Item Search

NameAudit NamePluginCategory
2.11 Implement Connection Delays to Limit Failed Login Attempts - CONNECTION_CONTROLCIS MySQL 5.6 Community Database L1 v2.0.0MySQLDB

ACCESS CONTROL

2.11 Implement Connection Delays to Limit Failed Login Attempts - connection_control_failed_connections_thresholdCIS MySQL 5.6 Enterprise Database L1 v2.0.0MySQLDB

ACCESS CONTROL

2.11 Implement Connection Delays to Limit Failed Login Attempts - CONNECTION_CONTROL_FAILED_LOGIN_ATTEMPTSCIS MySQL 5.6 Community Database L1 v2.0.0MySQLDB

ACCESS CONTROL

2.12 Ensure that authorization for Docker client commands is enabledCIS Docker v1.6.0 L2 Docker LinuxUnix

ACCESS CONTROL

2.15 Implement Connection Delays to Limit Failed Login Attempts - CONNECTION_CONTROLCIS MySQL 5.7 Enterprise Database L1 v2.0.0MySQLDB

ACCESS CONTROL

2.15 Implement Connection Delays to Limit Failed Login Attempts - connection_control_failed_connections_thresholdCIS MySQL 5.7 Enterprise Database L1 v2.0.0MySQLDB

ACCESS CONTROL

2.15 Implement Connection Delays to Limit Failed Login Attempts - CONNECTION_CONTROL_FAILED_LOGIN_ATTEMPTSCIS MySQL 5.7 Enterprise Database L1 v2.0.0MySQLDB

ACCESS CONTROL

2.15 Implement Connection Delays to Limit Failed Login Attempts - connection_control_min_connection_delayCIS MySQL 5.7 Community Database L1 v2.0.0MySQLDB

ACCESS CONTROL

2.15 Implement Connection Delays to Limit Failed Login Attempts - connection_control_min_connection_delayCIS MySQL 5.7 Enterprise Database L1 v2.0.0MySQLDB

ACCESS CONTROL

2.18 Implement Connection Delays to Limit Failed Login AttemptsCIS MySQL 8.0 Community Database L1 v1.0.0MySQLDB

ACCESS CONTROL

3.2.1.26 Ensure 'Allow proximity based password sharing requests' is set to 'Disabled'MobileIron - CIS Apple iOS 14 and iPadOS 14 Institution Owned L1MDM

ACCESS CONTROL

4.5 Ensure the Exception Users list is properly configuredCIS VMware ESXi 6.5 v1.0.0 Level 1VMware

ACCESS CONTROL

4.6 Ensure the maximum failed login attempts is set to 3CIS VMware ESXi 6.5 v1.0.0 Level 1VMware

ACCESS CONTROL

5.1.8 Ensure cron is restricted to authorized users - cron.denyCIS Fedora 19 Family Linux Workstation L1 v1.0.0Unix

ACCESS CONTROL

5.1.8 Ensure cron is restricted to authorized users - cron.denyCIS Fedora 19 Family Linux Server L1 v1.0.0Unix

ACCESS CONTROL

5.1.9 Ensure at is restricted to authorized users - at.allowCIS Fedora 19 Family Linux Workstation L1 v1.0.0Unix

ACCESS CONTROL

5.1.9 Ensure at is restricted to authorized users - at.allowCIS Fedora 19 Family Linux Server L1 v1.0.0Unix

ACCESS CONTROL

5.1.9 Ensure at is restricted to authorized users - at.denyCIS Fedora 19 Family Linux Workstation L1 v1.0.0Unix

ACCESS CONTROL

5.3.3 Ensure password reuse is limitedCIS Debian Family Workstation L1 v1.0.0Unix

ACCESS CONTROL

5.3.3 Ensure password reuse is limitedCIS Debian 9 Server L1 v1.0.1Unix

ACCESS CONTROL

5.3.3 Ensure password reuse is limitedCIS Debian Family Server L1 v1.0.0Unix

ACCESS CONTROL

5.3.3 Ensure password reuse is limitedCIS Debian 9 Workstation L1 v1.0.1Unix

ACCESS CONTROL

5.4.2 Ensure system accounts are non-loginCIS Debian 9 Server L1 v1.0.1Unix

ACCESS CONTROL

5.4.2 Ensure system accounts are securedCIS Debian Family Server L1 v1.0.0Unix

ACCESS CONTROL

5.4.2 Ensure system accounts are secured - non loginCIS Fedora 19 Family Linux Workstation L1 v1.0.0Unix

ACCESS CONTROL

5.5.2 Ensure system accounts are securedCIS Ubuntu Linux 16.04 LTS Server L1 v2.0.0Unix

ACCESS CONTROL

5.5.2 Ensure system accounts are securedCIS Ubuntu Linux 16.04 LTS Workstation L1 v2.0.0Unix

ACCESS CONTROL

6.2.13 Ensure all groups in /etc/passwd exist in /etc/groupCIS Fedora 19 Family Linux Workstation L1 v1.0.0Unix

ACCESS CONTROL

6.2.14 Ensure no duplicate GIDs existCIS Debian Family Workstation L1 v1.0.0Unix

ACCESS CONTROL

6.2.14 Ensure no duplicate GIDs existCIS Ubuntu Linux 16.04 LTS Server L1 v2.0.0Unix

ACCESS CONTROL

6.2.14 Ensure no duplicate UIDs existCIS Fedora 19 Family Linux Workstation L1 v1.0.0Unix

ACCESS CONTROL

6.2.15 Ensure no duplicate user names existCIS Debian Family Workstation L1 v1.0.0Unix

ACCESS CONTROL

6.2.15 Ensure no duplicate user names existCIS Ubuntu Linux 16.04 LTS Workstation L1 v2.0.0Unix

ACCESS CONTROL

6.2.15 Ensure no duplicate user names existCIS Debian Family Server L1 v1.0.0Unix

ACCESS CONTROL

6.2.16 Ensure no duplicate UIDs existCIS SUSE Linux Enterprise Workstation 11 L1 v2.1.1Unix

ACCESS CONTROL

6.2.16 Ensure no duplicate user names existCIS Fedora 19 Family Linux Workstation L1 v1.0.0Unix

ACCESS CONTROL

6.2.17 Ensure no duplicate GIDs existCIS Debian 9 Server L1 v1.0.1Unix

ACCESS CONTROL

6.2.18 Ensure no duplicate user names existCIS Debian 9 Server L1 v1.0.1Unix

ACCESS CONTROL

6.2.18 Ensure no duplicate user names existCIS SUSE Linux Enterprise Workstation 11 L1 v2.1.1Unix

ACCESS CONTROL

6.2.19 Ensure no duplicate group names existCIS Debian 9 Server L1 v1.0.1Unix

ACCESS CONTROL

6.2.19 Ensure no duplicate group names existCIS SUSE Linux Enterprise Server 11 L1 v2.1.1Unix

ACCESS CONTROL

6.2.20 Ensure shadow group is emptyCIS Debian 9 Server L1 v1.0.1Unix

ACCESS CONTROL

6.3.1 Ensure external AAA is usedCIS Juniper OS Benchmark v2.1.0 L1Juniper

ACCESS CONTROL

6.6.1.1 Ensure Max 3 Failed Login AttemptsCIS Juniper OS Benchmark v2.1.0 L1Juniper

ACCESS CONTROL

6.6.1.3 Ensure Minimum Backoff Factor of 5CIS Juniper OS Benchmark v2.1.0 L1Juniper

ACCESS CONTROL

6.6.1.5 Ensure Lockout-period is set to at least 30 minutesCIS Juniper OS Benchmark v2.1.0 L1Juniper

ACCESS CONTROL

7.2 Disable System AccountsCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

ACCESS CONTROL

7.13 Apple Watch features with macOSCIS Apple macOS 10.13 L1 v1.1.0Unix

ACCESS CONTROL

7.13 Apple Watch features with macOSCIS Apple macOS 10.12 L1 v1.2.0Unix

ACCESS CONTROL

9.2.18 Check for Duplicate Group NamesCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

ACCESS CONTROL