1.6.1.1 Ensure SELinux is enabled in the bootloader configuration - selinux = 1 | CIS Debian 9 Workstation L2 v1.0.1 | Unix | ACCESS CONTROL |
1.6.1.1 Ensure SELinux is not disabled in bootloader configuration - selinux | CIS Aliyun Linux 2 L2 v1.0.0 | Unix | ACCESS CONTROL |
1.6.1.2 Ensure AppArmor is enabled in the bootloader configuration - security | CIS Ubuntu Linux 16.04 LTS Server L1 v2.0.0 | Unix | ACCESS CONTROL |
1.6.1.2 Ensure the SELinux state is enforcing - /etc/selinux/config | CIS Debian 9 Workstation L2 v1.0.1 | Unix | ACCESS CONTROL |
1.6.1.2 Ensure the SELinux state is enforcing - sestatus | CIS Aliyun Linux 2 L2 v1.0.0 | Unix | ACCESS CONTROL |
1.6.1.3 Ensure SELinux policy is configured - sestatus | CIS Aliyun Linux 2 L2 v1.0.0 | Unix | ACCESS CONTROL |
1.6.1.4 Ensure all AppArmor Profiles are enforcing - complain | CIS Ubuntu Linux 16.04 LTS Server L2 v2.0.0 | Unix | ACCESS CONTROL |
1.6.1.4 Ensure all AppArmor Profiles are enforcing - complain | CIS Ubuntu Linux 16.04 LTS Workstation L2 v2.0.0 | Unix | ACCESS CONTROL |
1.6.1.4 Ensure all AppArmor Profiles are enforcing - loaded | CIS Ubuntu Linux 16.04 LTS Workstation L2 v2.0.0 | Unix | ACCESS CONTROL |
1.6.1.4 Ensure all AppArmor Profiles are enforcing - unconfined | CIS Ubuntu Linux 16.04 LTS Workstation L2 v2.0.0 | Unix | ACCESS CONTROL |
1.6.1.4 Ensure the SELinux mode is enforcing or permissive - getenforce | CIS CentOS 6 Server L1 v3.0.0 | Unix | ACCESS CONTROL |
1.6.1.4 Ensure the SELinux mode is enforcing or permissive - getenforce | CIS CentOS 6 Workstation L1 v3.0.0 | Unix | ACCESS CONTROL |
1.6.1.4 Ensure the SELinux mode is enforcing or permissive - getenforce | CIS Oracle Linux 6 Server L1 v2.0.0 | Unix | ACCESS CONTROL |
1.6.1.5 Ensure the SELinux mode is enforcing - config | CIS CentOS 6 Server L2 v3.0.0 | Unix | ACCESS CONTROL |
1.6.1.5 Ensure the SELinux mode is enforcing - config | CIS CentOS 6 Workstation L2 v3.0.0 | Unix | ACCESS CONTROL |
1.6.2.1 Ensure AppArmor is enabled in the bootloader configuration - apparmor=1 | CIS Debian 9 Workstation L2 v1.0.1 | Unix | ACCESS CONTROL |
1.6.2.1 Ensure AppArmor is enabled in the bootloader configuration - security=apparmor | CIS Debian 9 Server L2 v1.0.1 | Unix | ACCESS CONTROL |
1.6.2.2 Ensure all AppArmor Profiles are enforcing - complain mode | CIS Debian 9 Server L2 v1.0.1 | Unix | ACCESS CONTROL |
1.6.3 Ensure SELinux or AppArmor are installed | CIS Debian 9 Workstation L2 v1.0.1 | Unix | ACCESS CONTROL |
1.7.1.1 Ensure AppArmor is installed | CIS Debian Family Server L1 v1.0.0 | Unix | ACCESS CONTROL |
1.7.1.1 Ensure SELinux is installed | CIS Fedora 19 Family Linux Workstation L1 v1.0.0 | Unix | ACCESS CONTROL |
1.7.1.2 Ensure AppArmor is enabled in the bootloader configuration - security=apparmor | CIS Debian Family Server L1 v1.0.0 | Unix | ACCESS CONTROL |
1.7.1.2 Ensure SELinux is not disabled in bootloader configuration - selinux | CIS Fedora 19 Family Linux Workstation L1 v1.0.0 | Unix | ACCESS CONTROL |
1.7.1.3 Ensure SELinux policy is configured - sestatus | CIS Fedora 19 Family Linux Server L1 v1.0.0 | Unix | ACCESS CONTROL |
1.7.1.4 Ensure all AppArmor Profiles are enforcing - 0 processes are unconfined | CIS Debian Family Server L2 v1.0.0 | Unix | ACCESS CONTROL |
1.7.1.4 Ensure all AppArmor Profiles are enforcing - complain mode | CIS Debian Family Server L2 v1.0.0 | Unix | ACCESS CONTROL |
