1.6.1.1 Ensure SELinux is installed | CIS CentOS 6 Workstation L1 v3.0.0 | Unix | ACCESS CONTROL |
1.6.1.1 Ensure SELinux or AppArmor are installed | CIS Distribution Independent Linux Server L2 v2.0.0 | Unix | ACCESS CONTROL |
1.6.3.2 Ensure all AppArmor Profiles are enforcing - 0 profiles are in complain mode | CIS Distribution Independent Linux Workstation L2 v2.0.0 | Unix | ACCESS CONTROL |
2.4 Set root Ownership of BIND Directories | CIS BIND DNS v1.0.0 L1 Authoritative Name Server | Unix | ACCESS CONTROL |
2.8 Set Other Permissions Read-Only for All BIND Directories and Files - files | CIS BIND DNS v1.0.0 L1 Authoritative Name Server | Unix | ACCESS CONTROL |
2.9 Isolate BIND with chroot'ed Subdirectory | CIS BIND DNS v1.0.0 L2 Authoritative Name Server | Unix | ACCESS CONTROL |
3.1 Ensure the Apache Web Server Runs As a Non-Root User - 'apache account is configured' | CIS Apache HTTP Server 2.2 L2 v3.6.0 | Unix | ACCESS CONTROL |
3.1 Ensure the Apache Web Server Runs As a Non-Root User - 'httpd.conf Group = apache' | CIS Apache HTTP Server 2.2 L1 v3.6.0 Middleware | Unix | ACCESS CONTROL |
3.2.1.19 Ensure 'Allow documents from managed sources in unmanaged destinations' is set to 'Disabled' | MobileIron - CIS Apple iOS 14 and iPadOS 14 Institution Owned L1 | MDM | ACCESS CONTROL |
3.3.1 Ensure 'Managed Safari Web Domains' is 'Configured' | AirWatch - CIS Apple iOS 14 and iPadOS 14 Institution Owned L1 | MDM | ACCESS CONTROL |
3.3.1 Ensure 'Managed Safari Web Domains' is 'Configured' | MobileIron - CIS Apple iOS 14 and iPadOS 14 Institution Owned L1 | MDM | ACCESS CONTROL |
3.4 Ensure Apache Directories and Files Are Owned By Root | CIS Apache HTTP Server 2.2 L1 v3.6.0 Middleware | Unix | ACCESS CONTROL |
3.4.5 Ensure permissions on /etc/hosts.deny are configured | CIS CentOS 6 Workstation L1 v3.0.0 | Unix | ACCESS CONTROL |
3.6 Ensure Other Write Access on Apache Directories and Files Is Restricted | CIS Apache HTTP Server 2.2 L1 v3.6.0 | Unix | ACCESS CONTROL |
3.6.2 Ensure 'Allow Mail Drop' is set to 'Disabled' | AirWatch - CIS Apple iOS 14 and iPadOS 14 Institution Owned L2 | MDM | ACCESS CONTROL |
3.9 Secure the Pid File - 'PidFile directory' | CIS Apache HTTP Server 2.2 L1 v3.6.0 | Unix | ACCESS CONTROL |
3.9 Secure the Pid File - 'PidFile directory' | CIS Apache HTTP Server 2.2 L2 v3.6.0 | Unix | ACCESS CONTROL |
3.11 Ensure Group Write Access for the Apache Directories and Files Is Properly Restricted | CIS Apache HTTP Server 2.2 L1 v3.6.0 | Unix | ACCESS CONTROL |
4.1 Ensure Access to OS Root Directory Is Denied By Default - 'httpd.conf Deny = from all | CIS Apache HTTP Server 2.2 L1 v3.6.0 | Unix | ACCESS CONTROL |
4.1 Ensure Access to OS Root Directory Is Denied By Default - 'httpd.conf no Require directives exist' | CIS Apache HTTP Server 2.2 L1 v3.6.0 Middleware | Unix | ACCESS CONTROL |
4.1 Ensure Access to OS Root Directory Is Denied By Default - 'httpd.conf Require all denied | CIS Apache HTTP Server 2.2 L1 v3.6.0 | Unix | ACCESS CONTROL |
4.2 Ensure Appropriate Access to Web Content Is Allowed - 'httpd.conf Allow is configured' | CIS Apache HTTP Server 2.2 L1 v3.6.0 | Unix | ACCESS CONTROL |
4.2 Ensure Appropriate Access to Web Content Is Allowed - 'httpd.conf Allow is configured' | CIS Apache HTTP Server 2.2 L2 v3.6.0 | Unix | ACCESS CONTROL |
