Item Search

NameAudit NamePluginCategory
1.1.16 Ensure nosuid option set on /dev/shm partitionCIS SUSE Linux Enterprise Workstation 11 L1 v2.1.1Unix

ACCESS CONTROL, MEDIA PROTECTION

1.1.18 Ensure nodev option set on removable media partitionsCIS SUSE Linux Enterprise Workstation 11 L1 v2.1.1Unix

ACCESS CONTROL, MEDIA PROTECTION

3.1.1 Require Explicit Authorization for Cataloging (CATALOG_NOAUTH)CIS IBM DB2 11 v1.0.0 Windows OS Level 2Windows

ACCESS CONTROL, MEDIA PROTECTION

3.1.2 Secure Ppermissions for Default Database File Path (DFTDBPATH) - DFTDBPATH OS PermissionsCIS IBM DB2 11 v1.0.0 Windows OS Level 2Windows

ACCESS CONTROL, MEDIA PROTECTION

3.1.5 Secure Permissions for Alternate Diagnostic Log Path (ALT_DIAGPATH)CIS IBM DB2 11 v1.0.0 Windows OS Level 2Windows

ACCESS CONTROL, MEDIA PROTECTION

3.1.8 Set Maximum Connection Limits (MAX_CONNECTIONS and MAX_COORDAGENTS) - MAX_CONNECTIONSCIS IBM DB2 11 v1.0.0 Windows OS Level 2Windows

ACCESS CONTROL, MEDIA PROTECTION

3.1.10 Secure the Java Development Kit Installation Path (JDK_PATH)CIS IBM DB2 11 v1.0.0 Windows OS Level 2Windows

ACCESS CONTROL, MEDIA PROTECTION

3.1.11 Secure the Python Runtime Path (PYTHON_PATH)CIS IBM DB2 11 v1.0.0 Windows OS Level 2Windows

ACCESS CONTROL, MEDIA PROTECTION

3.1.12 Secure the R Runtime Path (R_PATH)CIS IBM DB2 11 v1.0.0 Windows OS Level 2Windows

ACCESS CONTROL, MEDIA PROTECTION

3.1.13 Secure the Communication Buffer Exit Library (COMM_EXIT_LIST)CIS IBM DB2 11 v1.0.0 Windows OS Level 2Windows

ACCESS CONTROL, MEDIA PROTECTION

3.2.4 Enable Extended Security (DB2_EXTSECURITY)CIS IBM DB2 11 v1.0.0 Windows OS Level 1Windows

ACCESS CONTROL, MEDIA PROTECTION

3.2.4 Enable Extended Security (DB2_EXTSECURITY)CIS IBM DB2 11 v1.0.0 Windows OS Level 2Windows

ACCESS CONTROL, MEDIA PROTECTION

3.2.5 Limit OS Privileges of Fenced Mode Process (DB2_LIMIT_FENCED_GROUP)CIS IBM DB2 11 v1.0.0 Windows OS Level 1Windows

ACCESS CONTROL, MEDIA PROTECTION

3.2.5 Limit OS Privileges of Fenced Mode Process (DB2_LIMIT_FENCED_GROUP)CIS IBM DB2 11 v1.0.0 Windows OS Level 2Windows

ACCESS CONTROL, MEDIA PROTECTION

3.3.1 Secure Db2 Runtime LibraryCIS IBM DB2 11 v1.0.0 Windows OS Level 2Windows

ACCESS CONTROL, MEDIA PROTECTION

3.4 Ensure that each role for each MongoDB database is needed and grants only the necessary privilegesCIS MongoDB 3.6 Database Audit L2 v1.1.0MongoDB

ACCESS CONTROL, MEDIA PROTECTION

3.5 Application Data with requirement for world writable directoriesCIS IBM AIX 7.2 L1 v1.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

4.1.6 Secure Permissions for the Secondary Archive Log Location (LOGARCHMETH2) - LOGARCHMETH2 OS PermissionsCIS IBM DB2 11 v1.0.0 Windows OS Level 1Windows

ACCESS CONTROL, MEDIA PROTECTION

4.1.6 Secure Permissions for the Secondary Archive Log Location (LOGARCHMETH2) - LOGARCHMETH2 SettingCIS IBM DB2 11 v1.0.0 Windows OS Level 1Windows

ACCESS CONTROL, MEDIA PROTECTION

4.1.7 Secure Permissions for the Tertiary Archive Log Location (FAILARCHPATH) - FAILARCHPATH SettingCIS IBM DB2 11 v1.0.0 Windows OS Level 1Windows

ACCESS CONTROL, MEDIA PROTECTION

4.1.8 Secure Permissions for the Log Mirror Location (MIRRORLOGPATH) - MIRRORLOGPATH OS PermissionsCIS IBM DB2 11 v1.0.0 Windows OS Level 1Windows

