1.8 Ensure Computer Name Does Not Contain PII or Protected Organizational Information | CIS Apple macOS 10.15 Catalina v3.0.0 L2 | Unix | CONFIGURATION MANAGEMENT, PROGRAM MANAGEMENT |
1.8 Ensure Computer Name Does Not Contain PII or Protected Organizational Information | CIS Apple macOS 12.0 Monterey v3.0.0 L2 | Unix | CONFIGURATION MANAGEMENT, PROGRAM MANAGEMENT |
2.1 Collect system configuration regularly | CIS IBM AIX 7.2 L1 v1.1.0 | Unix | CONFIGURATION MANAGEMENT, PROGRAM MANAGEMENT |
2.3 Ensure authentication is enabled in the sharded cluster - authenticationMechanisms | CIS MongoDB 4 L1 OS Windows v1.0.0 | Windows | CONFIGURATION MANAGEMENT |
2.3 Ensure authentication is enabled in the sharded cluster - authenticationMechanisms | CIS MongoDB 6 L2 OS Windows v1.1.0 | Windows | CONFIGURATION MANAGEMENT |
2.3 Ensure authentication is enabled in the sharded cluster - CAFile | CIS MongoDB 5 L2 OS Windows v1.2.0 | Windows | CONFIGURATION MANAGEMENT |
2.3 Ensure authentication is enabled in the sharded cluster - CAFile | CIS MongoDB 6 L2 OS Windows v1.1.0 | Windows | CONFIGURATION MANAGEMENT |
2.3 Ensure authentication is enabled in the sharded cluster - clusterAuthMode | CIS MongoDB 4 L1 OS Windows v1.0.0 | Windows | CONFIGURATION MANAGEMENT |
2.3 Ensure authentication is enabled in the sharded cluster - clusterAuthMode | CIS MongoDB 4 L1 OS Linux v1.0.0 | Unix | CONFIGURATION MANAGEMENT |
2.3 Ensure authentication is enabled in the sharded cluster - clusterAuthMode | CIS MongoDB 6 L2 OS Windows v1.1.0 | Windows | CONFIGURATION MANAGEMENT |
2.3 Ensure authentication is enabled in the sharded cluster - clusterAuthMode | CIS MongoDB 6 L2 OS Linux v1.1.0 | Unix | CONFIGURATION MANAGEMENT |
2.3 Ensure authentication is enabled in the sharded cluster - clusterAuthMode | CIS MongoDB 5 L2 OS Linux v1.2.0 | Unix | CONFIGURATION MANAGEMENT |
2.3 Ensure authentication is enabled in the sharded cluster - clusterFile | CIS MongoDB 4 L1 OS Windows v1.0.0 | Windows | CONFIGURATION MANAGEMENT |
2.3 Ensure authentication is enabled in the sharded cluster - clusterFile | CIS MongoDB 4 L1 OS Linux v1.0.0 | Unix | CONFIGURATION MANAGEMENT |
2.3 Ensure authentication is enabled in the sharded cluster - clusterFile | CIS MongoDB 5 L2 OS Windows v1.2.0 | Windows | CONFIGURATION MANAGEMENT |
2.3 Ensure authentication is enabled in the sharded cluster - clusterFile | CIS MongoDB 6 L2 OS Windows v1.1.0 | Windows | CONFIGURATION MANAGEMENT |
2.3 Ensure authentication is enabled in the sharded cluster - PEMKeyFile | CIS MongoDB 4 L1 OS Windows v1.0.0 | Windows | CONFIGURATION MANAGEMENT |
2.3 Ensure authentication is enabled in the sharded cluster - PEMKeyFile | CIS MongoDB 4 L1 OS Linux v1.0.0 | Unix | CONFIGURATION MANAGEMENT |
2.3 Ensure authentication is enabled in the sharded cluster - PEMKeyFile | CIS MongoDB 6 L2 OS Linux v1.1.0 | Unix | CONFIGURATION MANAGEMENT |
2.3.3.12 Ensure Computer Name Does Not Contain PII or Protected Organizational Information | CIS Apple macOS 14.0 Sonoma v1.0.0 L2 | Unix | CONFIGURATION MANAGEMENT, PROGRAM MANAGEMENT |
2.5.6 Enable Location Services | CIS Apple macOS 10.13 L2 v1.1.0 | Unix | CONFIGURATION MANAGEMENT |
2.6.6 Enable Location Services | CIS Apple OSX 10.9 L2 v1.3.0 | Unix | CONFIGURATION MANAGEMENT |
2.6.7 Monitor Location Services Access | CIS Apple macOS 10.12 L2 v1.2.0 | Unix | CONFIGURATION MANAGEMENT |
2.6.7 Monitor Location Services Access | CIS Apple OSX 10.9 L2 v1.3.0 | Unix | CONFIGURATION MANAGEMENT |
