1.1 Ensure the Pre-Installation Planning Checklist Has Been Implemented | CIS Apache HTTP Server 2.4 L1 v2.1.0 Middleware | Unix | CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY |
1.1 Ensure the Pre-Installation Planning Checklist Has Been Implemented | CIS Apache HTTP Server 2.4 L1 v2.1.0 | Unix | CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY |
1.2.1 Ensure that only organizationally managed/approved public groups exist | CIS Microsoft 365 Foundations E3 L2 v3.0.0 | microsoft_azure | ACCESS CONTROL, MEDIA PROTECTION |
1.3.7 Ensure 'third-party storage services' are restricted in 'Microsoft 365 on the web' | CIS Microsoft 365 Foundations E3 L2 v3.0.0 | microsoft_azure | ACCESS CONTROL, MEDIA PROTECTION |
1.3.8 Ensure that Sways cannot be shared with people outside of your organization | CIS Microsoft 365 Foundations E3 L2 v3.0.0 | microsoft_azure | CONFIGURATION MANAGEMENT |
3.3.1 Ensure SharePoint Online Information Protection policies are set up and used | CIS Microsoft 365 Foundations E3 L1 v3.0.0 | microsoft_azure | RISK ASSESSMENT |
5.1.6.1 Ensure that collaboration invitations are sent to allowed domains only | CIS Microsoft 365 Foundations E3 L2 v3.0.0 | microsoft_azure | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION |
6.5.3 Ensure additional storage providers are restricted in Outlook on the web | CIS Microsoft 365 Foundations E3 L2 v3.0.0 | microsoft_azure | ACCESS CONTROL, MEDIA PROTECTION |
9.11 Ensure Azure Key Vaults are Used to Store Secrets | CIS Microsoft Azure Foundations v2.0.0 L2 | microsoft_azure | AUDIT AND ACCOUNTABILITY, SYSTEM AND INFORMATION INTEGRITY |
18.7.1.1 (L2) Ensure 'Turn off notifications network usage' is set to 'Enabled' | CIS Microsoft Windows 8.1 v2.4.1 L2 Bitlocker | Windows | CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY |
18.7.1.1 (L2) Ensure 'Turn off notifications network usage' is set to 'Enabled' | CIS Microsoft Windows 8.1 v2.4.1 L2 | Windows | CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY |
CIS Control 13 (13.1) Maintain an Inventory of Sensitive Information | CAS Implementation Group 1 Audit File | Unix | CONFIGURATION MANAGEMENT |