1.1.3.17.9 Set 'User Account Control: Only elevate executables that are signed and validated' to 'Disabled' | CIS Windows 8 L1 v1.0.0 | Windows | SYSTEM AND INFORMATION INTEGRITY |
1.2.1 Ensure GPG keys are configured | CIS Oracle Linux 8 Server L1 v1.0.0 | Unix | SYSTEM AND INFORMATION INTEGRITY |
1.2.1 Ensure GPG keys are configured | CIS SUSE Linux Enterprise 15 Workstation L1 v1.0.0 | Unix | SYSTEM AND INFORMATION INTEGRITY |
1.2.1 Ensure GPG keys are configured | CIS Oracle Linux 8 Workstation L1 v1.0.0 | Unix | SYSTEM AND INFORMATION INTEGRITY |
1.2.2 Ensure GPG keys are configured | CIS SUSE Linux Enterprise Server 12 L1 v2.1.0 | Unix | SYSTEM AND INFORMATION INTEGRITY |
1.2.2 Ensure GPG keys are configured | CIS SUSE Linux Enterprise Workstation 12 L1 v2.1.0 | Unix | SYSTEM AND INFORMATION INTEGRITY |
1.2.2 Ensure GPG keys are configured | CIS Amazon Linux v2.1.0 L1 | Unix | SYSTEM AND INFORMATION INTEGRITY |
1.2.2 Ensure GPG keys are configured | CIS Oracle Linux 6 Workstation L1 v1.1.0 | Unix | SYSTEM AND INFORMATION INTEGRITY |
1.2.2 Ensure GPG keys are configured | CIS Ubuntu Linux 18.04 LTS Workstation L1 v2.0.1 | Unix | SYSTEM AND INFORMATION INTEGRITY |
1.2.2 Ensure GPG keys are configured | CIS Ubuntu Linux 14.04 LTS Server L1 v2.1.0 | Unix | SYSTEM AND INFORMATION INTEGRITY |
1.2.2 Ensure gpgcheck is globally activated | CIS Red Hat 6 Workstation L1 v2.1.0 | Unix | SYSTEM AND INFORMATION INTEGRITY |
1.2.3 Ensure GPG keys are configured | CIS Red Hat EL8 Workstation L1 v1.0.0 | Unix | SYSTEM AND INFORMATION INTEGRITY |
1.2.3 Ensure GPG keys are configured | CIS Red Hat EL8 Server L1 v1.0.0 | Unix | SYSTEM AND INFORMATION INTEGRITY |
1.2.3 Ensure gpgcheck is globally activated | CIS CentOS 6 Workstation L1 v2.1.0 | Unix | SYSTEM AND INFORMATION INTEGRITY |
1.2.3 Ensure gpgcheck is globally activated | CIS Amazon Linux v2.1.0 L1 | Unix | SYSTEM AND INFORMATION INTEGRITY |
1.2.4 Ensure gpgcheck is globally activated | CIS Red Hat EL8 Server L1 v1.0.0 | Unix | SYSTEM AND INFORMATION INTEGRITY |
1.2.4 Ensure gpgcheck is globally activated | CIS Red Hat EL8 Workstation L1 v1.0.0 | Unix | SYSTEM AND INFORMATION INTEGRITY |
1.2.4 Ensure software packages have been digitally signed by a Certificate Authority (CA) | CIS Amazon Linux 2 STIG v1.0.0 L3 | Unix | SYSTEM AND INFORMATION INTEGRITY |
2.3.31.1 Ensure 'Legacy format signatures' is set to 'Disabled' | CIS Microsoft Office Enterprise v1.1.0 L1 | Windows | SYSTEM AND INFORMATION INTEGRITY |
2.4 Do not use insecure registries | CIS Docker 1.11.0 v1.0.0 L1 Docker | Unix | SYSTEM AND INFORMATION INTEGRITY |
2.4 Do not use insecure registries | CIS Docker 1.12.0 v1.0.0 L1 Docker | Unix | SYSTEM AND INFORMATION INTEGRITY |
2.4 Do not use insecure registries | CIS Docker 1.13.0 v1.0.0 L1 Docker | Unix | SYSTEM AND INFORMATION INTEGRITY |
2.4 Ensure insecure registries are not used | CIS Docker Community Edition v1.1.0 L1 Docker | Unix | SYSTEM AND INFORMATION INTEGRITY |
2.5 Do not use insecure registries | CIS Docker 1.6 v1.0.0 L1 Docker | Unix | SYSTEM AND INFORMATION INTEGRITY |
2.5.6 - NFS - secure NFS - 'all entries in /etc/exports contain sec=' | CIS AIX 5.3/6.1 L2 v1.1.0 | Unix | SYSTEM AND INFORMATION INTEGRITY |
2.15.1 - TE - implementation (AIX 6.1 only) - 'TE is enabled' | CIS AIX 5.3/6.1 L2 v1.1.0 | Unix | SYSTEM AND INFORMATION INTEGRITY |
2.15.1 - TE - implementation (AIX 6.1 only) - 'TEP is enabled' | CIS AIX 5.3/6.1 L2 v1.1.0 | Unix | SYSTEM AND INFORMATION INTEGRITY |