1.7.1.4 Ensure the SELinux mode is enforcing or permissive - getenforce | CIS Fedora 19 Family Linux Server L1 v1.0.0 | Unix | ACCESS CONTROL |
4.4 Ensure logrotate assigns appropriate permissions | CIS Debian Family Server L1 v1.0.0 | Unix | ACCESS CONTROL |
5.1.4 Ensure permissions on /etc/cron.daily are configured | CIS Fedora 19 Family Linux Workstation L1 v1.0.0 | Unix | ACCESS CONTROL |
5.1.9 Ensure at is restricted to authorized users - '/etc/at.allow' | CIS Ubuntu Linux 16.04 LTS Server L1 v2.0.0 | Unix | ACCESS CONTROL |
5.2.1 Ensure permissions on /etc/ssh/sshd_config are configured | CIS Fedora 19 Family Linux Workstation L1 v1.0.0 | Unix | ACCESS CONTROL |
5.2.2 Ensure permissions on SSH private host key files are configured | CIS Fedora 19 Family Linux Workstation L1 v1.0.0 | Unix | ACCESS CONTROL |
5.2.3 Ensure permissions on SSH public host key files are configured | CIS Ubuntu Linux 18.04 LXD Host L1 Server v1.0.0 | Unix | ACCESS CONTROL |
5.3.1 Ensure permissions on /etc/ssh/sshd_config are configured | CIS Ubuntu Linux 16.04 LTS Server L1 v2.0.0 | Unix | ACCESS CONTROL |
5.4.4 Ensure default user umask is 027 or more restrictive - /etc/login.defs | CIS Debian Family Server L1 v1.0.0 | Unix | ACCESS CONTROL |
5.5.3 Ensure default group for the root account is GID 0 | CIS Ubuntu Linux 16.04 LTS Workstation L1 v2.0.0 | Unix | ACCESS CONTROL |
6.1.1 Audit system file permissions | CIS Debian Family Workstation L2 v1.0.0 | Unix | ACCESS CONTROL |
6.1.3 Ensure permissions on /etc/shadow are configured | CIS Fedora 19 Family Linux Server L1 v1.0.0 | Unix | ACCESS CONTROL |
6.1.5 Ensure permissions on /etc/gshadow are configured | CIS Fedora 19 Family Linux Workstation L1 v1.0.0 | Unix | ACCESS CONTROL |
6.1.6 Ensure permissions on /etc/passwd- are configured | CIS Fedora 19 Family Linux Server L1 v1.0.0 | Unix | ACCESS CONTROL |
6.2.6 Ensure users' home directories permissions are 750 or more restrictive | CIS Fedora 19 Family Linux Server L1 v1.0.0 | Unix | ACCESS CONTROL |
6.2.7 Ensure users own their home directories | CIS Fedora 19 Family Linux Server L1 v1.0.0 | Unix | ACCESS CONTROL |
6.2.11 Ensure users' .netrc Files are not group or world accessible | CIS Fedora 19 Family Linux Workstation L1 v1.0.0 | Unix | ACCESS CONTROL |
6.2.17 Ensure shadow group is empty | CIS Debian Family Workstation L1 v1.0.0 | Unix | ACCESS CONTROL |
6.2.20 Ensure shadow group is empty - /etc/group | CIS CentOS 6 Workstation L1 v3.0.0 | Unix | ACCESS CONTROL |
6.2.20 Ensure shadow group is empty - /etc/passwd | CIS CentOS 6 Workstation L1 v3.0.0 | Unix | ACCESS CONTROL |
7.6 Ensure directory in logging.properties is a secure location - check log directory location | CIS Apache Tomcat 8 L1 v1.1.0 | Unix | ACCESS CONTROL |
7.6 Ensure directory in logging.properties is a secure location - check prefix application name | CIS Apache Tomcat 8 L1 v1.1.0 Middleware | Unix | ACCESS CONTROL |
7.6 Ensure directory in logging.properties is a secure location - check prefix application name | CIS Apache Tomcat 9 L1 v1.2.0 Middleware | Unix | ACCESS CONTROL |
18.10.3.1 Ensure 'Allow a Windows app to share application data between users' is set to 'Disabled' | CIS Microsoft Windows Server 2016 STIG v3.0.0 L2 MS | Windows | ACCESS CONTROL |