1. OpenStack Compute - Policy.json - 'os_compute_api:os-cells:delete' | TNS OpenStack Nova/Compute Security Guide | Unix | ACCESS CONTROL |
1.3.2 Ensure sudo commands use pty | CIS Oracle Linux 7 Workstation L1 v3.0.0 | Unix | ACCESS CONTROL |
1.3.2 Ensure sudo commands use pty | CIS Red Hat EL8 Server L1 v1.0.0 | Unix | ACCESS CONTROL |
1.3.2 Ensure sudo commands use pty | CIS Red Hat EL8 Workstation L1 v1.0.0 | Unix | ACCESS CONTROL |
1.3.2 Ensure sudo commands use pty | CIS Ubuntu Linux 18.04 LTS Server L1 v2.0.1 | Unix | ACCESS CONTROL |
1.6.1.3 Ensure SELinux policy is configured | CIS CentOS 6 Server L2 v2.1.0 | Unix | ACCESS CONTROL |
1.6.2.1 Ensure SELinux is not disabled in bootloader configuration - selinux=0 | CIS Distribution Independent Linux Server L2 v2.0.0 | Unix | ACCESS CONTROL |
1.7.1.3 Ensure SELinux policy is configured | CIS Oracle Linux 7 Server L1 v3.0.0 | Unix | ACCESS CONTROL |
1.7.1.3 Ensure SELinux policy is configured | CIS Oracle Linux 7 Workstation L1 v3.0.0 | Unix | ACCESS CONTROL |
1.7.1.4 Ensure the SELinux mode is enforcing or permissive | CIS Oracle Linux 7 Server L1 v3.0.0 | Unix | ACCESS CONTROL |
1.7.1.4 Ensure the SELinux mode is enforcing or permissive - config | CIS Oracle Linux 7 Workstation L1 v3.0.0 | Unix | ACCESS CONTROL |
1.350 - Users must re-authenticate for privilege escalation. | Tenable Fedora Linux Best Practices v2.0.0 | Unix | ACCESS CONTROL |
2.3 Ensure an IAM Role for Amazon EC2 is created for Web Tier | CIS Amazon Web Services Three-tier Web Architecture L1 1.0.0 | amazon_aws | ACCESS CONTROL |
2.3.4 Restrict Sudo Users to being able to Access Only Required Commands | CIS Apple OSX 10.5 Leopard L2 v1.0.0 | Unix | ACCESS CONTROL |
2.4.2 Restrict BIND Access with SELinux 'named_write_master_zones' | CIS ISC BIND 9.0/9.5 v2.0.0 | Unix | ACCESS CONTROL |
2.5 Ensure AutoScaling Group Launch Configuration for Web Tier is configured to use a customer created Web-Tier IAM Role | CIS Amazon Web Services Three-tier Web Architecture L1 1.0.0 | amazon_aws | ACCESS CONTROL |
2.220 - The operating system must enable the SELinux targeted policy. | Tenable Fedora Linux Best Practices v2.0.0 | Unix | ACCESS CONTROL |
3.2 Set Daemon umask | CIS Red Hat Enterprise Linux 5 L1 v2.2 | Unix | ACCESS CONTROL |
5.2 Verify SELinux security options, if applicable (Scored) | CIS Docker 1.6 v1.0.0 L2 Docker | Unix | ACCESS CONTROL |
5.4 CIFS - 'cifs.gpo.enable = on' | TNS NetApp Data ONTAP 7G | NetApp | ACCESS CONTROL |
5.4 Use a separate timestamp for each user/tty combo | CIS Apple macOS 10.12 L1 v1.1.0 | Unix | ACCESS CONTROL |
6. OpenStack Networking - Policy.json - 'get_port:binding:host_id' | TNS OpenStack Neutron/Networking Security Guide | Unix | ACCESS CONTROL |
6.4 Ensure system device files are labeled - device_t | CIS Amazon Linux 2 STIG v1.0.0 L3 | Unix | ACCESS CONTROL |
12 - Restrict BIND Access with SELinux - named_write_master_zones | BIND - TNS BIND Best Practices Audit v1.0.0 | Unix | ACCESS CONTROL |
12 - Restrict BIND Access with SELinux - SELINUX | BIND - TNS BIND Best Practices Audit v1.0.0 | Unix | ACCESS CONTROL |
18 - Role Based Authentication per queue | TNS Best Practice JBoss 7 Linux | Unix | ACCESS CONTROL |
48. OpenStack Networking - Policy.json - 'get_firewall_policy' | TNS OpenStack Neutron/Networking Security Guide | Unix | ACCESS CONTROL |
