Item Search

NameAudit NamePluginCategory
1.4.1 Ensure permissions on bootloader config are not overridden - chmodCIS Ubuntu Linux 16.04 LTS Workstation L1 v2.0.0Unix

ACCESS CONTROL

1.4.1 Ensure permissions on bootloader config are not overridden - if lineCIS Ubuntu Linux 16.04 LTS Workstation L1 v2.0.0Unix

ACCESS CONTROL

1.6.1.1 Ensure AppArmor is installedCIS Ubuntu Linux 18.04 LXD Container L1 v1.0.0Unix

ACCESS CONTROL

1.6.1.1 Ensure SELinux is enabled in the bootloader configuration - security=selinuxCIS Debian 9 Workstation L2 v1.0.1Unix

ACCESS CONTROL

1.6.1.2 Ensure the SELinux state is enforcing - /etc/selinux/configCIS Aliyun Linux 2 L2 v1.0.0Unix

ACCESS CONTROL

1.6.1.3 Ensure SELinux policy is configuredCIS Debian 9 Server L2 v1.0.1Unix

ACCESS CONTROL

1.6.1.3 Ensure SELinux policy is configuredCIS CentOS 6 Workstation L1 v3.0.0Unix

ACCESS CONTROL

1.6.1.3 Ensure SELinux policy is configured - /etc/selinux/configCIS Aliyun Linux 2 L2 v1.0.0Unix

ACCESS CONTROL

1.6.1.4 Ensure no unconfined daemons existCIS Debian 9 Server L2 v1.0.1Unix

ACCESS CONTROL

1.6.1.4 Ensure no unconfined daemons existCIS Debian 9 Workstation L2 v1.0.1Unix

ACCESS CONTROL

1.6.2.2 Ensure all AppArmor Profiles are enforcing - complain modeCIS Debian 9 Workstation L2 v1.0.1Unix

ACCESS CONTROL

1.6.2.2 Ensure all AppArmor Profiles are enforcing - profiles loadedCIS Debian 9 Workstation L2 v1.0.1Unix

ACCESS CONTROL

1.7.1.1 Ensure AppArmor is installedCIS Ubuntu Linux 18.04 LXD Host L1 Server v1.0.0Unix

ACCESS CONTROL

1.7.1.2 Ensure AppArmor is enabled in the bootloader configuration - apparmor=1CIS Debian Family Server L1 v1.0.0Unix

ACCESS CONTROL

1.7.1.3 Ensure all AppArmor Profiles are in enforce or complain mode - 0 processes are unconfinedCIS Debian Family Workstation L1 v1.0.0Unix

ACCESS CONTROL

1.7.1.3 Ensure all AppArmor Profiles are in enforce or complain mode - profiles loadedCIS Debian Family Server L1 v1.0.0Unix

ACCESS CONTROL

1.7.1.4 Ensure all AppArmor Profiles are enforcing - complain modeCIS Debian Family Workstation L2 v1.0.0Unix

ACCESS CONTROL

1.7.1.4 Ensure all AppArmor Profiles are enforcing - profiles loadedCIS Debian Family Server L2 v1.0.0Unix

ACCESS CONTROL

1.7.1.4 Ensure all AppArmor Profiles are enforcing - profiles loadedCIS Debian Family Workstation L2 v1.0.0Unix

ACCESS CONTROL

1.7.1.4 Ensure the SELinux mode is enforcing or permissive - /etc/selinux/configCIS Fedora 19 Family Linux Server L1 v1.0.0Unix

ACCESS CONTROL

1.7.1.4 Ensure the SELinux mode is enforcing or permissive - getenforceCIS Fedora 19 Family Linux Workstation L1 v1.0.0Unix

ACCESS CONTROL

1.7.1.5 Ensure the SELinux mode is enforcing - /etc/selinux/configCIS Fedora 19 Family Linux Workstation L2 v1.0.0Unix

ACCESS CONTROL

1.8.1.5 Ensure permissions on /etc/issue are configuredCIS Fedora 19 Family Linux Server L1 v1.0.0Unix

ACCESS CONTROL

4.4 Ensure logrotate assigns appropriate permissionsCIS Debian Family Workstation L1 v1.0.0Unix

ACCESS CONTROL

5.1 Use secure RealmsCIS Apache Tomcat 8 L2 v1.1.0Unix

ACCESS CONTROL

5.1.2 Ensure permissions on /etc/crontab are configuredCIS Fedora 19 Family Linux Server L1 v1.0.0Unix

ACCESS CONTROL

5.1.2 Ensure permissions on /etc/crontab are configuredCIS Fedora 19 Family Linux Workstation L1 v1.0.0Unix

ACCESS CONTROL

5.1.5 Ensure permissions on /etc/cron.weekly are configuredCIS Fedora 19 Family Linux Workstation L1 v1.0.0Unix

ACCESS CONTROL

5.1.6 Ensure permissions on /etc/cron.monthly are configuredCIS Fedora 19 Family Linux Workstation L1 v1.0.0Unix

ACCESS CONTROL

5.1.7 Ensure permissions on /etc/cron.d are configuredCIS Fedora 19 Family Linux Server L1 v1.0.0Unix

ACCESS CONTROL

5.1.7 Ensure permissions on /etc/cron.d are configuredCIS Fedora 19 Family Linux Workstation L1 v1.0.0Unix

ACCESS CONTROL

5.1.9 Ensure at is restricted to authorized users - '/etc/at.allow'CIS Ubuntu Linux 16.04 LTS Workstation L1 v2.0.0Unix

ACCESS CONTROL

5.1.9 Ensure at is restricted to authorized users - '/etc/at.deny'CIS Ubuntu Linux 16.04 LTS Workstation L1 v2.0.0Unix

ACCESS CONTROL

5.2.1 Ensure permissions on /etc/ssh/sshd_config are configuredCIS Fedora 19 Family Linux Server L1 v1.0.0Unix

ACCESS CONTROL

5.2.3 Ensure permissions on SSH public host key files are configuredCIS Fedora 19 Family Linux Workstation L1 v1.0.0Unix

ACCESS CONTROL

5.3.1 Ensure permissions on /etc/ssh/sshd_config are configuredCIS Ubuntu Linux 16.04 LTS Workstation L1 v2.0.0Unix

ACCESS CONTROL

5.3.2 Ensure permissions on SSH private host key files are configuredCIS CentOS 6 Server L1 v3.0.0Unix

ACCESS CONTROL

5.3.2 Ensure permissions on SSH private host key files are configuredCIS CentOS 6 Workstation L1 v3.0.0Unix

ACCESS CONTROL

6.1.1 Audit system file permissionsCIS Fedora 19 Family Linux Workstation L2 v1.0.0Unix

ACCESS CONTROL

6.1.1 Audit system file permissionsCIS Debian 9 Workstation L2 v1.0.1Unix

ACCESS CONTROL

6.1.1 Audit system file permissionsCIS Aliyun Linux 2 L2 v1.0.0Unix

ACCESS CONTROL

6.1.2 Ensure permissions on /etc/passwd are configuredCIS Fedora 19 Family Linux Server L1 v1.0.0Unix

ACCESS CONTROL

6.1.2 Ensure permissions on /etc/passwd are configuredCIS Fedora 19 Family Linux Workstation L1 v1.0.0Unix

ACCESS CONTROL

6.1.8 Ensure permissions on /etc/group- are configuredCIS Fedora 19 Family Linux Server L1 v1.0.0Unix

ACCESS CONTROL

6.1.8 Ensure permissions on /etc/group- are configuredCIS Fedora 19 Family Linux Workstation L1 v1.0.0Unix

ACCESS CONTROL

6.1.10 Ensure no world writable files existCIS Debian Family Server L1 v1.0.0Unix

ACCESS CONTROL

6.2.9 Ensure users own their home directoriesCIS Aliyun Linux 2 L1 v1.0.0Unix

ACCESS CONTROL

6.2.17 Ensure shadow group is emptyCIS Debian Family Server L1 v1.0.0Unix

ACCESS CONTROL

7.6 Ensure directory in logging.properties is a secure location - check application log directory is secureCIS Apache Tomcat 9 L1 v1.2.0 MiddlewareUnix

ACCESS CONTROL

10.3 Ensure the named_t Process Type is Not in Permissive ModeCIS BIND DNS v1.0.0 L2 Caching Only Name ServerUnix

ACCESS CONTROL