Item Search

NameAudit NamePluginCategory
1.1 Ensure that Corporate Login Credentials are UsedCIS Google Cloud Platform Foundation v4.0.0 L1GCP

ACCESS CONTROL

1.1.3.7 Ensure require encryption for 3rd party endpoints (SIP/H.323) is set to enabledCIS Zoom L1 v1.0.0Zoom

CONFIGURATION MANAGEMENT

1.2.9 Ensure IP address access control is set to organization approved rangesCIS Zoom L2 v1.0.0Zoom

CONFIGURATION MANAGEMENT

1.3 Ensure that Security Key Enforcement is Enabled for All Admin AccountsCIS Google Cloud Platform Foundation v4.0.0 L2GCP

IDENTIFICATION AND AUTHENTICATION

1.6 Ensure That IAM Users Are Not Assigned the Service Account User or Service Account Token Creator Roles at Project LevelCIS Google Cloud Platform Foundation v4.0.0 L1GCP

ACCESS CONTROL, MEDIA PROTECTION

1.8 Ensure That Separation of Duties Is Enforced While Assigning Service Account Related Roles to UsersCIS Google Cloud Platform Foundation v4.0.0 L2GCP

ACCESS CONTROL, MEDIA PROTECTION

1.12 Ensure API Keys Only Exist for Active ServicesCIS Google Cloud Platform Foundation v4.0.0 L2GCP

PLANNING, SYSTEM AND SERVICES ACQUISITION

1.13 Ensure API Keys Are Restricted To Use by Only Specified Hosts and AppsCIS Google Cloud Platform Foundation v4.0.0 L2GCP

PLANNING, SYSTEM AND SERVICES ACQUISITION

1.14 Ensure API Keys Are Restricted to Only APIs That Application Needs AccessCIS Google Cloud Platform Foundation v4.0.0 L2GCP

PLANNING, SYSTEM AND SERVICES ACQUISITION

1.15 Ensure API Keys Are Rotated Every 90 DaysCIS Google Cloud Platform Foundation v4.0.0 L2GCP

PLANNING, SYSTEM AND SERVICES ACQUISITION

2.1.1.2 Audit iCloud DriveCIS Apple macOS 13.0 Ventura v3.1.0 L2Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

2.1.1.2 Audit iCloud DriveCIS Apple macOS 14.0 Sonoma v2.1.0 L2Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

2.1.1.2 Audit iCloud DriveCIS Apple macOS 15.0 Sequoia v1.1.0 L2Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

2.3.22.2 Ensure 'Block signing into Office' is set to 'Enabled: Org ID only'CIS Microsoft Office Enterprise v1.2.0 L1Windows

ACCESS CONTROL

2.6.1 iCloud configurationCIS Apple macOS 10.13 L2 v1.1.0Unix

ACCESS CONTROL

2.7 Ensure That the Log Metric Filter and Alerts Exist for VPC Network Firewall Rule ChangesCIS Google Cloud Platform Foundation v4.0.0 L2GCP

AUDIT AND ACCOUNTABILITY

2.8 Ensure That the Log Metric Filter and Alerts Exist for VPC Network Route ChangesCIS Google Cloud Platform Foundation v4.0.0 L2GCP

AUDIT AND ACCOUNTABILITY

2.11 Ensure That the Log Metric Filter and Alerts Exist for SQL Instance Configuration ChangesCIS Google Cloud Platform Foundation v4.0.0 L2GCP

AUDIT AND ACCOUNTABILITY

2.15 Ensure 'Access Approval' is 'Enabled'CIS Google Cloud Platform Foundation v4.0.0 L2GCP

ACCESS CONTROL, MEDIA PROTECTION

3.4 Ensure That RSASHA1 Is Not Used for the Key-Signing Key in Cloud DNS DNSSECCIS Google Cloud Platform Foundation v4.0.0 L1GCP

ACCESS CONTROL, CONFIGURATION MANAGEMENT

3.8 Ensure that On-Premise SharePoint servers is configured without OneDrive redirection linkages.CIS Microsoft SharePoint 2019 OS v1.0.0Windows

CONFIGURATION MANAGEMENT

3.8 Ensure that On-Premise SharePoint servers is configured without OneDrive redirection linkages.CIS Microsoft SharePoint 2016 OS v1.1.0Windows

CONFIGURATION MANAGEMENT

3.8 Ensure that VPC Flow Logs is Enabled for Every Subnet in a VPC NetworkCIS Google Cloud Platform Foundation v4.0.0 L2GCP

AUDIT AND ACCOUNTABILITY, SYSTEM AND INFORMATION INTEGRITY

3.9 Ensure No HTTPS or SSL Proxy Load Balancers Permit SSL Policies With Weak Cipher SuitesCIS Google Cloud Platform Foundation v4.0.0 L1GCP

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

3.10 Use Identity Aware Proxy (IAP) to Ensure Only Traffic From Google IP Addresses are 'Allowed'CIS Google Cloud Platform Foundation v4.0.0 L2GCP

