Item Search

NameAudit NamePluginCategory
2.1.5 Disaster Recovery (DR) PlanCIS Oracle MySQL Community Server 8.4 v1.1.0 L1 MySQL RDBMS on Linux UnixUnix

CONTINGENCY PLANNING

2.1.5 Disaster Recovery (DR) PlanCIS Oracle MySQL Community Server 8.0 v1.2.0 L1 MySQL RDBMS on Linux UnixUnix

CONTINGENCY PLANNING

2.1.5 Disaster Recovery (DR) PlanCIS Oracle MySQL Community Server 8.0 v1.2.0 L1 MySQL RDBMS UnixUnix

CONTINGENCY PLANNING

2.1.5 Disaster Recovery (DR) PlanCIS Oracle MySQL Community Server 8.4 v1.1.0 L1 MySQL RDBMS UnixUnix

CONTINGENCY PLANNING

2.1.6 Disaster Recovery (DR) PlanCIS MariaDB 10.11 v1.0.0 L1 MariaDB RDBMS UnixUnix

CONTINGENCY PLANNING

2.1.6 Disaster Recovery (DR) PlanCIS MySQL 5.6 Community Linux OS L1 v2.0.0Unix

CONTINGENCY PLANNING

2.1.6 Disaster Recovery (DR) PlanCIS Oracle MySQL Enterprise Edition 8.4 v1.1.0 L1 MySQL RDBMS UnixUnix

CONTINGENCY PLANNING

2.1.6 Disaster Recovery (DR) PlanCIS MySQL 5.6 Community Windows OS L1 v2.0.0Windows

CONTINGENCY PLANNING

2.1.6 Disaster Recovery (DR) PlanCIS Oracle MySQL Enterprise Edition 8.4 v1.1.0 L1 MySQL RDBMS on Linux UnixUnix

CONTINGENCY PLANNING

2.1.6 Disaster Recovery (DR) PlanCIS MySQL 5.7 Community Windows OS L1 v2.0.0Windows

CONTINGENCY PLANNING

2.1.6 Disaster Recovery (DR) PlanCIS MySQL 5.7 Enterprise Linux OS L1 v2.0.0Unix

CONTINGENCY PLANNING

2.1.6 Disaster Recovery (DR) PlanCIS MySQL 5.7 Enterprise Windows OS L1 v2.0.0Windows

CONTINGENCY PLANNING

2.1.6 Disaster Recovery (DR) PlanCIS MySQL 5.6 Community Database L1 v2.0.0MySQLDB

CONTINGENCY PLANNING

2.1.6 Disaster Recovery (DR) PlanCIS MySQL 5.7 Community Linux OS L1 v2.0.0Unix

CONTINGENCY PLANNING

2.1.6 Disaster Recovery (DR) PlanCIS Oracle MySQL Enterprise Edition 8.0 v1.5.0 L1 MySQL RDBMS UnixUnix

CONTINGENCY PLANNING

2.1.6 Disaster Recovery (DR) PlanCIS Oracle MySQL Enterprise Edition 8.0 v1.5.0 L1 MySQL RDBMS on Linux UnixUnix

CONTINGENCY PLANNING

2.1.6 Disaster Recovery (DR) PlanCIS MariaDB 10.6 Database L1 v1.1.0MySQLDB

CONTINGENCY PLANNING

2.1.6 Disaster recovery planCIS MySQL 5.6 Enterprise Database L1 v2.0.0MySQLDB

CONTINGENCY PLANNING

2.1.6 Disaster recovery planCIS MySQL 5.6 Enterprise Windows OS L1 v2.0.0Windows

CONTINGENCY PLANNING

2.1.6 Disaster recovery planCIS MySQL 5.6 Enterprise Linux OS L1 v2.0.0Unix

CONTINGENCY PLANNING

4.3 Ensure that the DATA_RETENTION_TIME_IN_DAYS parameter is set to 90 for critical dataCIS Snowflake Foundations v1.0.0 L2Snowflake

CONTINGENCY PLANNING

8.3.5 Ensure 'Purge protection' is set to 'Enabled'CIS Microsoft Azure Foundations v5.0.0 L1microsoft_azure

CONTINGENCY PLANNING

9.1.1 Ensure soft delete for Azure File Shares is EnabledCIS Microsoft Azure Foundations v5.0.0 L1microsoft_azure

CONTINGENCY PLANNING

9.2.1 Ensure that soft delete for blobs on Azure Blob Storage storage accounts is EnabledCIS Microsoft Azure Foundations v5.0.0 L1microsoft_azure

CONTINGENCY PLANNING

9.2.2 Ensure that soft delete for containers on Azure Blob Storage storage accounts is EnabledCIS Microsoft Azure Foundations v5.0.0 L1microsoft_azure

CONTINGENCY PLANNING

9.2.3 Ensure 'Versioning' is set to 'Enabled' on Azure Blob Storage storage accountsCIS Microsoft Azure Foundations v5.0.0 L2microsoft_azure

CONTINGENCY PLANNING

9.3.11 Ensure Redundancy is set to 'geo-redundant storage (GRS)' on critical Azure Storage AccountsCIS Microsoft Azure Foundations v5.0.0 L2microsoft_azure

CONTINGENCY PLANNING

MS.DEFENDER.4.5v1 - A list of apps that are restricted from accessing files protected by DLP policy SHOULD be defined.CISA SCuBA Microsoft 365 Defender v1.5.0microsoft_azure

ACCESS CONTROL, SECURITY ASSESSMENT AND AUTHORIZATION, CONFIGURATION MANAGEMENT, CONTINGENCY PLANNING, IDENTIFICATION AND AUTHENTICATION, RISK ASSESSMENT, SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY

MS.DEFENDER.4.6v1 - The custom policy SHOULD include an action to block access to sensitiveCISA SCuBA Microsoft 365 Defender v1.5.0microsoft_azure

ACCESS CONTROL, SECURITY ASSESSMENT AND AUTHORIZATION, CONFIGURATION MANAGEMENT, CONTINGENCY PLANNING, IDENTIFICATION AND AUTHENTICATION, RISK ASSESSMENT, SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY