Item Search

NameAudit NamePluginCategory
1.7 Audit Computer NameCIS Apple macOS 10.14 v2.0.0 L2Unix

CONFIGURATION MANAGEMENT, PROGRAM MANAGEMENT

1.8 Ensure Computer Name Does Not Contain PII or Protected Organizational InformationCIS Apple macOS 10.15 v2.1.0 L2Unix

CONFIGURATION MANAGEMENT, PROGRAM MANAGEMENT

1.8 Ensure Computer Name Does Not Contain PII or Protected Organizational InformationCIS Apple macOS 11.0 Big Sur v4.0.0 L2Unix

CONFIGURATION MANAGEMENT, PROGRAM MANAGEMENT

1.8 Ensure Computer Name Does Not Contain PII or Protected Organizational InformationCIS Apple macOS 10.15 Catalina v3.0.0 L2Unix

CONFIGURATION MANAGEMENT, PROGRAM MANAGEMENT

1.8 Ensure Computer Name Does Not Contain PII or Protected Organizational InformationCIS Apple macOS 12.0 Monterey v3.0.0 L2Unix

CONFIGURATION MANAGEMENT, PROGRAM MANAGEMENT

2.1 Collect system configuration regularlyCIS IBM AIX 7.2 L1 v1.1.0Unix

CONFIGURATION MANAGEMENT, PROGRAM MANAGEMENT

2.3.3.12 Ensure Computer Name Does Not Contain PII or Protected Organizational InformationCIS Apple macOS 13.0 Ventura v2.0.0 L2Unix

CONFIGURATION MANAGEMENT, PROGRAM MANAGEMENT

2.3.3.12 Ensure Computer Name Does Not Contain PII or Protected Organizational InformationCIS Apple macOS 14.0 Sonoma v1.0.0 L2Unix

CONFIGURATION MANAGEMENT, PROGRAM MANAGEMENT

2.13 Ensure Cloud Asset Inventory Is EnabledCIS Google Cloud Platform v3.0.0 L1GCP

CONFIGURATION MANAGEMENT, PROGRAM MANAGEMENT

3.3 Ensure AWS Config is enabled in all regionsCIS Amazon Web Services Foundations L2 3.0.0amazon_aws

CONFIGURATION MANAGEMENT, PROGRAM MANAGEMENT

6.7 Ensure that Public IP addresses are Evaluated on a Periodic BasisCIS Microsoft Azure Foundations v2.1.0 L1microsoft_azure

CONFIGURATION MANAGEMENT

7.1 Ensure an Azure Bastion Host ExistsCIS Microsoft Azure Foundations v2.1.0 L2microsoft_azure

SECURITY ASSESSMENT AND AUTHORIZATION, CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION