1.4.2.1 Ensure 'TACACS+/RADIUS' is configured correctly - server | CIS Cisco Firewall v8.x L1 v4.2.0 | Cisco | ACCESS CONTROL |
1.4.3.1 Ensure 'aaa authentication enable console' is configured correctly | CIS Cisco Firewall v8.x L1 v4.2.0 | Cisco | ACCESS CONTROL |
1.4.3.1 Ensure 'aaa authentication enable console' is configured correctly | CIS Cisco Firewall ASA 9 L1 v4.1.0 | Cisco | ACCESS CONTROL |
1.4.3.1 Ensure 'aaa authentication enable console' is configured correctly | CIS Cisco ASA 9.x Firewall L1 v1.0.0 | Cisco | ACCESS CONTROL |
1.4.3.2 Ensure 'aaa authentication http console' is configured correctly | CIS Cisco Firewall v8.x L1 v4.2.0 | Cisco | ACCESS CONTROL |
1.4.3.2 Ensure 'aaa authentication http console' is configured correctly | CIS Cisco Firewall ASA 9 L1 v4.1.0 | Cisco | ACCESS CONTROL |
1.4.3.2 Ensure 'aaa authentication http console' is configured correctly | CIS Cisco ASA 9.x Firewall L1 v1.0.0 | Cisco | ACCESS CONTROL |
1.4.3.3 Ensure 'aaa authentication secure-http-client' is configured correctly | CIS Cisco Firewall ASA 9 L1 v4.1.0 | Cisco | ACCESS CONTROL |
1.4.3.4 Ensure 'aaa authentication serial console' is configured correctly | CIS Cisco Firewall v8.x L1 v4.2.0 | Cisco | ACCESS CONTROL |
1.4.3.4 Ensure 'aaa authentication serial console' is configured correctly | CIS Cisco ASA 9.x Firewall L1 v1.0.0 | Cisco | ACCESS CONTROL |
1.4.4.1 Ensure 'aaa command authorization' is configured correctly | CIS Cisco Firewall v8.x L1 v4.2.0 | Cisco | ACCESS CONTROL |
1.4.4.1 Ensure 'aaa command authorization' is configured correctly | CIS Cisco Firewall ASA 9 L1 v4.1.0 | Cisco | ACCESS CONTROL |
1.4.4.1 Ensure 'aaa command authorization' is configured correctly | CIS Cisco ASA 9.x Firewall L1 v1.0.0 | Cisco | ACCESS CONTROL |
1.4.4.2 Ensure 'aaa authorization exec' is configured correctly | CIS Cisco Firewall ASA 9 L1 v4.1.0 | Cisco | ACCESS CONTROL |
2.2.5 Ensure 'Add workstations to domain' is set to 'Administrators' (DC only) | CIS Microsoft Windows Server 2008 Domain Controller Level 1 v3.3.0 | Windows | ACCESS CONTROL |
2.2.5 Ensure 'Add workstations to domain' is set to 'Administrators' (DC only) | CIS Azure Compute Microsoft Windows Server 2022 v1.0.0 L1 DC | Windows | ACCESS CONTROL |
2.2.8 Ensure 'Allow log on through Remote Desktop Services' is set to 'Administrators' (DC only) | CIS Microsoft Windows Server 2008 Domain Controller Level 1 v3.3.0 | Windows | ACCESS CONTROL |
2.2.9 Ensure 'Allow log on through Remote Desktop Services' is set to 'Administrators, Remote Desktop Users' (MS only) | CIS Microsoft Windows Server 2008 Member Server Level 1 v3.3.1 | Windows | ACCESS CONTROL |
2.2.9 Ensure 'Allow log on through Remote Desktop Services' is set to 'Administrators, Remote Desktop Users' (MS only) | CIS Microsoft Windows Server 2008 Member Server Level 1 v3.3.0 | Windows | ACCESS CONTROL |
2.3.17.1 Ensure 'User Account Control: Admin Approval Mode for the Built-in Administrator account' is set to 'Enabled' | CIS Azure Compute Microsoft Windows Server 2022 v1.0.0 L1 DC | Windows | ACCESS CONTROL |
2.3.17.1 Ensure 'User Account Control: Admin Approval Mode for the Built-in Administrator account' is set to 'Enabled' | CIS Azure Compute Microsoft Windows Server 2022 v1.0.0 L1 MS | Windows | ACCESS CONTROL |
2.4 Do Not Reuse Usernames | CIS MariaDB 10.6 Database L1 v1.1.0 | MySQLDB | ACCESS CONTROL |
2.4 Do Not Reuse Usernames | CIS MySQL 5.7 Community Database L1 v2.0.0 | MySQLDB | ACCESS CONTROL |
