Item Search

NameAudit NamePluginCategory
1.5 Ensure Interactive Login is DisabledCIS MariaDB 10.6 on Linux L2 v1.1.0Unix

ACCESS CONTROL

1.8.2 Set username secret for all local usersCIS Cisco IOS XR 7.x v1.0.0 L1Cisco

ACCESS CONTROL

3.5 Ensure that the /etc/docker directory ownership is set to root:rootCIS Docker v1.6.0 L2 Docker LinuxUnix

ACCESS CONTROL

3.5 Ensure the SQL Server's MSSQL Service Account is Not an AdministratorCIS SQL Server 2017 Database L1 AWS RDS v1.3.0MS_SQLDB

ACCESS CONTROL

3.5 Ensure the SQL Server's MSSQL Service Account is Not an AdministratorCIS SQL Server 2017 Database L1 OS v1.3.0Windows

ACCESS CONTROL

3.6.1.2 OpenSSH - PermitRootLoginCIS IBM AIX 7.1 L2 v2.1.0Unix

ACCESS CONTROL

3.7 Ensure the SQL Server's Full-Text Service Account is Not an AdministratorCIS SQL Server 2019 Database L1 OS v1.3.0Windows

ACCESS CONTROL

3.9 Ensure that TLS CA certificate file ownership is set to root:rootCIS Docker v1.6.0 L2 Docker LinuxUnix

ACCESS CONTROL

3.12 Ensure the 'SYSADMIN' Role is Limited to Administrative or Built-in AccountsCIS SQL Server 2022 Database L1 DB v1.1.0MS_SQLDB

