Item Search

NameAudit NamePluginCategory
1.5 Ensure 'unique application pools' is set for sitesCIS IIS 8.0 v1.5.1 Level 1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

1.5 Ensure 'unique application pools' is set for sitesCIS IIS 7 L1 v1.8.0Windows

SYSTEM AND COMMUNICATIONS PROTECTION

1.5.1 Ensure XD/NX support is enabledCIS Ubuntu Linux 16.04 LTS Workstation L1 v2.0.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY

1.5.2 Ensure address space layout randomization (ASLR) is enabled - configCIS Ubuntu Linux 16.04 LTS Server L1 v2.0.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY

1.5.2 Ensure XD/NX support is enabledCIS Oracle Linux 6 Server L1 v2.0.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY

1.6.1 Ensure XD/NX support is enabledCIS Debian Family Server L1 v1.0.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY

1.6.3 Ensure address space layout randomization (ASLR) is enabled - sysctlCIS Fedora 19 Family Linux Workstation L1 v1.0.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY

2.9 Ensure the default cgroup usage has been confirmedCIS Docker Community Edition v1.1.0 L2 DockerUnix

SYSTEM AND COMMUNICATIONS PROTECTION

2.16 Ensure daemon-wide custom seccomp profile is applied, if neededCIS Docker Community Edition v1.1.0 L2 DockerUnix

SYSTEM AND COMMUNICATIONS PROTECTION

5.9 Ensure the host's network namespace is not sharedCIS Docker Community Edition v1.1.0 L1 DockerUnix

SYSTEM AND COMMUNICATIONS PROTECTION

5.15 Ensure the host's process namespace is not sharedCIS Docker Community Edition v1.1.0 L1 DockerUnix

SYSTEM AND COMMUNICATIONS PROTECTION

5.16 Ensure the host's IPC namespace is not sharedCIS Docker Community Edition v1.1.0 L1 DockerUnix

SYSTEM AND COMMUNICATIONS PROTECTION

5.20 Ensure the host's UTS namespace is not sharedCIS Docker Community Edition v1.1.0 L1 DockerUnix

SYSTEM AND COMMUNICATIONS PROTECTION

5.21 Ensure the default seccomp profile is not DisabledCIS Docker Community Edition v1.1.0 L1 DockerUnix

SYSTEM AND COMMUNICATIONS PROTECTION

5.24 Ensure cgroup usage is confirmedCIS Docker Community Edition v1.1.0 L1 DockerUnix

SYSTEM AND COMMUNICATIONS PROTECTION

5.25 Ensure the container is restricted from acquiring additional privilegesCIS Docker Community Edition v1.1.0 L1 DockerUnix

SYSTEM AND COMMUNICATIONS PROTECTION

8.4.2 Ensure VMsafe Agent Address is configured correctlyCIS VMware ESXi 6.5 v1.0.0 Level 1VMware

SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY

18.9.24.1 Ensure 'EMET 5.52' or higher is installedCIS Microsoft Windows 8.1 v2.4.1 L1Windows

SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY

18.9.24.1 Ensure 'EMET 5.52' or higher is installedCIS Windows 7 Workstation Level 1 + Bitlocker v3.2.0Windows

SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY

18.9.31.1 Ensure 'Turn off heap termination on corruption' is set to 'Disabled'CIS Microsoft Windows Server 2008 Member Server Level 1 v3.3.1Windows

SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY

18.9.31.1 Ensure 'Turn off heap termination on corruption' is set to 'Disabled'CIS Microsoft Windows Server 2008 Domain Controller Level 1 v3.3.0Windows

SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY

18.9.31.1 Ensure 'Turn off heap termination on corruption' is set to 'Disabled'CIS Microsoft Windows Server 2008 Domain Controller Level 1 v3.3.1Windows

SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY

18.9.31.2 Ensure 'Turn off shell protocol protected mode' is set to 'Disabled'CIS Microsoft Windows Server 2008 Domain Controller Level 1 v3.3.0Windows

SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY

18.9.31.3 Ensure 'Turn off heap termination on corruption' is set to 'Disabled'CIS Azure Compute Microsoft Windows Server 2022 v1.0.0 L1 DCWindows

SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY

18.9.31.3 Ensure 'Turn off heap termination on corruption' is set to 'Disabled'CIS Azure Compute Microsoft Windows Server 2022 v1.0.0 L1 MSWindows

SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY

18.9.31.4 Ensure 'Turn off shell protocol protected mode' is set to 'Disabled'CIS Azure Compute Microsoft Windows Server 2022 v1.0.0 L1 MSWindows

SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY

18.10.29.3 Ensure 'Turn off heap termination on corruption' is set to 'Disabled'CIS Windows Server 2012 R2 DC L1 v3.0.0Windows

SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY

18.10.29.3 Ensure 'Turn off heap termination on corruption' is set to 'Disabled' - DisabledCIS Microsoft Windows Server 2019 DC L1 v2.0.0Windows

SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY

18.10.29.3 Ensure 'Turn off heap termination on corruption' is set to 'Disabled' - DisabledCIS Microsoft Windows Server 2019 MS L1 v2.0.0Windows

SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY

18.10.29.4 Ensure 'Turn off shell protocol protected mode' is set to 'Disabled'CIS Windows Server 2012 DC L1 v3.0.0Windows

SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY

18.10.29.4 Ensure 'Turn off shell protocol protected mode' is set to 'Disabled' - DisabledCIS Microsoft Windows Server 2019 MS L1 v2.0.0Windows

SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY

18.10.29.4 Ensure 'Turn off shell protocol protected mode' is set to 'Disabled' - DisabledCIS Microsoft Windows Server 2019 MS Standalone L1 v1.0.0Windows

SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY

18.10.93.2.1 Ensure 'Prevent users from modifying settings' is set to 'Enabled'CIS Microsoft Intune for Windows 10 v2.0.0 L1 + BL + NGWindows

SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY

18.10.93.2.1 Ensure 'Prevent users from modifying settings' is set to 'Enabled'CIS Microsoft Intune for Windows 10 v2.0.0 L1Windows

SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY

18.10.93.2.1 Ensure 'Prevent users from modifying settings' is set to 'Enabled'CIS Microsoft Intune for Windows 11 v2.0.0 L1 + NGWindows

SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY

18.10.93.2.1 Ensure 'Prevent users from modifying settings' is set to 'Enabled'CIS Microsoft Intune for Windows 11 v2.0.0 L1 + BL + NGWindows

SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY

18.10.93.2.1 Ensure 'Prevent users from modifying settings' is set to 'Enabled'CIS Microsoft Intune for Windows 10 v2.0.0 L1 + NGWindows

SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY

Big Sur - Ensure Seperate Execution Domain for ProcessesNIST macOS Big Sur v1.4.0 - 800-53r5 HighUnix

SYSTEM AND COMMUNICATIONS PROTECTION

Big Sur - Ensure Seperate Execution Domain for ProcessesNIST macOS Big Sur v1.4.0 - All ProfilesUnix

SYSTEM AND COMMUNICATIONS PROTECTION

Big Sur - Ensure Seperate Execution Domain for ProcessesNIST macOS Big Sur v1.4.0 - 800-53r5 LowUnix

SYSTEM AND COMMUNICATIONS PROTECTION

Big Sur - Ensure Seperate Execution Domain for ProcessesNIST macOS Big Sur v1.4.0 - 800-53r5 ModerateUnix

SYSTEM AND COMMUNICATIONS PROTECTION

Catalina - Ensure Seperate Execution Domain for ProcessesNIST macOS Catalina v1.5.0 - 800-53r5 ModerateUnix

SYSTEM AND COMMUNICATIONS PROTECTION

Catalina - Ensure Seperate Execution Domain for ProcessesNIST macOS Catalina v1.5.0 - All ProfilesUnix

SYSTEM AND COMMUNICATIONS PROTECTION

Catalina - Ensure Seperate Execution Domain for ProcessesNIST macOS Catalina v1.5.0 - 800-53r5 LowUnix

SYSTEM AND COMMUNICATIONS PROTECTION

Catalina - Ensure Seperate Execution Domain for ProcessesNIST macOS Catalina v1.5.0 - 800-53r5 HighUnix

SYSTEM AND COMMUNICATIONS PROTECTION

Monterey - Ensure Seperate Execution Domain for ProcessesNIST macOS Monterey v1.0.0 - All ProfilesUnix

SYSTEM AND COMMUNICATIONS PROTECTION

Monterey - Ensure Seperate Execution Domain for ProcessesNIST macOS Monterey v1.0.0 - 800-53r5 HighUnix

SYSTEM AND COMMUNICATIONS PROTECTION

Monterey - Ensure Seperate Execution Domain for ProcessesNIST macOS Monterey v1.0.0 - 800-53r5 LowUnix

SYSTEM AND COMMUNICATIONS PROTECTION

Monterey - Ensure Seperate Execution Domain for ProcessesNIST macOS Monterey v1.0.0 - 800-53r5 ModerateUnix

SYSTEM AND COMMUNICATIONS PROTECTION

Turn On Virtualization Based Security - HypervisorEnforcedCodeIntegrityMSCT Windows 10 v21H2 v1.0.0Windows

SYSTEM AND COMMUNICATIONS PROTECTION