2.4 Do Not Reuse Usernames | CIS MySQL 5.6 Enterprise Database L1 v2.0.0 | MySQLDB | ACCESS CONTROL |
2.4 Do Not Reuse Usernames | CIS MySQL 5.6 Community Database L1 v2.0.0 | MySQLDB | ACCESS CONTROL |
2.4 Do Not Reuse Usernames | CIS MySQL 5.7 Enterprise Database L1 v2.0.0 | MySQLDB | ACCESS CONTROL |
2.5 Do Not Reuse Usernames | CIS MySQL 8.0 Enterprise Database L1 v1.3.0 | MySQLDB | ACCESS CONTROL |
2.5 Do Not Reuse Usernames | CIS MySQL 8.0 Community Database L1 v1.0.0 | MySQLDB | ACCESS CONTROL |
3.3 Ensure that MongoDB is run using a non-privileged, dedicated service account | CIS MongoDB 4 L1 OS Windows v1.0.0 | Windows | ACCESS CONTROL |
3.3 Ensure that MongoDB is run using a non-privileged, dedicated service account | CIS MongoDB 4 L1 OS Linux v1.0.0 | Unix | ACCESS CONTROL |
3.3 Ensure that MongoDB is run using a non-privileged, dedicated service account | CIS MongoDB 6 L1 OS Linux v1.1.0 | Unix | ACCESS CONTROL |
3.3 Ensure that MongoDB is run using a non-privileged, dedicated service account | CIS MongoDB 7 L1 OS Windows v1.0.0 | Windows | ACCESS CONTROL |
3.3 Ensure that MongoDB is run using a non-privileged, dedicated service account | CIS MongoDB 5 L1 OS Windows v1.2.0 | Windows | ACCESS CONTROL |
3.3 Ensure that MongoDB is run using a non-privileged, dedicated service account | CIS MongoDB 5 L1 OS Linux v1.2.0 | Unix | ACCESS CONTROL |
3.3 Ensure that MongoDB is run using a non-privileged, dedicated service account | CIS MongoDB 6 L1 OS Windows v1.1.0 | Windows | ACCESS CONTROL |
3.3 Ensure that MongoDB is run using a non-privileged, dedicated service account | CIS MongoDB 7 L1 OS Linux v1.0.0 | Unix | ACCESS CONTROL |
5.2.1 Ensure GKE clusters are not running using the Compute Engine default service account | CIS Google Kubernetes Engine (GKE) v1.5.0 L1 | GCP | IDENTIFICATION AND AUTHENTICATION |
5.2.2 Prefer using dedicated GCP Service Accounts and Workload Identity | CIS Google Kubernetes Engine (GKE) v1.5.0 L1 | GCP | IDENTIFICATION AND AUTHENTICATION |
5.3.5 Ensure SSH access is limited | CIS Oracle Linux 6 Workstation L1 v2.0.0 | Unix | ACCESS CONTROL |
5.3.5 Ensure SSH access is limited | CIS CentOS 6 Server L1 v3.0.0 | Unix | ACCESS CONTROL |
5.3.5 Ensure SSH access is limited | CIS Ubuntu Linux 16.04 LTS Workstation L1 v2.0.0 | Unix | ACCESS CONTROL |
5.3.5 Ensure SSH access is limited | CIS Ubuntu Linux 16.04 LTS Server L1 v2.0.0 | Unix | ACCESS CONTROL |
5.3.11 Ensure SSH root login is disabled | CIS Ubuntu Linux 16.04 LTS Server L1 v2.0.0 | Unix | ACCESS CONTROL |
5.5 Ensure root login is restricted to system console | CIS Aliyun Linux 2 L1 v1.0.0 | Unix | ACCESS CONTROL |
5.5.2 Ensure system accounts are secured - non-login shell | CIS CentOS 6 Server L1 v3.0.0 | Unix | ACCESS CONTROL |
5.5.2 Ensure system accounts are secured - non-login shell | CIS Oracle Linux 6 Workstation L1 v2.0.0 | Unix | ACCESS CONTROL |
5.5.2 Ensure system accounts are secured - non-login shell | CIS CentOS 6 Workstation L1 v3.0.0 | Unix | ACCESS CONTROL |
5.5.2 Ensure system accounts are secured - unlocked non-root | CIS Oracle Linux 6 Workstation L1 v2.0.0 | Unix | ACCESS CONTROL |
5.5.2 Ensure system accounts are secured - unlocked non-root | CIS CentOS 6 Workstation L1 v3.0.0 | Unix | ACCESS CONTROL |
CIS Control 4 (4.3) Ensure the Use of Dedicated Administrative Accounts | CAS Implementation Group 1 Audit File | Unix | ACCESS CONTROL |