ACCESS CONTROL

3.22 Ensure that the /etc/sysconfig/docker file ownership is set to root:rootCIS Docker v1.6.0 L2 Docker LinuxUnix

ACCESS CONTROL

4.1 Ensure Interactive Login is DisabledCIS PostgreSQL 13 OS v1.2.0Unix

ACCESS CONTROL

4.1 Ensure Interactive Login is DisabledCIS PostgreSQL 14 OS v 1.2.0Unix

ACCESS CONTROL

4.3.4 Ensure users must provide password for escalationCIS AlmaLinux OS 8 Server L2 v3.0.0Unix

ACCESS CONTROL

4.3.4 Ensure users must provide password for escalationCIS AlmaLinux OS 8 Workstation L2 v3.0.0Unix

ACCESS CONTROL

5.1.10 Ensure SSH root login is disabledCIS Google Container-Optimized OS L1 Server v1.1.0Unix

ACCESS CONTROL

5.1.18 Ensure SSH access is limitedCIS Google Container-Optimized OS L2 Server v1.1.0Unix

ACCESS CONTROL

5.1.20 Ensure sshd PermitRootLogin is disabledCIS Debian Linux 11 v2.0.0 L1 ServerUnix

ACCESS CONTROL

5.2 Ensure 'FILE' is Not Granted to Non-Administrative UsersCIS MariaDB 10.6 Database L1 v1.1.0MySQLDB

ACCESS CONTROL

5.2.2 Ensure sudo commands use ptyCIS Debian Linux 12 v1.0.1 L1 WorkstationUnix

ACCESS CONTROL

5.2.4 Ensure users must provide password for privilege escalationCIS Debian Linux 12 v1.0.1 L2 WorkstationUnix

ACCESS CONTROL

5.2.7 Ensure SSH root login is disabledCIS CentOS Linux 8 Workstation L1 v2.0.0Unix

ACCESS CONTROL

5.3.1 Ensure sudo is installedCIS Fedora 28 Family Linux Server L1 v2.0.0Unix

ACCESS CONTROL

5.3.2 Ensure sudo commands use ptyCIS CentOS Linux 8 Server L1 v2.0.0Unix

ACCESS CONTROL

5.3.4 Ensure users must provide password for escalationCIS Fedora 28 Family Linux Server L2 v2.0.0Unix

ACCESS CONTROL

5.3.4 Ensure users must provide password for escalationCIS CentOS Linux 8 Server L2 v2.0.0Unix

ACCESS CONTROL

5.4 Ensure root login is restricted to system consoleCIS Google Container-Optimized OS L1 Server v1.1.0Unix

ACCESS CONTROL

5.6 Ensure the "root" Account Is DisabledCIS Apple macOS 13.0 Ventura v2.1.0 L1Unix

ACCESS CONTROL

5.24 Ensure that docker exec commands are not used with the user=root optionCIS Docker v1.6.0 L2 Docker LinuxUnix

ACCESS CONTROL

6.3.1 Privilege escalation: sudoCIS IBM AIX 7.2 L2 v1.1.0Unix

ACCESS CONTROL

6.4 Adding authorized users in at.allowCIS IBM AIX 7.2 L1 v1.1.0Unix

ACCESS CONTROL

6.6 Adding authorized users in cron.allowCIS IBM AIX 7.2 L1 v1.1.0Unix

ACCESS CONTROL

9.3 Ensure 'super_priv' is Not Set to 'Y' for Replication UsersCIS MariaDB 10.6 Database L1 v1.1.0MySQLDB

ACCESS CONTROL

10.3 Restrict manager applicationCIS Apache Tomcat 7 L2 v1.1.0Unix

ACCESS CONTROL

10.3 Restrict manager applicationCIS Apache Tomcat 7 L2 v1.1.0 MiddlewareUnix

ACCESS CONTROL

10.3 Restrict manager applicationCIS Apache Tomcat 10 L2 v1.1.0 MiddlewareUnix

ACCESS CONTROL

10.3 Restrict manager applicationCIS Apache Tomcat 9 L2 v1.2.0 MiddlewareUnix

ACCESS CONTROL

10.13 Do not run applications as privilegedCIS Apache Tomcat 9 L1 v1.2.0 MiddlewareUnix

ACCESS CONTROL

10.17 Setting Security Lifecycle Listener - check for config componentCIS Apache Tomcat 9 L1 v1.2.0Unix

ACCESS CONTROL

10.17 Setting Security Lifecycle Listener - check for umask present in startupCIS Apache Tomcat 10 L1 v1.1.0Unix

ACCESS CONTROL

10.17 Setting Security Lifecycle Listener - check for umask uncommented in startupCIS Apache Tomcat 9 L1 v1.2.0 MiddlewareUnix

ACCESS CONTROL

18.10.81.2 (L1) Ensure 'Always install with elevated privileges' is set to 'Disabled'CIS Windows Server 2012 R2 DC L1 v3.0.0Windows

ACCESS CONTROL

19.7.40.1 (L1) Ensure 'Always install with elevated privileges' is set to 'Disabled'CIS Windows Server 2012 R2 DC L1 v3.0.0Windows

ACCESS CONTROL

19.7.43.1 (L1) Ensure 'Always install with elevated privileges' is set to 'Disabled'CIS Microsoft Windows Server 2008 Domain Controller Level 1 v3.3.1Windows

ACCESS CONTROL

Monterey - Require Administrator Password to Modify System-Wide PreferencesNIST macOS Monterey v1.0.0 - All ProfilesUnix

ACCESS CONTROL

Monterey - Require Administrator Password to Modify System-Wide PreferencesNIST macOS Monterey v1.0.0 - 800-53r5 HighUnix

ACCESS CONTROL

Monterey - Require Administrator Password to Modify System-Wide PreferencesNIST macOS Monterey v1.0.0 - CNSSI 1253Unix

ACCESS CONTROL

Monterey - Require Administrator Password to Modify System-Wide PreferencesNIST macOS Monterey v1.0.0 - 800-53r4 ModerateUnix

ACCESS CONTROL

Monterey - Require Administrator Password to Modify System-Wide PreferencesNIST macOS Monterey v1.0.0 - 800-53r5 ModerateUnix

ACCESS CONTROL

Monterey - Require Administrator Password to Modify System-Wide PreferencesNIST macOS Monterey v1.0.0 - 800-171Unix

ACCESS CONTROL

Monterey - Require Administrator Password to Modify System-Wide PreferencesNIST macOS Monterey v1.0.0 - 800-53r4 HighUnix

ACCESS CONTROL