Item Search

NameAudit NamePluginCategory
1.1.2 Install and configure HP-UX Secure Shell 'IgnoreRhosts=yes'CIS HP-UX 11i v1.5Unix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

1.1.2 Install and configure HP-UX Secure Shell 'RhostsAuthentication=no'CIS HP-UX 11i v1.5Unix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

1.1.2 Install and configure HP-UX Secure Shell 'RhostsRSAAuthentication=no'CIS HP-UX 11i v1.5Unix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

1.2 Ensure 'Screen Lock' is set to EnabledAirWatch - CIS Google Android v1.2.0 L1MDM

ACCESS CONTROL

1.2 Ensure 'Screen Lock' is set to EnabledMobileIron - CIS Google Android v1.2.0 L1MDM

ACCESS CONTROL

1.4.2.2 Disable automatic loginCIS Apple OSX 10.6 Snow Leopard L1 v1.0.0Unix

ACCESS CONTROL

1.4.13.2 Disable automatic loginCIS Apple OSX 10.6 Snow Leopard L1 v1.0.0Unix

ACCESS CONTROL

1.4.14.8 Secure Remote Login 'HostbasedAuthentication'CIS Apple OSX 10.6 Snow Leopard L2 v1.0.0Unix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

1.4.14.8 Secure Remote Login 'IgnoreRhosts'CIS Apple OSX 10.6 Snow Leopard L2 v1.0.0Unix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

1.470 - The system must not allow a non-certificate trusted host SSH logon to the system.Tenable Fedora Linux Best Practices v2.0.0Unix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

2.4.2.2 Disable Automatic Login & 2.4.13.2 Disable Automatic LoginCIS Apple OSX 10.5 Leopard L1 v1.0.0Unix

ACCESS CONTROL

5.2.6 Ensure SSH IgnoreRhosts is enabledCIS Amazon Linux v2.0.0 L1Unix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

5.2.6 Ensure SSH IgnoreRhosts is enabledCIS SUSE Linux Enterprise Server 11 L1 v2.0.0Unix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

5.2.6 Ensure SSH IgnoreRhosts is enabledCIS Ubuntu Linux 14.04 LTS Server L1 v2.0.0Unix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

5.2.6 Ensure SSH IgnoreRhosts is enabledCIS SUSE Linux Enterprise Workstation 11 L1 v2.0.0Unix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

5.2.6 Ensure SSH IgnoreRhosts is enabledCIS SUSE Linux Enterprise Workstation 12 L1 v2.1.0Unix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

5.2.6 Ensure SSH IgnoreRhosts is enabledCIS Ubuntu Linux 14.04 LTS Workstation L1 v2.0.0Unix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

5.2.6 Ensure SSH IgnoreRhosts is enabledCIS Red Hat 6 Server L1 v2.1.0Unix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

5.2.6 Ensure SSH IgnoreRhosts is enabledCIS Oracle Linux 6 Server L1 v1.1.0Unix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

5.2.7 Ensure SSH HostbasedAuthentication is disabledCIS Ubuntu Linux 14.04 LTS Server L1 v2.0.0Unix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

5.2.7 Ensure SSH HostbasedAuthentication is disabledCIS Amazon Linux v2.0.0 L1Unix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

5.2.7 Ensure SSH HostbasedAuthentication is disabledCIS Ubuntu Linux 14.04 LTS Workstation L1 v2.0.0Unix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

5.2.7 Ensure SSH HostbasedAuthentication is disabledCIS SUSE Linux Enterprise Server 11 L1 v2.0.0Unix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

5.2.7 Ensure SSH HostbasedAuthentication is disabledCIS SUSE Linux Enterprise Workstation 12 L1 v2.1.0Unix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

5.2.7 Ensure SSH HostbasedAuthentication is disabledCIS SUSE Linux Enterprise Workstation 11 L1 v2.0.0Unix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

