Item Search

NameAudit NamePluginCategory
1.1.21 Ensure sticky bit is set on all world-writable directoriesCIS Red Hat EL8 Workstation L1 v1.0.0Unix

ACCESS CONTROL

1.1.21 Ensure sticky bit is set on all world-writable directoriesCIS Red Hat EL8 Server L1 v1.0.0Unix

ACCESS CONTROL

1.1.21 Ensure sticky bit is set on all world-writable directoriesCIS SUSE Linux Enterprise Server 12 L1 v2.1.0Unix

ACCESS CONTROL

1.6.1.2 Ensure the SELinux state is enforcingCIS SUSE Linux Enterprise Workstation 12 L2 v2.1.0Unix

ACCESS CONTROL

1.6.1.2 Ensure the SELinux state is enforcingCIS SUSE Linux Enterprise Server 12 L2 v2.1.0Unix

ACCESS CONTROL

1.6.1.3 Ensure SELinux policy is configuredCIS Oracle Linux 6 Workstation L2 v1.1.0Unix

ACCESS CONTROL

1.6.1.3 Ensure SELinux policy is configuredCIS SUSE Linux Enterprise Server 12 L2 v2.1.0Unix

ACCESS CONTROL

1.6.1.3 Ensure SELinux policy is configuredCIS Red Hat 6 Server L2 v2.1.0Unix

ACCESS CONTROL

1.6.1.3 Ensure SELinux policy is configuredCIS Amazon Linux v2.1.0 L2Unix

ACCESS CONTROL

1.6.1.3 Ensure SELinux policy is configuredCIS Ubuntu Linux 14.04 LTS Workstation L2 v2.1.0Unix

ACCESS CONTROL

1.6.1.3 Ensure SELinux policy is configuredCIS CentOS 6 Workstation L2 v2.1.0Unix

ACCESS CONTROL

1.6.1.3 Ensure SELinux policy is configured - 'Policy from config file'CIS Ubuntu Linux 14.04 LTS Workstation L2 v2.1.0Unix

ACCESS CONTROL

1.6.1.3 Ensure SELinux policy is configured - 'Policy from config file'CIS Ubuntu Linux 16.04 LTS Server L2 v1.1.0Unix

ACCESS CONTROL

1.6.1.3 Ensure SELinux policy is configured - 'Policy from config file'CIS Ubuntu Linux 16.04 LTS Workstation L2 v1.1.0Unix

ACCESS CONTROL

1.6.1.3 Ensure SELinux policy is configured - 'Policy from config file'CIS Ubuntu Linux 14.04 LTS Server L2 v2.1.0Unix

ACCESS CONTROL

1.6.1.3 Ensure SELinux policy is configured - 'SELINUXTYPE'CIS Ubuntu Linux 16.04 LTS Workstation L2 v1.1.0Unix

ACCESS CONTROL

1.6.1.3 Ensure SELinux policy is configured - 'SELINUXTYPE'CIS Ubuntu Linux 14.04 LTS Server L2 v2.1.0Unix

ACCESS CONTROL

1.6.1.3 Ensure SELinux policy is configured - 'SELINUXTYPE'CIS Ubuntu Linux 16.04 LTS Server L2 v1.1.0Unix

ACCESS CONTROL

1.6.1.6 Ensure no unconfined daemons existCIS SUSE Linux Enterprise Workstation 12 L2 v2.1.0Unix

ACCESS CONTROL

1.6.1.6 Ensure no unconfined daemons existCIS SUSE Linux Enterprise Server 12 L2 v2.1.0Unix

ACCESS CONTROL

1.6.2.1 Ensure SELinux is not disabled in bootloader configuration - enforcing=0CIS Distribution Independent Linux Workstation L2 v2.0.0Unix

ACCESS CONTROL

1.6.2.2 Ensure all AppArmor Profiles are enforcing - processes unconfinedCIS SUSE Linux Enterprise Server 12 L2 v2.1.0Unix

ACCESS CONTROL

1.6.2.2 Ensure all AppArmor Profiles are enforcing - processes unconfinedCIS SUSE Linux Enterprise Workstation 12 L2 v2.1.0Unix

ACCESS CONTROL

1.6.2.2 Ensure all AppArmor Profiles are enforcing - profiles loadedCIS SUSE Linux Enterprise Workstation 12 L2 v2.1.0Unix

