Item Search

NameAudit NamePluginCategory
1.3.2 Ensure sudo commands use ptyCIS Debian 10 Server L1 v1.0.0Unix

ACCESS CONTROL

1.4.2.1 Ensure 'TACACS+/RADIUS' is configured correctly - protocolCIS Cisco Firewall v8.x L1 v4.2.0Cisco

ACCESS CONTROL

1.4.3.3 Ensure 'aaa authentication secure-http-client' is configured correctlyCIS Cisco ASA 9.x Firewall L1 v1.0.0Cisco

ACCESS CONTROL

1.4.3.3 Ensure 'aaa authentication secure-http-client' is configured correctlyCIS Cisco Firewall v8.x L1 v4.2.0Cisco

ACCESS CONTROL

1.4.3.4 Ensure 'aaa authentication serial console' is configured correctlyCIS Cisco Firewall ASA 9 L1 v4.1.0Cisco

ACCESS CONTROL

1.4.3.5 Ensure 'aaa authentication ssh console' is configured correctlyCIS Cisco ASA 9.x Firewall L1 v1.0.0Cisco

ACCESS CONTROL

1.4.3.5 Ensure 'aaa authentication ssh console' is configured correctlyCIS Cisco Firewall v8.x L1 v4.2.0Cisco

ACCESS CONTROL

1.4.3.5 Ensure 'aaa authentication ssh console' is configured correctlyCIS Cisco Firewall ASA 9 L1 v4.1.0Cisco

ACCESS CONTROL

1.4.3.6 Ensure 'aaa authentication telnet console' is configured correctlyCIS Cisco Firewall v8.x L1 v4.2.0Cisco

ACCESS CONTROL

1.4.4.2 Ensure 'aaa authorization exec' is configured correctlyCIS Cisco ASA 9.x Firewall L1 v1.0.0Cisco

ACCESS CONTROL

1.4.4.2 Ensure 'aaa authorization exec' is configured correctlyCIS Cisco Firewall v8.x L1 v4.2.0Cisco

ACCESS CONTROL

2.2.6 Ensure 'Allow log on through Remote Desktop Services' is set to 'Administrators, Remote Desktop Users'CIS Microsoft Windows 10 Enterprise v1.12.0 L1 + NGWindows

ACCESS CONTROL

2.2.6 Ensure 'Allow log on through Remote Desktop Services' is set to 'Administrators, Remote Desktop Users'CIS Microsoft Windows 11 Stand-alone v1.0.0 L1 + BLWindows

ACCESS CONTROL

2.2.6 Ensure 'Allow log on through Remote Desktop Services' is set to 'Administrators, Remote Desktop Users'CIS Microsoft Windows 10 Stand-alone v1.12.0 L1 + NGWindows

ACCESS CONTROL

2.2.6 Ensure 'Allow log on through Remote Desktop Services' is set to 'Administrators, Remote Desktop Users'CIS Microsoft Windows 10 Enterprise v1.12.0 L1Windows

ACCESS CONTROL

2.2.6 Ensure 'Allow log on through Remote Desktop Services' is set to 'Administrators, Remote Desktop Users'CIS Microsoft Windows 11 Stand-alone v1.0.0 L1 + BL + NGWindows

ACCESS CONTROL

2.2.6 Ensure 'Allow log on through Remote Desktop Services' is set to 'Administrators, Remote Desktop Users'CIS Microsoft Windows 10 Stand-alone v1.0.1 L1Windows

ACCESS CONTROL

2.2.8 Ensure 'Allow log on through Remote Desktop Services' is set to 'Administrators' (DC only)CIS Microsoft Windows Server 2008 R2 Domain Controller Level 1 v3.3.0Windows

ACCESS CONTROL

2.2.9 Ensure 'Allow log on through Remote Desktop Services' is set to 'Administrators, Remote Desktop Users' (MS only)CIS Microsoft Windows Server 2016 MS L1 v1.4.0Windows

ACCESS CONTROL

2.2.9 Ensure 'Allow log on through Remote Desktop Services' is set to 'Administrators, Remote Desktop Users' (MS only)CIS Microsoft Windows Server 2008 R2 Member Server Level 1 v3.3.0Windows

ACCESS CONTROL

2.2.9 Ensure 'Allow log on through Remote Desktop Services' is set to 'Administrators, Remote Desktop Users' (MS only) - Administrators, Remote Desktop UsersCIS Microsoft Windows Server 2019 MS L1 v1.3.0Windows

ACCESS CONTROL

2.3.17.1 Ensure 'User Account Control: Admin Approval Mode for the Built-in Administrator account' is set to 'Enabled'CIS Windows Server 2012 R2 MS L1 v2.6.0Windows

ACCESS CONTROL

2.3.17.1 Ensure 'User Account Control: Admin Approval Mode for the Built-in Administrator account' is set to 'Enabled'CIS Microsoft Windows Server 2008 Domain Controller Level 1 v3.3.0Windows