ACCESS CONTROL, MEDIA PROTECTION

4.1.14 Specify a Secure Location for External Tables (EXTBL_LOCATION)CIS IBM DB2 11 v1.0.0 Windows OS Level 1Windows

ACCESS CONTROL, MEDIA PROTECTION

5.1.8 Ensure cron is restricted to authorized users - /etc/cron.allowCIS Oracle Linux 7 Workstation L1 v3.1.1Unix

ACCESS CONTROL, MEDIA PROTECTION

5.1.8 Ensure cron is restricted to authorized users - /etc/cron.allowCIS CentOS 7 v3.1.2 Workstation L1Unix

ACCESS CONTROL, MEDIA PROTECTION

5.1.8 Ensure cron is restricted to authorized users - /etc/cron.allowCIS Red Hat EL7 Workstation L1 v3.1.1Unix

ACCESS CONTROL, MEDIA PROTECTION

5.1.8 Ensure cron is restricted to authorized users - /etc/cron.allowCIS CentOS 7 v3.1.2 Server L1Unix

ACCESS CONTROL, MEDIA PROTECTION

5.1.8 Ensure cron is restricted to authorized users - /etc/cron.denyCIS Oracle Linux 7 Server L1 v3.1.1Unix

ACCESS CONTROL, MEDIA PROTECTION

5.1.8 Ensure cron is restricted to authorized users - /etc/cron.denyCIS Red Hat EL7 Workstation L1 v3.1.1Unix

ACCESS CONTROL, MEDIA PROTECTION

5.1.8 Ensure cron is restricted to authorized users - /etc/cron.denyCIS CentOS 7 v3.1.2 Server L1Unix

ACCESS CONTROL, MEDIA PROTECTION

5.1.9 Ensure at is restricted to authorized users - /etc/at.allowCIS Oracle Linux 7 Server L1 v3.1.1Unix

ACCESS CONTROL, MEDIA PROTECTION

5.1.9 Ensure at is restricted to authorized users - /etc/at.allowCIS CentOS 7 v3.1.2 Workstation L1Unix

ACCESS CONTROL, MEDIA PROTECTION

5.1.9 Ensure at is restricted to authorized users - /etc/at.allowCIS CentOS 7 v3.1.2 Server L1Unix

ACCESS CONTROL, MEDIA PROTECTION

5.1.9 Ensure at is restricted to authorized users - /etc/at.denyCIS Red Hat EL7 Server L1 v3.1.1Unix

ACCESS CONTROL, MEDIA PROTECTION

5.1.9 Ensure at is restricted to authorized users - /etc/at.denyCIS Oracle Linux 7 Workstation L1 v3.1.1Unix

ACCESS CONTROL, MEDIA PROTECTION

5.1.9 Ensure at is restricted to authorized users - /etc/at.denyCIS CentOS 7 v3.1.2 Workstation L1Unix

ACCESS CONTROL, MEDIA PROTECTION

5.5.2 Ensure system accounts are secured - non-login shellCIS Red Hat EL7 Workstation L1 v3.1.1Unix

ACCESS CONTROL, MEDIA PROTECTION

5.5.2 Ensure system accounts are secured - non-login shellCIS CentOS 7 v3.1.2 Workstation L1Unix

ACCESS CONTROL, MEDIA PROTECTION

5.5.2 Ensure system accounts are secured - unlocked non-rootCIS CentOS 7 v3.1.2 Workstation L1Unix

ACCESS CONTROL, MEDIA PROTECTION

5.5.2 Ensure system accounts are secured - unlocked non-rootCIS CentOS 7 v3.1.2 Server L1Unix

ACCESS CONTROL, MEDIA PROTECTION

5.6 Ensure access to the su command is restricted - /etc/groupCIS SUSE Linux Enterprise Workstation 11 L1 v2.1.1Unix

ACCESS CONTROL, MEDIA PROTECTION

5.6 Ensure access to the su command is restricted - /etc/groupCIS SUSE Linux Enterprise Server 11 L1 v2.1.1Unix

ACCESS CONTROL, MEDIA PROTECTION

5.8 DB2_GRP_LOOKUP Registry Variable (Windows only)CIS IBM DB2 11 v1.0.0 Windows OS Level 1Windows

ACCESS CONTROL, MEDIA PROTECTION

6.1.1 Secure SYSADM AuthorityCIS IBM DB2 11 v1.0.0 Windows OS Level 1Windows

ACCESS CONTROL, MEDIA PROTECTION

6.1.2 Secure SYSCTRL AuthorityCIS IBM DB2 11 v1.0.0 Windows OS Level 1Windows

ACCESS CONTROL, MEDIA PROTECTION

6.2.3 Ensure all groups in /etc/passwd exist in /etc/groupCIS Red Hat EL7 Workstation L1 v3.1.1Unix

ACCESS CONTROL, MEDIA PROTECTION

6.2.3 Ensure all groups in /etc/passwd exist in /etc/groupCIS CentOS 7 v3.1.2 Server L1Unix

ACCESS CONTROL, MEDIA PROTECTION

6.2.3 Ensure all groups in /etc/passwd exist in /etc/groupCIS Oracle Linux 7 Server L1 v3.1.1Unix

ACCESS CONTROL, MEDIA PROTECTION

7.2.4 Ensure OneDrive content sharing is restrictedCIS Microsoft 365 Foundations E3 L2 v3.0.0microsoft_azure

ACCESS CONTROL, MEDIA PROTECTION

7.2.7 Ensure link sharing is restricted in SharePoint and OneDriveCIS Microsoft 365 Foundations E3 L1 v3.0.0microsoft_azure

ACCESS CONTROL, MEDIA PROTECTION

10.2 Allowlist Approved Servers Belonging to a MySQL InnoDB ClusterCIS MySQL 8.0 Enterprise Database L2 v1.3.0MySQLDB

ACCESS CONTROL, MEDIA PROTECTION