1.7 Audit Computer Name | CIS Apple macOS 10.14 v2.0.0 L2 | Unix | CONFIGURATION MANAGEMENT, PROGRAM MANAGEMENT |
1.8 Ensure Computer Name Does Not Contain PII or Protected Organizational Information | CIS Apple macOS 10.15 v2.1.0 L2 | Unix | CONFIGURATION MANAGEMENT, PROGRAM MANAGEMENT |
1.8 Ensure Computer Name Does Not Contain PII or Protected Organizational Information | CIS Apple macOS 11.0 Big Sur v4.0.0 L2 | Unix | CONFIGURATION MANAGEMENT, PROGRAM MANAGEMENT |
1.8 Ensure Computer Name Does Not Contain PII or Protected Organizational Information | CIS Apple macOS 10.15 Catalina v3.0.0 L2 | Unix | CONFIGURATION MANAGEMENT, PROGRAM MANAGEMENT |
1.8 Ensure Computer Name Does Not Contain PII or Protected Organizational Information | CIS Apple macOS 12.0 Monterey v3.0.0 L2 | Unix | CONFIGURATION MANAGEMENT, PROGRAM MANAGEMENT |
2.1 Collect system configuration regularly | CIS IBM AIX 7.2 L1 v1.1.0 | Unix | CONFIGURATION MANAGEMENT, PROGRAM MANAGEMENT |
2.3.3.12 Ensure Computer Name Does Not Contain PII or Protected Organizational Information | CIS Apple macOS 13.0 Ventura v2.0.0 L2 | Unix | CONFIGURATION MANAGEMENT, PROGRAM MANAGEMENT |
2.3.3.12 Ensure Computer Name Does Not Contain PII or Protected Organizational Information | CIS Apple macOS 14.0 Sonoma v1.0.0 L2 | Unix | CONFIGURATION MANAGEMENT, PROGRAM MANAGEMENT |
2.13 Ensure Cloud Asset Inventory Is Enabled | CIS Google Cloud Platform v3.0.0 L1 | GCP | CONFIGURATION MANAGEMENT, PROGRAM MANAGEMENT |
3.3 Ensure AWS Config is enabled in all regions | CIS Amazon Web Services Foundations L2 3.0.0 | amazon_aws | CONFIGURATION MANAGEMENT, PROGRAM MANAGEMENT |
6.7 Ensure that Public IP addresses are Evaluated on a Periodic Basis | CIS Microsoft Azure Foundations v2.1.0 L1 | microsoft_azure | CONFIGURATION MANAGEMENT |
7.1 Ensure an Azure Bastion Host Exists | CIS Microsoft Azure Foundations v2.1.0 L2 | microsoft_azure | SECURITY ASSESSMENT AND AUTHORIZATION, CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION |