Item Search

NameAudit NamePluginCategory
1.1.1 Create Separate Partition for /tmpCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

1.1.3 Set nosuid option for /tmp PartitionCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

1.1.5 Create Separate Partition for /varCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

1.1.9 Create Separate Partition for /homeCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

1.1.12 Add noexec Option to Removable Media PartitionsCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

1.1.13 Add nosuid Option to Removable Media PartitionsCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

1.1.14 Add nodev Option to /dev/shm PartitionCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

1.1.15 Add nosuid Option to /dev/shm PartitionCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

3.4.4.2.4 Ensure firewall rules exist for all open portsCIS Ubuntu Linux 18.04 LXD Container L1 v1.0.0Unix

CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

3.6 Ensure Firewall Logging Is Enabled and ConfiguredCIS Apple macOS 11.0 Big Sur v4.0.0 L1Unix

AUDIT AND ACCOUNTABILITY, SYSTEM AND COMMUNICATIONS PROTECTION

3.6 Ensure Firewall Logging Is Enabled and ConfiguredCIS Apple macOS 12.0 Monterey v4.0.0 L1Unix

AUDIT AND ACCOUNTABILITY, SYSTEM AND COMMUNICATIONS PROTECTION

3.6 Ensure Firewall Logging Is Enabled and ConfiguredCIS Apple macOS 14.0 Sonoma v2.1.0 L1Unix

AUDIT AND ACCOUNTABILITY, SYSTEM AND COMMUNICATIONS PROTECTION

3.6 Ensure Firewall Logging Is Enabled and ConfiguredCIS Apple macOS 13.0 Ventura Cloud-tailored v1.1.0 L1Unix

AUDIT AND ACCOUNTABILITY, SYSTEM AND COMMUNICATIONS PROTECTION

3.6 Ensure Firewall Logging Is Enabled and ConfiguredCIS Apple macOS 15.0 Sequoia Cloud-tailored v1.0.0 L1Unix

AUDIT AND ACCOUNTABILITY, SYSTEM AND COMMUNICATIONS PROTECTION

3.6 Ensure Firewall Logging Is Enabled and ConfiguredCIS Apple macOS 12.0 Monterey Cloud-tailored v1.1.0 L1Unix

AUDIT AND ACCOUNTABILITY, SYSTEM AND COMMUNICATIONS PROTECTION

3.6 Ensure Firewall Logging Is Enabled and ConfiguredCIS Apple macOS 14.0 Sonoma Cloud-tailored v1.1.0 L1Unix

AUDIT AND ACCOUNTABILITY, SYSTEM AND COMMUNICATIONS PROTECTION

3.6 Ensure Firewall Logging Is Enabled and Configured - LoggingOptionCIS Apple macOS 10.15 Catalina v3.0.0 L1Unix

AUDIT AND ACCOUNTABILITY, SYSTEM AND COMMUNICATIONS PROTECTION

3.6.4.1.4 Ensure firewall rules exist for all open portsCIS Ubuntu Linux 18.04 LXD Host L1 Workstation v1.0.0Unix

CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

3.6.4.1.4 Ensure firewall rules exist for all open portsCIS Ubuntu Linux 18.04 LXD Host L1 Server v1.0.0Unix

CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

5.4.4 Ensure default user umask is 027 or more restrictive - /etc/bashrcCIS Distribution Independent Linux Server L1 v2.0.0Unix

CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

5.4.4 Ensure default user umask is 027 or more restrictive - /etc/bashrcCIS Distribution Independent Linux Workstation L1 v2.0.0Unix

CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

5.4.4 Ensure default user umask is 027 or more restrictive - /etc/profile /etc/profile.d/*.shCIS Distribution Independent Linux Workstation L1 v2.0.0Unix

CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

5.4.4 Ensure default user umask is 027 or more restrictive - /etc/profile /etc/profile.d/*.shCIS Distribution Independent Linux Server L1 v2.0.0Unix

CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

6.1.10 Ensure no world writable files existCIS Distribution Independent Linux Server L1 v2.0.0Unix

CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

6.1.10 Ensure no world writable files existCIS Distribution Independent Linux Workstation L1 v2.0.0Unix

CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

6.10 Ensure that access to every URL is loggedCIS Palo Alto Firewall 10 v1.2.0 L1Palo_Alto

AUDIT AND ACCOUNTABILITY, SYSTEM AND COMMUNICATIONS PROTECTION

6.11 Ensure that access to every URL is loggedCIS Palo Alto Firewall 9 v1.1.0 L1Palo_Alto

AUDIT AND ACCOUNTABILITY, SYSTEM AND COMMUNICATIONS PROTECTION

6.12 Ensure all HTTP Header Logging options are enabled - Log Container PageCIS Palo Alto Firewall 9 v1.1.0 L1Palo_Alto

AUDIT AND ACCOUNTABILITY, SYSTEM AND COMMUNICATIONS PROTECTION

6.12 Ensure all HTTP Header Logging options are enabled - RefererCIS Palo Alto Firewall 9 v1.1.0 L1Palo_Alto

AUDIT AND ACCOUNTABILITY, SYSTEM AND COMMUNICATIONS PROTECTION

6.12 Ensure all HTTP Header Logging options are enabled - X-Forwarded-ForCIS Palo Alto Firewall 9 v1.1.0 L1Palo_Alto

AUDIT AND ACCOUNTABILITY, SYSTEM AND COMMUNICATIONS PROTECTION

8.3 Ensure that the Certificate used for Decryption is TrustedCIS Palo Alto Firewall 8 Benchmark L1 v1.0.0Palo_Alto

SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY

Apply local firewall rulesMSCT Windows 10 v1507 v1.0.0Windows

SYSTEM AND COMMUNICATIONS PROTECTION

Apply local firewall rulesMSCT Windows 10 1903 v1.19.9Windows

SYSTEM AND COMMUNICATIONS PROTECTION

Apply local firewall rulesMSCT Windows 10 1909 v1.0.0Windows

SYSTEM AND COMMUNICATIONS PROTECTION

Apply local firewall rules - Domain ProfileMSCT Windows Server 2012 R2 DC v1.0.0Windows

SYSTEM AND COMMUNICATIONS PROTECTION

Apply local firewall rules - Domain ProfileMSCT Windows Server 2012 R2 MS v1.0.0Windows

SYSTEM AND COMMUNICATIONS PROTECTION

Apply local firewall rules - Private ProfileMSCT Windows Server 2012 R2 MS v1.0.0Windows

SYSTEM AND COMMUNICATIONS PROTECTION

Apply local firewall rules - Public ProfileMSCT Windows Server 2012 R2 DC v1.0.0Windows

SYSTEM AND COMMUNICATIONS PROTECTION

Big Sur - Enable Firewall Stealth ModeNIST macOS Big Sur v1.4.0 - 800-53r5 HighUnix

CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

Big Sur - Enable Firewall Stealth ModeNIST macOS Big Sur v1.4.0 - 800-53r4 LowUnix

CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

Big Sur - Enable Firewall Stealth ModeNIST macOS Big Sur v1.4.0 - 800-171Unix

CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

Big Sur - Enable Firewall Stealth ModeNIST macOS Big Sur v1.4.0 - 800-53r5 ModerateUnix

CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

Catalina - Enable Firewall Stealth ModeNIST macOS Catalina v1.5.0 - All ProfilesUnix

CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

Catalina - Enable Firewall Stealth ModeNIST macOS Catalina v1.5.0 - 800-53r4 HighUnix

CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

Catalina - Enable Firewall Stealth ModeNIST macOS Catalina v1.5.0 - CNSSI 1253Unix

CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

Catalina - Enable Firewall Stealth ModeNIST macOS Catalina v1.5.0 - 800-53r4 LowUnix

CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

Catalina - Enable Firewall Stealth ModeNIST macOS Catalina v1.5.0 - 800-53r4 ModerateUnix

CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

Catalina - Enable Firewall Stealth ModeNIST macOS Catalina v1.5.0 - 800-53r5 ModerateUnix

CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

MSS: (DisableIPSourceRouting) IP source routing protection level (Protects against packet spoofing)MSCT Windows Server 2012 R2 MS v1.0.0Windows

SYSTEM AND COMMUNICATIONS PROTECTION

MSS: (DisableIPSourceRouting) IP source routing protection level (Protects against packet spoofing)MSCT Windows Server 2016 MS v1.0.0Windows

SYSTEM AND COMMUNICATIONS PROTECTION