2.29.2 Ensure 'Legacy Format Signatures' is set to Disabled | CIS Microsoft Office 2013 v1.1.0 | Windows | SYSTEM AND INFORMATION INTEGRITY |
2.29.2 Ensure 'Legacy Format Signatures' is set to Disabled | CIS Microsoft Office 2016 v1.1.0 | Windows | SYSTEM AND INFORMATION INTEGRITY |
2.050 - The system must prevent the install of software, patches, service packs, device drivers, or OS components without verification. | Tenable Fedora Linux Best Practices v2.0.0 | Unix | SYSTEM AND INFORMATION INTEGRITY |
2.060 - The system must prevent the install of software, patches, service packs, device drivers, or OS components without verification. | Tenable Fedora Linux Best Practices v2.0.0 | Unix | SYSTEM AND INFORMATION INTEGRITY |
4.5 Enable Content trust for Docker | CIS Docker 1.12.0 v1.0.0 L2 Docker | Unix | SYSTEM AND INFORMATION INTEGRITY |
4.5 Enable Content trust for Docker | CIS Docker 1.13.0 v1.0.0 L2 Docker | Unix | SYSTEM AND INFORMATION INTEGRITY |
4.5 Enable Content trust for Docker | CIS Docker 1.11.0 v1.0.0 L2 Docker | Unix | SYSTEM AND INFORMATION INTEGRITY |
4.5 Ensure Content trust for Docker is Enabled | CIS Docker Community Edition v1.1.0 L2 Docker | Unix | SYSTEM AND INFORMATION INTEGRITY |
4.5 Ensure Content trust for Docker is Enabled | CIS Docker v1.2.0 L2 Docker Linux | Unix | SYSTEM AND INFORMATION INTEGRITY |
Check for signatures on downloaded programs | MSCT Windows 10 v1709 v1.0.0 | Windows | SYSTEM AND INFORMATION INTEGRITY |
Check for signatures on downloaded programs | MSCT Windows 10 1607 v1.0.0 | Windows | SYSTEM AND INFORMATION INTEGRITY |
Check for signatures on downloaded programs | MSCT Windows 10 v1511 v1.0.0 | Windows | SYSTEM AND INFORMATION INTEGRITY |
Check for signatures on downloaded programs | MSCT Windows 10 v1703 v1.0.0 | Windows | SYSTEM AND INFORMATION INTEGRITY |
DTOO297 - A form that is digitally signed must be displayed with a warning. | DISA STIG Office 2010 InfoPath v1r5 | Windows | SYSTEM AND INFORMATION INTEGRITY |
Ensure GPG keys are configured - apt-key list | Tenable Cisco Firepower Management Center OS Best Practices Audit | Unix | SYSTEM AND INFORMATION INTEGRITY |
FireEye - Boot image must be signed | TNS FireEye | FireEye | SYSTEM AND INFORMATION INTEGRITY |
IBM i : Verify Object on Restore (QVFYOBJRST) - '3' | IBM iSeries Security Reference v5r4 | AS/400 | SYSTEM AND INFORMATION INTEGRITY |
IBM i : Verify Object on Restore (QVFYOBJRST) - '3' | IBM System i Security Reference for V7R3 | AS/400 | SYSTEM AND INFORMATION INTEGRITY |
IBM i : Verify Object on Restore (QVFYOBJRST) - '3' | IBM System i Security Reference for V7R1 and V6R1 | AS/400 | SYSTEM AND INFORMATION INTEGRITY |
IBM i : Verify Object on Restore (QVFYOBJRST) - '3' | IBM System i Security Reference for V7R2 | AS/400 | SYSTEM AND INFORMATION INTEGRITY |
PCI 2.2.4 - Verify that common security parameter settings are included - NFS - 'all entries in /etc/exports contain sec=' | PCI DSS 2.0/3.0 - AIX | Unix | SYSTEM AND INFORMATION INTEGRITY |
System settings: Use Certificate Rules on Windows Executables for Software Restriction Policies | MSCT Windows Server 2012 R2 MS v1.0.0 | Windows | SYSTEM AND INFORMATION INTEGRITY |
System settings: Use Certificate Rules on Windows Executables for Software Restriction Policies | MSCT Windows Server 2012 R2 DC v1.0.0 | Windows | SYSTEM AND INFORMATION INTEGRITY |