Item Search

NameAudit NamePluginCategory
1.1 Ensure packages are obtained from authorized repositoriesCIS PostgreSQL 11 OS v1.0.0Unix

CONFIGURATION MANAGEMENT

1.1 Ensure packages are obtained from authorized repositoriesCIS PostgreSQL 13 OS v1.1.0Unix

CONFIGURATION MANAGEMENT, MAINTENANCE

1.1 Ensure packages are obtained from authorized repositoriesCIS PostgreSQL 14 OS v1.1.0Unix

CONFIGURATION MANAGEMENT, MAINTENANCE

1.1 Ensure packages are obtained from authorized repositoriesCIS PostgreSQL 12 OS v1.1.0Unix

CONFIGURATION MANAGEMENT, MAINTENANCE

1.1 Ensure packages are obtained from authorized repositoriesCIS PostgreSQL 16 OS v1.0.0Unix

CONFIGURATION MANAGEMENT, MAINTENANCE

1.1 Ensure packages are obtained from authorized repositoriesCIS PostgreSQL 15 OS v1.1.0Unix

CONFIGURATION MANAGEMENT, MAINTENANCE

1.2 Ensure Installation of Binary PackagesCIS PostgreSQL 11 OS v1.0.0Unix

CONFIGURATION MANAGEMENT

1.3 Ensure Apache Is Installed From the Appropriate BinariesCIS Apache HTTP Server 2.4 L1 v2.1.0Unix

CONFIGURATION MANAGEMENT

1.3 Ensure Apache Is Installed From the Appropriate BinariesCIS Apache HTTP Server 2.4 L1 v2.1.0 MiddlewareUnix

CONFIGURATION MANAGEMENT

1.3 Ensure Apache Is Installed From the Appropriate BinariesCIS Apache HTTP Server 2.2 L1 v3.6.0 MiddlewareUnix

CONFIGURATION MANAGEMENT

1.3 Ensure Apache Is Installed From the Appropriate BinariesCIS Apache HTTP Server 2.2 L1 v3.6.0Unix

CONFIGURATION MANAGEMENT

1.3 Ensure Apache Is Installed From the Appropriate BinariesCIS Apache HTTP Server 2.2 L2 v3.6.0Unix

CONFIGURATION MANAGEMENT

1.5 Installing ISC BIND 9 - bind9 installationCIS BIND DNS v1.0.0 L1 Caching Only Name ServerUnix

CONFIGURATION MANAGEMENT

1.5 Installing ISC BIND 9 - bind9 installationCIS BIND DNS v1.0.0 L1 Authoritative Name ServerUnix

CONFIGURATION MANAGEMENT

1.5 Installing ISC BIND 9 - named locationCIS BIND DNS v1.0.0 L1 Authoritative Name ServerUnix

CONFIGURATION MANAGEMENT

1.5 Installing ISC BIND 9 - named locationCIS BIND DNS v1.0.0 L1 Caching Only Name ServerUnix

CONFIGURATION MANAGEMENT

2.2 Scan for TROJAN aka Untrusted/Unauthorized Applications (Implement Allowlist)CIS IBM AIX 7.2 L1 v1.0.0Unix

CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY

3.7 Audit Software InventoryCIS Apple macOS 10.14 v2.0.0 L2Unix

CONFIGURATION MANAGEMENT, MAINTENANCE

3.7 Audit Software InventoryCIS Apple macOS 12.0 Monterey v3.0.0 L2Unix

CONFIGURATION MANAGEMENT, MAINTENANCE

3.7 Audit Software InventoryCIS Apple macOS 10.15 Catalina v3.0.0 L2Unix

CONFIGURATION MANAGEMENT, MAINTENANCE

3.7 Audit Software InventoryCIS Apple macOS 10.15 v2.1.0 L2Unix

CONFIGURATION MANAGEMENT, MAINTENANCE

3.7 Audit Software InventoryCIS Apple macOS 14.0 Sonoma v1.0.0 L2Unix

CONFIGURATION MANAGEMENT, MAINTENANCE

3.7 Audit Software InventoryCIS Apple macOS 13.0 Ventura v2.0.0 L2Unix

CONFIGURATION MANAGEMENT, MAINTENANCE

3.7 Audit Software InventoryCIS Apple macOS 11.0 Big Sur v4.0.0 L2Unix

CONFIGURATION MANAGEMENT, MAINTENANCE

7.5 Ensure that Only Approved Extensions Are InstalledCIS Microsoft Azure Foundations v2.0.0 L1microsoft_azure

CONFIGURATION MANAGEMENT, MAINTENANCE

CIS Control 2 (2.1(a)) Maintain and Inventory of Authorized SoftwareCAS Implementation Group 1 Audit FileUnix

CONFIGURATION MANAGEMENT

CIS Control 2 (2.1(b)) Maintain and Inventory of Authorized SoftwareCAS Implementation Group 1 Audit FileUnix

CONFIGURATION MANAGEMENT