ACCESS CONTROL

2.3.17.1 Ensure 'User Account Control: Admin Approval Mode for the Built-in Administrator account' is set to 'Enabled'CIS Microsoft Windows Server 2008 R2 Domain Controller Level 1 v3.3.0Windows

ACCESS CONTROL

2.3.17.1 Ensure 'User Account Control: Admin Approval Mode for the Built-in Administrator account' is set to 'Enabled'CIS Microsoft Windows Server 2022 v1.0.0 L1 DCWindows

ACCESS CONTROL

2.3.17.1 Ensure 'User Account Control: Admin Approval Mode for the Built-in Administrator account' is set to 'Enabled'CIS Microsoft Windows Server 2016 DC L1 v1.4.0Windows

ACCESS CONTROL

4.1 Ensure a non-root user account exists for local admin accessCIS VMware ESXi 6.5 v1.0.0 Level 1 Bare MetalUnix

ACCESS CONTROL

5.2.1 Ensure GKE clusters are not running using the Compute Engine default service accountCIS Google Kubernetes Engine (GKE) v1.3.0 L1GCP

ACCESS CONTROL

5.2.10 Ensure SSH root login is disabledCIS Fedora 19 Family Linux Workstation L1 v1.0.0Unix

ACCESS CONTROL

5.2.10 Ensure SSH root login is disabledCIS Debian 9 Server L1 v1.0.1Unix

ACCESS CONTROL

5.3.5 Ensure SSH access is limitedCIS Oracle Linux 6 Server L1 v2.0.0Unix

ACCESS CONTROL

5.3.5 Ensure SSH access is limitedCIS CentOS 6 Workstation L1 v3.0.0Unix

ACCESS CONTROL

5.4 Automatically lock the login keychain for inactivityCIS Apple macOS 10.13 L2 v1.1.0Unix

ACCESS CONTROL

5.5 Automatically lock the login keychain for inactivityCIS Apple macOS 10.12 L2 v1.2.0Unix

ACCESS CONTROL

5.5 Ensure CIM access is limitedCIS VMware ESXi 6.5 v1.0.0 Level 1VMware

ACCESS CONTROL

5.5 Ensure root login is restricted to system consoleCIS Debian 9 Server L1 v1.0.1Unix

ACCESS CONTROL

5.5.2 Ensure system accounts are secured - non-login shellCIS Oracle Linux 6 Server L1 v2.0.0Unix

ACCESS CONTROL

5.5.2 Ensure system accounts are secured - unlocked non-rootCIS Oracle Linux 6 Server L1 v2.0.0Unix

ACCESS CONTROL

5.5.2 Ensure system accounts are secured - unlocked non-rootCIS CentOS 6 Server L1 v3.0.0Unix

ACCESS CONTROL

6.2.8 Disable SSH Root LoginCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

ACCESS CONTROL

6.2.13 Limit Access via SSH - AllowUsers/Groups, DenyUsers/GroupsCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

ACCESS CONTROL

6.4 Use parental controls for systems that are not centrally managedCIS Apple macOS 10.13 L2 v1.1.0Unix

ACCESS CONTROL

6.5 Use parental controls for systems that are not centrally managedCIS Apple OSX 10.10 Yosemite L2 v1.2.0Unix

ACCESS CONTROL

18.3.1 Ensure 'Apply UAC restrictions to local accounts on network logons' is set to 'Enabled'CIS Microsoft Intune for Windows 10 v1.1.0 L1 + BLWindows

ACCESS CONTROL

18.3.1 Ensure 'Apply UAC restrictions to local accounts on network logons' is set to 'Enabled'CIS Microsoft Intune for Windows 10 v1.1.0 L1 + NGWindows

ACCESS CONTROL

18.3.1 Ensure 'Apply UAC restrictions to local accounts on network logons' is set to 'Enabled'CIS Microsoft Intune for Windows 10 v1.1.0 L1Windows

ACCESS CONTROL

18.5.11.4 Ensure 'Require domain users to elevate when setting a network's location' is set to 'Enabled'CIS Microsoft Intune for Windows 10 v1.1.0 L1 + NGWindows

ACCESS CONTROL

18.9.90.2 Ensure 'Always install with elevated privileges' is set to 'Disabled' - DisabledCIS Microsoft Intune for Windows 10 v1.1.0 L1 + BL + NGWindows

ACCESS CONTROL

19.7.42.1 Ensure 'Always install with elevated privileges' is set to 'Disabled'CIS Microsoft Intune for Windows 10 v1.1.0 L1 + NGWindows

ACCESS CONTROL

19.7.42.1 Ensure 'Always install with elevated privileges' is set to 'Disabled'CIS Microsoft Intune for Windows 10 v1.1.0 L1Windows

ACCESS CONTROL