Oracle MySQL Enterprise Edition 8.0 v1.4.0 L1 Database | MySQLDB | ACCESS CONTROL |
2.26 Ensure fewer than 5 users have global administrator assignment | CIS Microsoft Azure Foundations v3.0.0 L1 | microsoft_azure | ACCESS CONTROL |
4.1 Ensure that a user for the container has been created | CIS Docker v1.7.0 L1 Docker - Linux | Unix | ACCESS CONTROL |
4.4 Ensure only authorized users and groups belong to the esxAdminsGroup group | CIS VMware ESXi 6.5 v1.0.0 Level 1 | VMware | ACCESS CONTROL |
4.4.2 Ensure lockout for failed password attempts is configured | CIS Ubuntu Linux 18.04 LTS v2.2.0 L1 Workstation | Unix | ACCESS CONTROL |
5.1.3 Ensure group names and GIDs are unique | CIS IBM AIX 7 v1.0.0 L1 | Unix | ACCESS CONTROL |
5.1.4 Ensure an Inventory of Administrator accounts is established and maintained | CIS IBM AIX 7 v1.0.0 L1 | Unix | ACCESS CONTROL |
5.1.8 Ensure cron is restricted to authorized users - cron.deny | CIS Fedora 19 Family Linux Server L1 v1.0.0 | Unix | ACCESS CONTROL |
5.3.2 Ensure lockout for failed password attempts is configured - /etc/pam.d/common-auth | CIS Debian Family Server L1 v1.0.0 | Unix | ACCESS CONTROL |
5.3.2 Ensure lockout for failed password attempts is configured - account required | CIS SUSE Linux Enterprise Workstation 11 L1 v2.1.1 | Unix | ACCESS CONTROL |
5.4.2 Ensure lockout for failed password attempts is configured - account pam_deny.so | CIS Ubuntu Linux 16.04 LTS Workstation L1 v2.0.0 | Unix | ACCESS CONTROL |
5.4.2 Ensure lockout for failed password attempts is configured - account pam_tally2.so | CIS Ubuntu Linux 16.04 LTS Workstation L1 v2.0.0 | Unix | ACCESS CONTROL |
5.4.2 Ensure lockout for failed password attempts is configured - auth pam_tally2.so | CIS Ubuntu Linux 16.04 LTS Workstation L1 v2.0.0 | Unix | ACCESS CONTROL |
5.4.2 Ensure lockout for failed password attempts is configured - password-auth | CIS CentOS 6 Server L1 v3.0.0 | Unix | ACCESS CONTROL |
5.4.2 Ensure lockout for failed password attempts is configured - password-auth | CIS Oracle Linux 6 Server L1 v2.0.0 | Unix | ACCESS CONTROL |
5.4.2 Ensure lockout for failed password attempts is configured - system-auth | CIS CentOS 6 Server L1 v3.0.0 | Unix | ACCESS CONTROL |
5.4.2 Ensure system accounts are secured | CIS Debian Family Server L1 v1.0.0 | Unix | ACCESS CONTROL |
5.4.2 Ensure system accounts are secured - non login | CIS Fedora 19 Family Linux Workstation L1 v1.0.0 | Unix | ACCESS CONTROL |
5.4.3 Ensure password reuse is limited | CIS Ubuntu Linux 16.04 LTS Server L1 v2.0.0 | Unix | ACCESS CONTROL |
6.2.13 Ensure no duplicate UIDs exist | CIS Debian Family Server L1 v1.0.0 | Unix | ACCESS CONTROL |
6.2.13 Ensure no duplicate UIDs exist | CIS Debian Family Workstation L1 v1.0.0 | Unix | ACCESS CONTROL |
6.2.14 Ensure no duplicate GIDs exist | CIS Debian Family Server L1 v1.0.0 | Unix | ACCESS CONTROL |
6.2.15 Ensure no duplicate user names exist | CIS Ubuntu Linux 16.04 LTS Server L1 v2.0.0 | Unix | ACCESS CONTROL |
6.2.15 Ensure no duplicate user names exist | CIS Ubuntu Linux 16.04 LTS Workstation L1 v2.0.0 | Unix | ACCESS CONTROL |
6.2.16 Ensure no duplicate user names exist | CIS Fedora 19 Family Linux Server L1 v1.0.0 | Unix | ACCESS CONTROL |
6.2.17 Ensure no duplicate GIDs exist | CIS Debian 9 Workstation L1 v1.0.1 | Unix | ACCESS CONTROL |
6.2.17 Ensure no duplicate GIDs exist | CIS SUSE Linux Enterprise Workstation 11 L1 v2.1.1 | Unix | ACCESS CONTROL |
6.2.18 Ensure no duplicate user names exist | CIS SUSE Linux Enterprise Server 11 L1 v2.1.1 | Unix | ACCESS CONTROL |
6.2.19 Ensure no duplicate group names exist | CIS SUSE Linux Enterprise Server 11 L1 v2.1.1 | Unix | ACCESS CONTROL |
6.2.20 Ensure shadow group is empty | CIS Debian 9 Server L1 v1.0.1 | Unix | ACCESS CONTROL |
6.6.1.2 Ensure Max Login Backoff Threshold of 2 | CIS Juniper OS Benchmark v2.1.0 L1 | Juniper | ACCESS CONTROL |
6.6.6 Ensure Predefined Login Classes are not used | CIS Juniper OS Benchmark v2.1.0 L1 | Juniper | ACCESS CONTROL |
6.11.4 Ensure Console Port is Set as Insecure | CIS Juniper OS Benchmark v2.1.0 L2 | Juniper | ACCESS CONTROL |
7.6 Ensure No Anonymous Accounts Exist | CIS MariaDB 10.6 Database L1 v1.1.0 | MySQLDB | ACCESS CONTROL |
7.7 Ensure No Anonymous Accounts Exist | CIS Oracle MySQL Enterprise Edition 8.0 v1.4.0 L1 Database | MySQLDB | ACCESS CONTROL |
7.9 FileVault and Local Account Password Reset using AppleID | CIS Apple macOS 10.12 L2 v1.2.0 | Unix | ACCESS CONTROL |
Catalina - Disable Guest Access to Shared Apple File Protocol Folders | NIST macOS Catalina v1.5.0 - 800-53r5 High | Unix | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION |
Catalina - Disable Guest Access to Shared Apple File Protocol Folders | NIST macOS Catalina v1.5.0 - 800-171 | Unix | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION |
Catalina - Disable Guest Access to Shared SMB Folders | NIST macOS Catalina v1.5.0 - 800-53r4 High | Unix | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION |
Catalina - Disable Guest Access to Shared SMB Folders | NIST macOS Catalina v1.5.0 - CNSSI 1253 | Unix | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION |