Item Search

NameAudit NamePluginCategory
1.4.2 Set the SELinux State - SELINUX=enforcingCIS Red Hat Enterprise Linux 5 L2 v2.2.1Unix

ACCESS CONTROL

1.4.3 Set the SELinux Policy - SELINUXTYPE=targetedCIS Red Hat Enterprise Linux 5 L2 v2.2.1Unix

ACCESS CONTROL

1.6.1.2 Ensure the SELinux state is enforcing - /etc/selinux/configCIS Aliyun Linux 2 L2 v1.0.0Unix

ACCESS CONTROL

1.6.1.3 Ensure all AppArmor Profiles are in enforce or complain mode - unconfinedCIS Ubuntu Linux 16.04 LTS Server L1 v2.0.0Unix

ACCESS CONTROL

1.6.1.3 Ensure SELinux policy is configuredCIS Oracle Linux 6 Server L1 v2.0.0Unix

ACCESS CONTROL

1.6.1.3 Ensure SELinux policy is configured - sestatusCIS Aliyun Linux 2 L2 v1.0.0Unix

ACCESS CONTROL

1.6.1.4 Ensure the SELinux mode is enforcing or permissive - configCIS Oracle Linux 6 Workstation L1 v2.0.0Unix

ACCESS CONTROL

1.6.1.4 Ensure the SELinux mode is enforcing or permissive - configCIS CentOS 6 Server L1 v3.0.0Unix

ACCESS CONTROL

1.6.1.4 Ensure the SELinux mode is enforcing or permissive - getenforceCIS Oracle Linux 6 Workstation L1 v2.0.0Unix

ACCESS CONTROL

1.6.1.4 Ensure the SELinux mode is enforcing or permissive - getenforceCIS Red Hat 6 Workstation L1 v3.0.0Unix

ACCESS CONTROL

1.6.1.5 Ensure the SELinux mode is enforcing - configCIS CentOS 6 Server L2 v3.0.0Unix

ACCESS CONTROL

1.6.1.5 Ensure the SELinux mode is enforcing - configCIS Oracle Linux 6 Server L2 v2.0.0Unix

ACCESS CONTROL

1.6.1.5 Ensure the SELinux mode is enforcing - getenforceCIS CentOS 6 Workstation L2 v3.0.0Unix

ACCESS CONTROL

1.6.1.5 Ensure the SELinux mode is enforcing - getenforceCIS CentOS 6 Server L2 v3.0.0Unix

ACCESS CONTROL

1.6.1.5 Ensure the SELinux mode is enforcing - getenforceCIS Oracle Linux 6 Workstation L2 v2.0.0Unix

ACCESS CONTROL

1.6.1.5 Ensure the SELinux mode is enforcing - getenforceCIS Oracle Linux 6 Server L2 v2.0.0Unix

ACCESS CONTROL

1.6.1.5 Ensure the SELinux mode is enforcing - getenforceCIS Red Hat 6 Server L2 v3.0.0Unix

ACCESS CONTROL

1.6.1.7 Ensure SETroubleshoot is not installedCIS Red Hat 6 Server L1 v3.0.0Unix

ACCESS CONTROL

2.2.45 Ensure 'Take ownership of files or other objects' is set to 'Administrators'CIS Microsoft Windows Server 2008 Member Server Level 1 v3.3.1Windows

ACCESS CONTROL

2.2.45 Ensure 'Take ownership of files or other objects' is set to 'Administrators'CIS Microsoft Windows Server 2008 Member Server Level 1 v3.3.0Windows