ACCESS CONTROL

1.7.1.1 Ensure AppArmor is installedCIS Ubuntu Linux 18.04 LTS Workstation L1 v2.0.1Unix

ACCESS CONTROL

1.7.1.1 Ensure AppArmor is installedCIS Ubuntu Linux 18.04 LTS Server L1 v2.0.1Unix

ACCESS CONTROL

1.7.1.4 Ensure the SELinux mode is enforcing or permissive - configCIS Oracle Linux 7 Server L1 v3.0.0Unix

ACCESS CONTROL

2.2 Ensure IAM Policy for EC2 IAM Roles for App tier is configuredCIS Amazon Web Services Three-tier Web Architecture L1 1.0.0amazon_aws

ACCESS CONTROL

2.4.2 Restrict BIND Access with SELinux 'named_disable_trans'CIS ISC BIND 9.0/9.5 v2.0.0Unix

ACCESS CONTROL

2.4.2 Restrict BIND Access with SELinux 'SELINUX'CIS ISC BIND 9.0/9.5 v2.0.0Unix

ACCESS CONTROL

2.4.2 Restrict BIND Access with SELinux 'SELINUXTYPE'CIS ISC BIND 9.0/9.5 v2.0.0Unix

ACCESS CONTROL

2.220 - The operating system must enable the SELinux targeted policy.Tenable Fedora Linux Best Practices v2.0.0Unix

ACCESS CONTROL

2.900 - All system device files must be correctly labeled to prevent unauthorized modification - unlabeled_tTenable Fedora Linux Best Practices v2.0.0Unix

ACCESS CONTROL

3.4.3.8 Ensure nftables rules are permanentCIS Red Hat EL8 Server L1 v1.0.0Unix

ACCESS CONTROL

3.4.3.8 Ensure nftables rules are permanentCIS Red Hat EL8 Workstation L1 v1.0.0Unix

ACCESS CONTROL

4.5 Activate AppArmor - 'Profiles are loaded' - ReviewCIS Ubuntu 12.04 LTS Benchmark L2 v1.1.0Unix

ACCESS CONTROL

4.5 Activate AppArmor - GRUB_CMDLINE_LINUX - apparmor=1CIS Debian Linux 7 L2 v1.0.0Unix

ACCESS CONTROL

4.5 Activate AppArmor - GRUB_CMDLINE_LINUX - security=apparmorCIS Debian Linux 7 L2 v1.0.0Unix

ACCESS CONTROL

4.5 Activate AppArmor - profiles are loadedCIS Debian Linux 7 L2 v1.0.0Unix

ACCESS CONTROL

5.1 Verify AppArmorCIS Docker 1.11.0 v1.0.0 L2 DockerUnix

ACCESS CONTROL

5.1 Verify AppArmorCIS Docker 1.6 v1.0.0 L2 DockerUnix

ACCESS CONTROL

5.4 CIFS - 'cifs.gpo.enable = on'TNS NetApp Data ONTAP 7GNetApp

ACCESS CONTROL

5.5 NFS - 'nfs.v4.acl.enable = on'TNS NetApp Data ONTAP 7GNetApp

ACCESS CONTROL

12 - Restrict BIND Access with SELinux - named_disable_transBIND - TNS BIND Best Practices Audit v1.0.0Unix

ACCESS CONTROL

12 - Restrict BIND Access with SELinux - named_write_master_zonesBIND - TNS BIND Best Practices Audit v1.0.0Unix

ACCESS CONTROL

12 - Restrict BIND Access with SELinux - SELINUXBIND - TNS BIND Best Practices Audit v1.0.0Unix

ACCESS CONTROL

IBM i : Allow User Domain Objects (QALWUSRDMN) - '*ALL'IBM System i Security Reference for V7R3AS/400

ACCESS CONTROL

IBM i : Allow User Domain Objects (QALWUSRDMN) - '*ALL'IBM System i Security Reference for V7R2AS/400

ACCESS CONTROL

PCI 7.1 Limit access to system components and cardholder data to only those individuals whose job requires such access -SELINUXTYPE=targetedPCI DSS 2.0/3.0 - Red Hat LinuxUnix

ACCESS CONTROL

PCI 7.1 Limit access to system components and cardholder data to only those individuals whose job requires such access -sestatusPCI DSS 2.0/3.0 - Red Hat LinuxUnix

ACCESS CONTROL