1.3.2 Ensure sudo commands use pty | CIS Debian 10 Server L1 v1.0.0 | Unix | ACCESS CONTROL |
1.4.2.1 Ensure 'TACACS+/RADIUS' is configured correctly - protocol | CIS Cisco Firewall v8.x L1 v4.2.0 | Cisco | ACCESS CONTROL |
1.4.3.3 Ensure 'aaa authentication secure-http-client' is configured correctly | CIS Cisco ASA 9.x Firewall L1 v1.0.0 | Cisco | ACCESS CONTROL |
1.4.3.3 Ensure 'aaa authentication secure-http-client' is configured correctly | CIS Cisco Firewall v8.x L1 v4.2.0 | Cisco | ACCESS CONTROL |
1.4.3.4 Ensure 'aaa authentication serial console' is configured correctly | CIS Cisco Firewall ASA 9 L1 v4.1.0 | Cisco | ACCESS CONTROL |
1.4.3.5 Ensure 'aaa authentication ssh console' is configured correctly | CIS Cisco ASA 9.x Firewall L1 v1.0.0 | Cisco | ACCESS CONTROL |
1.4.3.5 Ensure 'aaa authentication ssh console' is configured correctly | CIS Cisco Firewall v8.x L1 v4.2.0 | Cisco | ACCESS CONTROL |
1.4.3.5 Ensure 'aaa authentication ssh console' is configured correctly | CIS Cisco Firewall ASA 9 L1 v4.1.0 | Cisco | ACCESS CONTROL |
1.4.3.6 Ensure 'aaa authentication telnet console' is configured correctly | CIS Cisco Firewall v8.x L1 v4.2.0 | Cisco | ACCESS CONTROL |
1.4.4.2 Ensure 'aaa authorization exec' is configured correctly | CIS Cisco ASA 9.x Firewall L1 v1.0.0 | Cisco | ACCESS CONTROL |
1.4.4.2 Ensure 'aaa authorization exec' is configured correctly | CIS Cisco Firewall v8.x L1 v4.2.0 | Cisco | ACCESS CONTROL |
2.2.6 Ensure 'Allow log on through Remote Desktop Services' is set to 'Administrators, Remote Desktop Users' | CIS Microsoft Windows 10 Enterprise v1.12.0 L1 + NG | Windows | ACCESS CONTROL |
2.2.6 Ensure 'Allow log on through Remote Desktop Services' is set to 'Administrators, Remote Desktop Users' | CIS Microsoft Windows 11 Stand-alone v1.0.0 L1 + BL | Windows | ACCESS CONTROL |
2.2.6 Ensure 'Allow log on through Remote Desktop Services' is set to 'Administrators, Remote Desktop Users' | CIS Microsoft Windows 10 Stand-alone v1.12.0 L1 + NG | Windows | ACCESS CONTROL |
2.2.6 Ensure 'Allow log on through Remote Desktop Services' is set to 'Administrators, Remote Desktop Users' | CIS Microsoft Windows 10 Enterprise v1.12.0 L1 | Windows | ACCESS CONTROL |
2.2.6 Ensure 'Allow log on through Remote Desktop Services' is set to 'Administrators, Remote Desktop Users' | CIS Microsoft Windows 11 Stand-alone v1.0.0 L1 + BL + NG | Windows | ACCESS CONTROL |
2.2.6 Ensure 'Allow log on through Remote Desktop Services' is set to 'Administrators, Remote Desktop Users' | CIS Microsoft Windows 10 Stand-alone v1.0.1 L1 | Windows | ACCESS CONTROL |
2.2.8 Ensure 'Allow log on through Remote Desktop Services' is set to 'Administrators' (DC only) | CIS Microsoft Windows Server 2008 R2 Domain Controller Level 1 v3.3.0 | Windows | ACCESS CONTROL |
2.2.9 Ensure 'Allow log on through Remote Desktop Services' is set to 'Administrators, Remote Desktop Users' (MS only) | CIS Microsoft Windows Server 2016 MS L1 v1.4.0 | Windows | ACCESS CONTROL |
2.2.9 Ensure 'Allow log on through Remote Desktop Services' is set to 'Administrators, Remote Desktop Users' (MS only) | CIS Microsoft Windows Server 2008 R2 Member Server Level 1 v3.3.0 | Windows | ACCESS CONTROL |
2.2.9 Ensure 'Allow log on through Remote Desktop Services' is set to 'Administrators, Remote Desktop Users' (MS only) - Administrators, Remote Desktop Users | CIS Microsoft Windows Server 2019 MS L1 v1.3.0 | Windows | ACCESS CONTROL |
2.3.17.1 Ensure 'User Account Control: Admin Approval Mode for the Built-in Administrator account' is set to 'Enabled' | CIS Windows Server 2012 R2 MS L1 v2.6.0 | Windows | ACCESS CONTROL |
2.3.17.1 Ensure 'User Account Control: Admin Approval Mode for the Built-in Administrator account' is set to 'Enabled' | CIS Microsoft Windows Server 2008 Domain Controller Level 1 v3.3.0 | Windows | ACCESS CONTROL |
2.3.17.1 Ensure 'User Account Control: Admin Approval Mode for the Built-in Administrator account' is set to 'Enabled' | CIS Microsoft Windows Server 2008 R2 Domain Controller Level 1 v3.3.0 | Windows | ACCESS CONTROL |
2.3.17.1 Ensure 'User Account Control: Admin Approval Mode for the Built-in Administrator account' is set to 'Enabled' | CIS Microsoft Windows Server 2022 v1.0.0 L1 DC | Windows | ACCESS CONTROL |
2.3.17.1 Ensure 'User Account Control: Admin Approval Mode for the Built-in Administrator account' is set to 'Enabled' | CIS Microsoft Windows Server 2016 DC L1 v1.4.0 | Windows | ACCESS CONTROL |
4.1 Ensure a non-root user account exists for local admin access | CIS VMware ESXi 6.5 v1.0.0 Level 1 Bare Metal | Unix | ACCESS CONTROL |
5.2.1 Ensure GKE clusters are not running using the Compute Engine default service account | CIS Google Kubernetes Engine (GKE) v1.3.0 L1 | GCP | ACCESS CONTROL |
5.2.10 Ensure SSH root login is disabled | CIS Fedora 19 Family Linux Workstation L1 v1.0.0 | Unix | ACCESS CONTROL |
5.2.10 Ensure SSH root login is disabled | CIS Debian 9 Server L1 v1.0.1 | Unix | ACCESS CONTROL |
5.3.5 Ensure SSH access is limited | CIS Oracle Linux 6 Server L1 v2.0.0 | Unix | ACCESS CONTROL |
5.3.5 Ensure SSH access is limited | CIS CentOS 6 Workstation L1 v3.0.0 | Unix | ACCESS CONTROL |
5.4 Automatically lock the login keychain for inactivity | CIS Apple macOS 10.13 L2 v1.1.0 | Unix | ACCESS CONTROL |
5.5 Automatically lock the login keychain for inactivity | CIS Apple macOS 10.12 L2 v1.2.0 | Unix | ACCESS CONTROL |
5.5 Ensure CIM access is limited | CIS VMware ESXi 6.5 v1.0.0 Level 1 | VMware | ACCESS CONTROL |
5.5 Ensure root login is restricted to system console | CIS Debian 9 Server L1 v1.0.1 | Unix | ACCESS CONTROL |
5.5.2 Ensure system accounts are secured - non-login shell | CIS Oracle Linux 6 Server L1 v2.0.0 | Unix | ACCESS CONTROL |
5.5.2 Ensure system accounts are secured - unlocked non-root | CIS Oracle Linux 6 Server L1 v2.0.0 | Unix | ACCESS CONTROL |
5.5.2 Ensure system accounts are secured - unlocked non-root | CIS CentOS 6 Server L1 v3.0.0 | Unix | ACCESS CONTROL |
6.2.8 Disable SSH Root Login | CIS Red Hat Enterprise Linux 5 L1 v2.2.1 | Unix | ACCESS CONTROL |
6.2.13 Limit Access via SSH - AllowUsers/Groups, DenyUsers/Groups | CIS Red Hat Enterprise Linux 5 L1 v2.2.1 | Unix | ACCESS CONTROL |
6.4 Use parental controls for systems that are not centrally managed | CIS Apple macOS 10.13 L2 v1.1.0 | Unix | ACCESS CONTROL |
6.5 Use parental controls for systems that are not centrally managed | CIS Apple OSX 10.10 Yosemite L2 v1.2.0 | Unix | ACCESS CONTROL |
18.3.1 Ensure 'Apply UAC restrictions to local accounts on network logons' is set to 'Enabled' | CIS Microsoft Intune for Windows 10 v1.1.0 L1 + BL | Windows | ACCESS CONTROL |
18.3.1 Ensure 'Apply UAC restrictions to local accounts on network logons' is set to 'Enabled' | CIS Microsoft Intune for Windows 10 v1.1.0 L1 + NG | Windows | ACCESS CONTROL |
18.3.1 Ensure 'Apply UAC restrictions to local accounts on network logons' is set to 'Enabled' | CIS Microsoft Intune for Windows 10 v1.1.0 L1 | Windows | ACCESS CONTROL |
18.5.11.4 Ensure 'Require domain users to elevate when setting a network's location' is set to 'Enabled' | CIS Microsoft Intune for Windows 10 v1.1.0 L1 + NG | Windows | ACCESS CONTROL |
18.9.90.2 Ensure 'Always install with elevated privileges' is set to 'Disabled' - Disabled | CIS Microsoft Intune for Windows 10 v1.1.0 L1 + BL + NG | Windows | ACCESS CONTROL |
19.7.42.1 Ensure 'Always install with elevated privileges' is set to 'Disabled' | CIS Microsoft Intune for Windows 10 v1.1.0 L1 + NG | Windows | ACCESS CONTROL |
19.7.42.1 Ensure 'Always install with elevated privileges' is set to 'Disabled' | CIS Microsoft Intune for Windows 10 v1.1.0 L1 | Windows | ACCESS CONTROL |