ACCESS CONTROL

4.3 Ensure "Block Project-Wide SSH Keys" Is Enabled for VM InstancesCIS Google Cloud Platform Foundation v4.0.0 L1GCP

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

4.4 Ensure Oslogin Is Enabled for a ProjectCIS Google Cloud Platform Foundation v4.0.0 L1GCP

ACCESS CONTROL

4.8 Ensure Compute Instances Are Launched With Shielded VM EnabledCIS Google Cloud Platform Foundation v4.0.0 L2GCP

CONFIGURATION MANAGEMENT

4.9 Ensure That Compute Instances Do Not Have Public IP AddressesCIS Google Cloud Platform Foundation v4.0.0 L2GCP

ACCESS CONTROL, MEDIA PROTECTION

4.11 Ensure That Compute Instances Have Confidential Computing EnabledCIS Google Cloud Platform Foundation v4.0.0 L2GCP

IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

6.2.4 Ensure 'Log_statement' Database Flag for Cloud SQL PostgreSQL Instance Is Set AppropriatelyCIS Google Cloud Platform Foundation v4.0.0 L2GCP

AUDIT AND ACCOUNTABILITY

6.2.8 Ensure That 'cloudsql.enable_pgaudit' Database Flag for each Cloud Sql Postgresql Instance Is Set to 'on' For Centralized LoggingCIS Google Cloud Platform Foundation v4.0.0 L1GCP

AUDIT AND ACCOUNTABILITY

6.3.1 Ensure 'external scripts enabled' Database Flag for Cloud SQL SQL Server Instance Is Set to 'off'CIS Google Cloud Platform Foundation v4.0.0 L1GCP

CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY

6.3.2 Ensure 'cross db ownership chaining' Database Flag for Cloud SQL SQL Server Instance Is Set to 'off'CIS Google Cloud Platform Foundation v4.0.0 L1GCP

ACCESS CONTROL, MEDIA PROTECTION

6.3.3 Ensure 'user Connections' Database Flag for Cloud SQL SQL Server Instance Is Set to a Non-limiting ValueCIS Google Cloud Platform Foundation v4.0.0 L1GCP

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

7.1 Ensure That BigQuery Datasets Are Not Anonymously or Publicly AccessibleCIS Google Cloud Platform Foundation v4.0.0 L1GCP

ACCESS CONTROL, MEDIA PROTECTION

7.2 Ensure That All BigQuery Tables Are Encrypted With Customer-Managed Encryption Key (CMEK)CIS Google Cloud Platform Foundation v4.0.0 L2GCP

IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

7.4 Ensure all data in BigQuery has been classifiedCIS Google Cloud Platform Foundation v4.0.0 L2GCP

AUDIT AND ACCOUNTABILITY, RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

9.1.13 Ensure 'Additional email addresses' is Configured with a Security Contact EmailCIS Microsoft Azure Foundations v4.0.0 L1microsoft_azure

INCIDENT RESPONSE

18.9.47.4.1 Ensure 'Configure local setting override for reporting to Microsoft MAPS' is set to 'Disabled'CIS Azure Compute Microsoft Windows Server 2022 v1.0.0 L1 DCWindows

CONFIGURATION MANAGEMENT

18.9.52.2 Ensure 'Prevent the usage of OneDrive for file storage on Windows 8.1' is set to 'Enabled'CIS Microsoft Windows 8.1 v2.4.1 L1Windows

ACCESS CONTROL

18.10.41.1 (L2) Ensure 'Allow Message Service Cloud Sync' is set to 'Disabled'CIS Microsoft Windows Server 2022 v4.0.0 L2 MSWindows

CONFIGURATION MANAGEMENT

18.10.41.1 (L2) Ensure 'Allow Message Service Cloud Sync' is set to 'Disabled'CIS Microsoft Windows Server 2022 Stand-alone v1.0.0 L2 MSWindows

CONFIGURATION MANAGEMENT

18.10.41.1 (L2) Ensure 'Allow Message Service Cloud Sync' is set to 'Disabled'CIS Microsoft Windows Server 2019 v4.0.0 L2 MSWindows

CONFIGURATION MANAGEMENT

22.31 (L2) Ensure 'Remote Encryption Protection Aggressiveness' is set to 'Medium' or higherCIS Microsoft Intune for Windows 10 v4.0.0 L2Windows

SYSTEM AND INFORMATION INTEGRITY

AIOS-13-004300 - Apple iOS/iPadOS must not allow backup to remote systems (iCloud Keychain).AirWatch - DISA Apple iOS/iPadOS 13 v2r1MDM

CONFIGURATION MANAGEMENT

AIOS-15-007400 - Apple iOS/iPadOS 15 allowlist must be configured to not include applications with the following characteristics: - back up MD data to non-DoD cloud servers (including user and application access to cloud backup services);- transmit MD diagnostic data to non-DoD servers; - allows synchronization of data or applications between devices associated with user; and - allows unencrypted (or encrypted but not FIPS 140-2 validated) data sharing with other MDs or printers.MobileIron - DISA Apple iOS/iPadOS 14 v1r4MDM

CONFIGURATION MANAGEMENT

AOSX-14-002049 - The macOS system must disable Cloud Document Sync.DISA STIG Apple Mac OSX 10.14 v2r6Unix

CONFIGURATION MANAGEMENT

WN10-CC-000390 - Windows 10 should be configured to prevent users from receiving suggestions for third-party or additional applications.DISA Microsoft Windows 10 STIG v3r4Windows

CONFIGURATION MANAGEMENT

WN11-CC-000390 - Windows 11 must be configured to prevent users from receiving suggestions for third-party or additional applications.DISA Microsoft Windows 11 STIG v2r4Windows

CONFIGURATION MANAGEMENT