5.2.7 Ensure SSH HostbasedAuthentication is disabledCIS Distribution Independent Linux Server L1 v1.1.0Unix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

5.2.8 Ensure SSH IgnoreRhosts is enabledCIS Debian 9 Server L1 v1.0.0Unix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

5.5 Disable automatic loginCIS Apple OSX 10.9 Mavericks L1 v1.0.0Unix

ACCESS CONTROL

5.8 Disable automatic loginCIS Apple OSX 10.11 El Capitan L1 v1.0.0Unix

ACCESS CONTROL

5.8 Disable automatic loginCIS Apple OSX 10.10 Yosemite L1 v1.1.0Unix

ACCESS CONTROL

5.8 Disable automatic loginCIS Apple macOS 10.14 v1.3.0 L1Unix

ACCESS CONTROL

5.8 Disable automatic loginCIS Apple macOS 10.15 v1.3.0 L1Unix

ACCESS CONTROL

5.8 Disable automatic loginCIS Apple macOS 11 v1.1.0 L1Unix

ACCESS CONTROL

5.9 Disable automatic loginCIS Apple macOS 10.12 L1 v1.1.0Unix

ACCESS CONTROL

5.12 Disable automatic loginCIS Apple macOS 10.13 L1 v1.0.0Unix

ACCESS CONTROL

6.1.6 Set SSH IgnoreRhosts to yes - Check if IgnoreRhosts is set to yes and not commented for the server.CIS Solaris 10 v5.2Unix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

6.1.7 Set SSH RhostsAuthentication to no - Check if RhostsAuthentication is set to no and not commented for the server.CIS Solaris 10 v5.2Unix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

6.1.8 Set SSH RhostsRSAAuthentication to no - Check if RhostsRSAAuthentication is set to no and not commented for the server.CIS Solaris 10 v5.2Unix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

6.4 Disable .rhosts Support in /etc/pam.confCIS Solaris 10 v5.2Unix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

8.4.5 Ensure Autologon is disabledCIS VMware ESXi 6.7 v1.1.0 Level 2VMware

ACCESS CONTROL

AirWatch - Android - Require Passcode = TrueAirWatch - TNS MDM Best Practices Audit v1.1.0MDM

ACCESS CONTROL

AirWatch - iOS - Require passcodeAirWatch - TNS MDM Best Practices Audit v1.1.0MDM

ACCESS CONTROL

MobileIron - Android/Windows Phone/iOS - Require Passcode = TrueMobileIron - TNS MDM Best Practices Audit v1.1.0MDM

ACCESS CONTROL

PCI 2.2.4 Configure system security parameters to prevent misuse - Configure SSH (/etc/ssh/sshd_config RhostsAuthentication)PCI DSS 2.0/3.0 - Solaris 10Unix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

PCI 2.2.4 Configure system security parameters to prevent misuse - Configure SSH (/etc/ssh/sshd_config RhostsRSAAuthentication)PCI DSS 2.0/3.0 - Solaris 10Unix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

PCI 2.2.4 Configure system security parameters to prevent misuse - Configure SSH (etc/ssh/sshd_config IgnoreRhosts)PCI DSS 2.0/3.0 - Solaris 10Unix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

PCI 2.2.4 Verify common security parameter settings - Remove .rhosts Support In PAM Configuration Files.PCI DSS 2.0/3.0 - Red Hat LinuxUnix

ACCESS CONTROL

PCI 4.1 - Verify that the protocol is implemented to use only secure configurations - '/etc/ssh/sshd_config HostbasedAuthentication = no'PCI DSS 2.0/3.0 - AIXUnix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

PCI 4.1 - Verify that the protocol is implemented to use only secure configurations - '/etc/ssh/sshd_config IgnoreRhosts = yes'PCI DSS 2.0/3.0 - AIXUnix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

VM: disable-unexposed-features-autologonTNS VMWare vSphere Best PracticesVMware

ACCESS CONTROL