2.6.7 Monitor Location Services Access | CIS Apple OSX 10.11 El Capitan L2 v1.1.0 | Unix | CONFIGURATION MANAGEMENT |
2.6.7 Monitor Location Services Access | CIS Apple OSX 10.10 Yosemite L2 v1.2.0 | Unix | CONFIGURATION MANAGEMENT |
3.10 Ensure inbound firewall filter is set for Loopback interface | CIS Juniper OS Benchmark v2.1.0 L2 | Juniper | CONFIGURATION MANAGEMENT |
7.1 Extensible Firmware Interface (EFI) password | CIS Apple macOS 10.14 v2.0.0 L2 | Unix | CONFIGURATION MANAGEMENT |
7.4 Software Inventory Considerations | CIS Apple macOS 10.13 L2 v1.1.0 | Unix | CONFIGURATION MANAGEMENT |
7.7 App Store Automatically download apps purchased on other Macs Considerations | CIS Apple macOS 10.12 L2 v1.2.0 | Unix | CONFIGURATION MANAGEMENT |
8.3.2 Ensure use of the VM console is limited | CIS VMware ESXi 6.5 v1.0.0 Level 1 | VMware | CONFIGURATION MANAGEMENT |
CIS Control 1 (1.4) Maintain Detailed Asset Inventory | CAS Implementation Group 1 Audit File | Unix | CONFIGURATION MANAGEMENT |
Enumeration policy for external devices incompatible with Kernel DMA Protection | MSCT Windows Server v2004 MS v1.0.0 | Windows | CONFIGURATION MANAGEMENT |
Enumeration policy for external devices incompatible with Kernel DMA Protection | MSCT Windows Server 1903 MS v1.19.9 | Windows | CONFIGURATION MANAGEMENT |
Enumeration policy for external devices incompatible with Kernel DMA Protection | MSCT Windows Server v1909 DC v1.0.0 | Windows | CONFIGURATION MANAGEMENT |
Enumeration policy for external devices incompatible with Kernel DMA Protection | MSCT MSCT Windows Server 2022 DC v1.0.0 | Windows | CONFIGURATION MANAGEMENT |
Enumeration policy for external devices incompatible with Kernel DMA Protection | MSCT Windows Server 2022 v1.0.0 | Windows | CONFIGURATION MANAGEMENT |
Enumeration policy for external devices incompatible with Kernel DMA Protection | MSCT Windows Server v1909 MS v1.0.0 | Windows | CONFIGURATION MANAGEMENT |
Enumeration policy for external devices incompatible with Kernel DMA Protection | MSCT Windows Server 2019 MS v1.0.0 | Windows | CONFIGURATION MANAGEMENT |
Enumeration policy for external devices incompatible with Kernel DMA Protection | MSCT Windows Server v20H2 MS v1.0.0 | Windows | CONFIGURATION MANAGEMENT |
Enumeration policy for external devices incompatible with Kernel DMA Protection | MSCT Windows 10 1809 v1.0.0 | Windows | CONFIGURATION MANAGEMENT |
Enumeration policy for external devices incompatible with Kernel DMA Protection | MSCT Windows 10 1903 v1.19.9 | Windows | CONFIGURATION MANAGEMENT |
Enumeration policy for external devices incompatible with Kernel DMA Protection | MSCT Windows 10 v21H2 v1.0.0 | Windows | CONFIGURATION MANAGEMENT |
Enumeration policy for external devices incompatible with Kernel DMA Protection | MSCT Windows 10 v22H2 v1.0.0 | Windows | CONFIGURATION MANAGEMENT |
Enumeration policy for external devices incompatible with Kernel DMA Protection | MSCT Windows 11 v23H2 v1.0.0 | Windows | CONFIGURATION MANAGEMENT |
Rackspace Networks and their attached subnets | Tenable Best Practices RackSpace v2.0.0 | Rackspace | CONFIGURATION MANAGEMENT |
Rackspace Server Images | Tenable Best Practices RackSpace v2.0.0 | Rackspace | CONFIGURATION MANAGEMENT |
Rackspace Subnet Details | Tenable Best Practices RackSpace v2.0.0 | Rackspace | CONFIGURATION MANAGEMENT |
Review the list of Databases Deployed In Rackspace | Tenable Best Practices RackSpace v2.0.0 | Rackspace | CONFIGURATION MANAGEMENT |
Review the list of Ports and their details | Tenable Best Practices RackSpace v2.0.0 | Rackspace | CONFIGURATION MANAGEMENT |