1.2.2 Ensure GPG keys are configured | CIS Ubuntu Linux 14.04 LTS Workstation L1 v2.1.0 | Unix | SYSTEM AND INFORMATION INTEGRITY |
1.2.3.9 Set 'Choose the boot-start drivers that can be initialized:' to 'Enabled:Good, unknown and bad but critical' | CIS Windows 8 L1 v1.0.0 | Windows | SYSTEM AND INFORMATION INTEGRITY |
1.3.2 Ensure filesystem integrity is regularly checked | CIS Ubuntu Linux 14.04 LTS Workstation L1 v2.1.0 | Unix | SYSTEM AND INFORMATION INTEGRITY |
1.3.2 Ensure filesystem integrity is regularly checked | CIS Amazon Linux v2.1.0 L1 | Unix | SYSTEM AND INFORMATION INTEGRITY |
1.4.1 Ensure permissions on bootloader config are configured | CIS Ubuntu Linux 14.04 LTS Server L1 v2.1.0 | Unix | SYSTEM AND INFORMATION INTEGRITY |
1.4.2 Ensure authentication required for single user mode | CIS Amazon Linux v2.1.0 L1 | Unix | SYSTEM AND INFORMATION INTEGRITY |
1.4.2 Ensure bootloader password is set - 'passwd_pbkdf2' | CIS Ubuntu Linux 14.04 LTS Server L1 v2.1.0 | Unix | SYSTEM AND INFORMATION INTEGRITY |
1.4.2 Ensure bootloader password is set - 'passwd_pbkdf2' | CIS Ubuntu Linux 14.04 LTS Workstation L1 v2.1.0 | Unix | SYSTEM AND INFORMATION INTEGRITY |
1.4.2 Ensure bootloader password is set - 'set superusers' | CIS Ubuntu Linux 14.04 LTS Server L1 v2.1.0 | Unix | SYSTEM AND INFORMATION INTEGRITY |
1.6.1.1 Ensure SELinux is not disabled in bootloader configuration - 'enforcing' | CIS Ubuntu Linux 14.04 LTS Workstation L2 v2.1.0 | Unix | SYSTEM AND INFORMATION INTEGRITY |
1.6.1.1 Ensure SELinux is not disabled in bootloader configuration -'selinux' | CIS Ubuntu Linux 14.04 LTS Workstation L2 v2.1.0 | Unix | SYSTEM AND INFORMATION INTEGRITY |
2.1.1 Secure Installation via ISC Source | CIS ISC BIND 9.0/9.5 v2.0.0 | Unix | SYSTEM AND INFORMATION INTEGRITY |
2.8.4.1.1 Ensure 'Block macros from running in Office files from the internet' is set to 'Enabled' | CIS Microsoft Office Enterprise v1.2.0 L1 | Windows | CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY |
3.1 Set a nondeterministic Shutdown command value | CIS Apache Tomcat 11 v1.0.0 L1 | Unix | CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY |
3.2 Set Permissions on bootloader config | CIS Debian Linux 7 L1 v1.0.0 | Unix | SYSTEM AND INFORMATION INTEGRITY |
3.2 Set Permissions on bootloader config | CIS Ubuntu 12.04 LTS Benchmark L1 v1.1.0 | Unix | SYSTEM AND INFORMATION INTEGRITY |
4.12 Ensure all signed artifacts are validated | CIS Docker v1.7.0 L1 Docker - Linux | Unix | CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY |
5.1.4 Minimize access to create pods | CIS Red Hat OpenShift Container Platform v1.7.0 L1 | OpenShift | CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY |
5.3.3 Ensure that Content Security Policy (CSP) is enabled and configured properly | CIS NGINX Benchmark v2.1.0 L2 Webserver | Unix | CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY |
6.1.1 Audit system file permissions | CIS Amazon Linux v2.1.0 L2 | Unix | SYSTEM AND INFORMATION INTEGRITY |
6.3 Ensure that server-side scripting is disabled if not needed | CIS MongoDB 3.6 L2 Windows Audit v1.1.0 | Windows | CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY |
6.3.1 Ensure 'external scripts enabled' database flag for Cloud SQL SQL Server instance is set to 'off' | CIS Google Cloud Platform v3.0.0 L1 | GCP | CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY |
6.13 Secure the GRUB Menu - should pass if /boot/grub/menu.lst permissions are OK. | CIS Solaris 10 L1 v5.2 | Unix | SYSTEM AND INFORMATION INTEGRITY |
6.17 Secure the GRUB Menu (Intel) - menu.lst perms | CIS Solaris 11 L1 v1.1.0 | Unix | SYSTEM AND INFORMATION INTEGRITY |
6.17 Secure the GRUB Menu (Intel) - passwd.cfg | CIS Solaris 11.2 L1 v1.1.0 | Unix | SYSTEM AND INFORMATION INTEGRITY |