51. OpenStack Networking - Policy.json - 'update_subnet' | TNS OpenStack Neutron/Networking Security Guide | Unix | ACCESS CONTROL |
59. OpenStack Networking - Policy.json - 'create_port:mac_learning_enabled' | TNS OpenStack Neutron/Networking Security Guide | Unix | ACCESS CONTROL |
66. OpenStack Networking - Policy.json - 'create_subnetpool:shared' | TNS OpenStack Neutron/Networking Security Guide | Unix | ACCESS CONTROL |
76. OpenStack Networking - Policy.json - 'update_floatingip' | TNS OpenStack Neutron/Networking Security Guide | Unix | ACCESS CONTROL |
83. OpenStack Networking - Policy.json - 'create_firewall:shared' | TNS OpenStack Neutron/Networking Security Guide | Unix | ACCESS CONTROL |
84. OpenStack Networking - Policy.json - 'shared_firewall_policies' | TNS OpenStack Neutron/Networking Security Guide | Unix | ACCESS CONTROL |
87. OpenStack Networking - Policy.json - 'update_port:allowed_address_pairs' | TNS OpenStack Neutron/Networking Security Guide | Unix | ACCESS CONTROL |
88. OpenStack Networking - Policy.json - 'delete_firewall_policy' | TNS OpenStack Neutron/Networking Security Guide | Unix | ACCESS CONTROL |
93. OpenStack Networking - Policy.json - 'create_router:ha' | TNS OpenStack Neutron/Networking Security Guide | Unix | ACCESS CONTROL |
100. OpenStack Compute - Policy.json - 'compute_extension:admin_actions:migrate' | TNS OpenStack Nova/Compute Security Guide | Unix | ACCESS CONTROL |
107. OpenStack Compute - Policy.json - 'os_compute_api:os-networks-associate' | TNS OpenStack Nova/Compute Security Guide | Unix | ACCESS CONTROL |
113. OpenStack Compute - Policy.json - 'os_compute_api:os-quota-sets:update' | TNS OpenStack Nova/Compute Security Guide | Unix | ACCESS CONTROL |
115. OpenStack Compute - Policy.json - 'compute_extension:admin_actions:resetNetwork' | TNS OpenStack Nova/Compute Security Guide | Unix | ACCESS CONTROL |
119. OpenStack Compute - Policy.json - 'compute_extension:admin_actions:unpause' | TNS OpenStack Nova/Compute Security Guide | Unix | ACCESS CONTROL |
123. OpenStack Compute - Policy.json - 'compute_extension:admin_actions:pause' | TNS OpenStack Nova/Compute Security Guide | Unix | ACCESS CONTROL |
124. OpenStack Compute - Policy.json - 'os_compute_api:os-fixed-ips' | TNS OpenStack Nova/Compute Security Guide | Unix | ACCESS CONTROL |
129. OpenStack Compute - Policy.json - 'compute_extension:simple_tenant_usage:show' | TNS OpenStack Nova/Compute Security Guide | Unix | ACCESS CONTROL |
IBM i : Allow User Domain Objects (QALWUSRDMN) - '*ALL' | IBM System i Security Reference for V7R1 and V6R1 | AS/400 | ACCESS CONTROL |
PCI 2.2.4 Verify common security parameter settings - System default umask setting | PCI DSS 2.0/3.0 - Red Hat Linux | Unix | ACCESS CONTROL |
PCI 2.2.4 Verify common security parameter settings - System default umask setting - 'UMASK set to 077 in /etc/default/login' | PCI DSS 2.0/3.0 - Solaris 10 | Unix | ACCESS CONTROL |
PCI 2.2.4 Verify common security parameter settings - System default umask setting - 'umask set to 077 in /etc/profile' | PCI DSS 2.0/3.0 - Solaris 10 | Unix | ACCESS CONTROL |
PCI 7.1.2 - Assignment of privileges is based on job classification and function - 'lskst -t auth info' | PCI DSS 2.0/3.0 - AIX | Unix | ACCESS CONTROL |
PCI 7.1.2 - Assignment of privileges is based on job classification and function - 'lskst -t cmd info' | PCI DSS 2.0/3.0 - AIX | Unix | ACCESS CONTROL |