4.2 Ensure Appropriate Access to Web Content Is Allowed - 'httpd.conf Deny is configured' | CIS Apache HTTP Server 2.2 L1 v3.6.0 | Unix | ACCESS CONTROL |
4.2 Ensure Appropriate Access to Web Content Is Allowed - 'httpd.conf Order Deny,Allow' | CIS Apache HTTP Server 2.2 L2 v3.6.0 | Unix | ACCESS CONTROL |
4.2 Ensure Appropriate Access to Web Content Is Allowed - 'Require is configured' | CIS Apache HTTP Server 2.2 L2 v3.6.0 | Unix | ACCESS CONTROL |
4.2 Restrict access to $CATALINA_BASE | CIS Apache Tomcat 8 L1 v1.1.0 | Unix | ACCESS CONTROL |
4.2.2 Ensure permissions on all logfiles are configured | CIS CentOS 6 Workstation L1 v3.0.0 | Unix | ACCESS CONTROL |
4.4 Ensure OverRide Is Disabled for All Directories | CIS Apache HTTP Server 2.2 L1 v3.6.0 | Unix | ACCESS CONTROL |
4.4 Restrict Access to All Key Files - group root/named | CIS BIND DNS v1.0.0 L1 Caching Only Name Server | Unix | ACCESS CONTROL |
4.4 Restrict Access to All Key Files - user root/named | CIS BIND DNS v1.0.0 L1 Authoritative Name Server | Unix | ACCESS CONTROL |
4.12 Restrict access to Tomcat server.xml | CIS Apache Tomcat 8 L1 v1.1.0 | Unix | ACCESS CONTROL |
4.14 Restrict access to Tomcat web.xml | CIS Apache Tomcat 8 L1 v1.1.0 | Unix | ACCESS CONTROL |
5.1.2 Ensure permissions on /etc/crontab are configured | CIS CentOS 6 Workstation L1 v3.0.0 | Unix | ACCESS CONTROL |
5.1.2 Ensure permissions on /etc/crontab are configured | CIS Debian Family Server L1 v1.0.0 | Unix | ACCESS CONTROL |
5.1.6 Ensure permissions on /etc/cron.monthly are configured | CIS Debian Family Workstation L1 v1.0.0 | Unix | ACCESS CONTROL |
5.1.7 Ensure permissions on /etc/cron.d are configured | CIS CentOS 6 Workstation L1 v3.0.0 | Unix | ACCESS CONTROL |
5.1.8 Ensure cron is restricted to authorized users - cron.deny | CIS Debian Family Workstation L1 v1.0.0 | Unix | ACCESS CONTROL |
5.1.9 Ensure at is restricted to authorized users - at.allow | CIS Debian Family Server L1 v1.0.0 | Unix | ACCESS CONTROL |
5.2.3 Ensure permissions on SSH public host key files are configured | CIS Debian Family Server L1 v1.0.0 | Unix | ACCESS CONTROL |
5.2.11 Ensure SSH PermitUserEnvironment is disabled | CIS Debian Family Workstation L1 v1.0.0 | Unix | ACCESS CONTROL |
6.1.1 Audit system file permissions | CIS Distribution Independent Linux Server L2 v2.0.0 | Unix | ACCESS CONTROL |
6.2.4 Ensure users own their home directories | CIS Debian Family Workstation L1 v1.0.0 | Unix | ACCESS CONTROL |
6.2.6 Ensure root is the only UID 0 account | CIS CentOS 6 Workstation L1 v3.0.0 | Unix | ACCESS CONTROL |
6.2.7 Ensure no users have .netrc files | CIS Debian Family Workstation L1 v1.0.0 | Unix | ACCESS CONTROL |
6.2.9 Ensure users own their home directories | CIS CentOS 6 Workstation L1 v3.0.0 | Unix | ACCESS CONTROL |
7.3 Ensure the Server's Private Key Is Protected | CIS Apache HTTP Server 2.2 L1 v3.6.0 | Unix | ACCESS CONTROL |
7.3 Ensure the Server's Private Key Is Protected | CIS Apache HTTP Server 2.2 L1 v3.6.0 Middleware | Unix | ACCESS CONTROL |
7.6 Ensure directory in logging.properties is a secure location - check application log directory is secure | CIS Apache Tomcat 8 L1 v1.1.0 | Unix | ACCESS CONTROL |
11.2 Ensure Apache Processes Run in the httpd_t Confined Context - apachectl | CIS Apache HTTP Server 2.2 L2 v3.6.0 | Unix | ACCESS CONTROL |