ACCESS CONTROL

3.2 Set Daemon umaskCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

ACCESS CONTROL

5.1 Use secure RealmsCIS Apache Tomcat 8 L2 v1.1.0Unix

ACCESS CONTROL

5.3.2 Ensure permissions on SSH private host key files are configuredCIS CentOS 6 Workstation L1 v3.0.0Unix

ACCESS CONTROL

5.3.2 Ensure permissions on SSH private host key files are configuredCIS CentOS 6 Server L1 v3.0.0Unix

ACCESS CONTROL

5.3.2 Ensure permissions on SSH private host key files are configuredCIS Oracle Linux 6 Server L1 v2.0.0Unix

ACCESS CONTROL

6.2.20 Ensure shadow group is empty - /etc/groupCIS Oracle Linux 6 Server L1 v2.0.0Unix

ACCESS CONTROL

6.2.20 Ensure shadow group is empty - /etc/groupCIS Oracle Linux 6 Workstation L1 v2.0.0Unix

ACCESS CONTROL

6.2.20 Ensure shadow group is empty - /etc/groupCIS CentOS 6 Workstation L1 v3.0.0Unix

ACCESS CONTROL

6.2.20 Ensure shadow group is empty - /etc/passwdCIS CentOS 6 Server L1 v3.0.0Unix

ACCESS CONTROL

6.2.20 Ensure shadow group is empty - /etc/passwdCIS Oracle Linux 6 Workstation L1 v2.0.0Unix

ACCESS CONTROL

7.2 Ensure appropriate database file permissions are set.CIS MongoDB 4 L1 OS Linux v1.0.0Unix

ACCESS CONTROL

7.4 Ensure directory in context.xml is a secure location - configurationCIS Apache Tomcat 8 L1 v1.1.0Unix

ACCESS CONTROL

7.6 Ensure directory in logging.properties is a secure location - check application log directory is secureCIS Apache Tomcat 9 L1 v1.2.0Unix

ACCESS CONTROL

7.6 Ensure directory in logging.properties is a secure location - check prefix application nameCIS Apache Tomcat 8 L1 v1.1.0Unix

ACCESS CONTROL

7.6 Ensure directory in logging.properties is a secure location - check prefix application nameCIS Apache Tomcat 9 L1 v1.2.0Unix

ACCESS CONTROL

8.1 Restrict runtime access to sensitive packagesCIS Apache Tomcat 8 L1 v1.1.0Unix

ACCESS CONTROL

8.1.1 Set Warning Banner for Standard Login Services - /etc/motdCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

ACCESS CONTROL

8.4 Restrict Access to Zone and Key Signing KeysCIS BIND DNS v1.0.0 L2 Authoritative Name ServerUnix

ACCESS CONTROL

9.1.1 Verify System File PermissionsCIS Red Hat Enterprise Linux 5 L2 v2.2.1Unix

ACCESS CONTROL

9.1.10 Find World Writable FilesCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

ACCESS CONTROL

9.1.12 Find Un-grouped Files and DirectoriesCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

ACCESS CONTROL

9.2.7 Check Permissions on User Home DirectoriesCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

ACCESS CONTROL

9.5 Ensure No Replication Users Have Wildcard HostnamesCIS MySQL 5.6 Enterprise Database L1 v2.0.0MySQLDB

ACCESS CONTROL

9.5 Ensure No Replication Users Have Wildcard HostnamesCIS MySQL 5.7 Enterprise Database L1 v2.0.0MySQLDB

ACCESS CONTROL

10.3 Ensure the named_t Process Type is Not in Permissive ModeCIS BIND DNS v1.0.0 L2 Caching Only Name ServerUnix

ACCESS CONTROL

18.10.3.1 Ensure 'Allow a Windows app to share application data between users' is set to 'Disabled'CIS Microsoft Windows 11 Enterprise v2.0.0 L2Windows

ACCESS CONTROL

18.10.3.1 Ensure 'Allow a Windows app to share application data between users' is set to 'Disabled'CIS Microsoft Windows 10 Enterprise v2.0.0 L2 + NGWindows

ACCESS CONTROL

18.10.3.1 Ensure 'Allow a Windows app to share application data between users' is set to 'Disabled' - DisabledCIS Microsoft Windows 10 Stand-alone v2.0.0 L2 + NGWindows

ACCESS CONTROL

18.10.3.1 Ensure 'Allow a Windows app to share application data between users' is set to 'Disabled' - DisabledCIS Microsoft Windows 10 Stand-alone v2.0.0 L2 + BLWindows

ACCESS CONTROL

CIS Control 14 (14.6) Protect Information Through Access Control ListsCAS Implementation Group 1 Audit FileUnix

ACCESS CONTROL