1.1 Ensure packages are obtained from authorized repositories | CIS PostgreSQL 11 OS v1.0.0 | Unix | CONFIGURATION MANAGEMENT |
1.1 Ensure packages are obtained from authorized repositories | CIS PostgreSQL 15 OS v1.0.0 | Unix | CONFIGURATION MANAGEMENT, MAINTENANCE |
1.1 Ensure packages are obtained from authorized repositories | CIS PostgreSQL 13 OS v1.1.0 | Unix | CONFIGURATION MANAGEMENT, MAINTENANCE |
1.1 Ensure packages are obtained from authorized repositories | CIS PostgreSQL 14 OS v1.1.0 | Unix | CONFIGURATION MANAGEMENT, MAINTENANCE |
1.1 Ensure packages are obtained from authorized repositories | CIS PostgreSQL 12 OS v1.1.0 | Unix | CONFIGURATION MANAGEMENT, MAINTENANCE |
1.2 Ensure Installation of Binary Packages | CIS PostgreSQL 11 OS v1.0.0 | Unix | CONFIGURATION MANAGEMENT |
1.3 Ensure Apache Is Installed From the Appropriate Binaries | CIS Apache HTTP Server 2.4 L1 v2.1.0 | Unix | CONFIGURATION MANAGEMENT |
1.3 Ensure Apache Is Installed From the Appropriate Binaries | CIS Apache HTTP Server 2.4 L1 v2.1.0 Middleware | Unix | CONFIGURATION MANAGEMENT |
1.3 Ensure Apache Is Installed From the Appropriate Binaries | CIS Apache HTTP Server 2.2 L1 v3.6.0 Middleware | Unix | CONFIGURATION MANAGEMENT |
1.3 Ensure Apache Is Installed From the Appropriate Binaries | CIS Apache HTTP Server 2.2 L1 v3.6.0 | Unix | CONFIGURATION MANAGEMENT |
1.3 Ensure Apache Is Installed From the Appropriate Binaries | CIS Apache HTTP Server 2.2 L2 v3.6.0 | Unix | CONFIGURATION MANAGEMENT |
1.5 Installing ISC BIND 9 - bind9 installation | CIS BIND DNS v1.0.0 L1 Caching Only Name Server | Unix | CONFIGURATION MANAGEMENT |
1.5 Installing ISC BIND 9 - bind9 installation | CIS BIND DNS v1.0.0 L1 Authoritative Name Server | Unix | CONFIGURATION MANAGEMENT |
1.5 Installing ISC BIND 9 - named location | CIS BIND DNS v1.0.0 L1 Caching Only Name Server | Unix | CONFIGURATION MANAGEMENT |
1.5 Installing ISC BIND 9 - named location | CIS BIND DNS v1.0.0 L1 Authoritative Name Server | Unix | CONFIGURATION MANAGEMENT |
2.2 Scan for TROJAN aka Untrusted/Unauthorized Applications (Implement Allowlist) | CIS IBM AIX 7.2 L1 v1.0.0 | Unix | CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY |
3.7 Audit Software Inventory | CIS Apple macOS 10.15 Catalina v3.0.0 L2 | Unix | CONFIGURATION MANAGEMENT, MAINTENANCE |
3.7 Audit Software Inventory | CIS Apple macOS 13.0 Ventura v1.0.0 L2 | Unix | CONFIGURATION MANAGEMENT, MAINTENANCE |
3.7 Audit Software Inventory | CIS Apple macOS 10.15 v2.1.0 L2 | Unix | CONFIGURATION MANAGEMENT, MAINTENANCE |
3.7 Audit Software Inventory | CIS Apple macOS 12.0 Monterey v2.0.0 L2 | Unix | CONFIGURATION MANAGEMENT, MAINTENANCE |
3.7 Audit Software Inventory | CIS Apple macOS 11.0 Big Sur v3.0.0 L2 | Unix | CONFIGURATION MANAGEMENT, MAINTENANCE |
3.7 Audit Software Inventory | CIS Apple macOS 10.14 v2.0.0 L2 | Unix | CONFIGURATION MANAGEMENT, MAINTENANCE |
7.4 Ensure that Only Approved Extensions Are Installed | CIS Microsoft Azure Foundations v1.5.0 L1 | microsoft_azure | CONFIGURATION MANAGEMENT, MAINTENANCE |
CIS Control 2 (2.1(a)) Maintain and Inventory of Authorized Software | CAS Implementation Group 1 Audit File | Unix | CONFIGURATION MANAGEMENT |
CIS Control 2 (2.1(b)) Maintain and Inventory of Authorized Software | CAS Implementation Group 1 Audit File | Unix | CONFIGURATION MANAGEMENT |