7.6 Ensure directory in logging.properties is a secure location - check application log directory is secure | CIS Apache Tomcat 10 L1 v1.1.0 Middleware | Unix | CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY |
7.6 Ensure directory in logging.properties is a secure location - check log directory location | CIS Apache Tomcat 10 L1 v1.1.0 | Unix | CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY |
7.6 Ensure directory in logging.properties is a secure location - check log directory location | CIS Apache Tomcat 10 L1 v1.1.0 Middleware | Unix | CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY |
7.6 Ensure directory in logging.properties is a secure location - check prefix application name | CIS Apache Tomcat 10 L1 v1.1.0 | Unix | CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY |
7.6 Ensure directory in logging.properties is a secure location - check prefix application name | CIS Apache Tomcat 10 L1 v1.1.0 Middleware | Unix | CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY |
10.12 Do not allow symbolic linking | CIS Apache Tomcat 9 L1 v1.2.0 Middleware | Unix | CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY |
10.12 Do not allow symbolic linking | CIS Apache Tomcat 10.1 v1.1.0 L1 | Unix | CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY |
10.12 Do not allow symbolic linking | CIS Apache Tomcat 10 L1 v1.1.0 Middleware | Unix | CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY |
10.14 Do not allow cross context requests | CIS Apache Tomcat 10 L1 v1.1.0 | Unix | CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY |
10.14 Do not allow cross context requests | CIS Apache Tomcat 10 L1 v1.1.0 Middleware | Unix | CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY |
10.14 Do not allow cross context requests | CIS Apache Tomcat 9 L1 v1.2.0 Middleware | Unix | CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY |
10.14 Do not allow cross context requests | CIS Apache Tomcat 10.1 v1.1.0 L1 | Unix | CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY |
Audit system file permissions - dpkg | Tenable Cisco Firepower Management Center OS Best Practices Audit | Unix | SYSTEM AND INFORMATION INTEGRITY |
Audit system file permissions - zypper | Tenable Cisco Firepower Management Center OS Best Practices Audit | Unix | SYSTEM AND INFORMATION INTEGRITY |
Boot-Start Driver Initialization Policy | MSCT Windows 10 1809 v1.0.0 | Windows | SYSTEM AND INFORMATION INTEGRITY |
Boot-Start Driver Initialization Policy | MSCT Windows 10 1909 v1.0.0 | Windows | SYSTEM AND INFORMATION INTEGRITY |
Boot-Start Driver Initialization Policy | MSCT Windows 10 v20H2 v1.0.0 | Windows | SYSTEM AND INFORMATION INTEGRITY |
Boot-Start Driver Initialization Policy | MSCT Windows 10 v21H2 v1.0.0 | Windows | SYSTEM AND INFORMATION INTEGRITY |
Boot-Start Driver Initialization Policy | MSCT Windows 10 v1507 v1.0.0 | Windows | SYSTEM AND INFORMATION INTEGRITY |
Boot-Start Driver Initialization Policy | MSCT Windows Server v2004 DC v1.0.0 | Windows | SYSTEM AND INFORMATION INTEGRITY |
Boot-Start Driver Initialization Policy | MSCT Windows Server v1909 DC v1.0.0 | Windows | SYSTEM AND INFORMATION INTEGRITY |
Boot-Start Driver Initialization Policy | MSCT Windows Server v1909 MS v1.0.0 | Windows | SYSTEM AND INFORMATION INTEGRITY |
Boot-Start Driver Initialization Policy | MSCT Windows Server 2016 MS v1.0.0 | Windows | SYSTEM AND INFORMATION INTEGRITY |
Boot-Start Driver Initialization Policy | MSCT Windows Server v20H2 MS v1.0.0 | Windows | SYSTEM AND INFORMATION INTEGRITY |
Ensure filesystem integrity is regularly checked | Tenable Cisco Firepower Management Center OS Best Practices Audit | Unix | SYSTEM AND INFORMATION INTEGRITY |