Item Search

NameAudit NamePluginCategory
1. OpenStack Compute - Policy.json - 'os_compute_api:os-cells:delete'TNS OpenStack Nova/Compute Security GuideUnix

ACCESS CONTROL

1.3.2 Ensure sudo commands use ptyCIS Oracle Linux 7 Workstation L1 v3.0.0Unix

ACCESS CONTROL

1.3.2 Ensure sudo commands use ptyCIS Red Hat EL8 Server L1 v1.0.0Unix

ACCESS CONTROL

1.3.2 Ensure sudo commands use ptyCIS Red Hat EL8 Workstation L1 v1.0.0Unix

ACCESS CONTROL

1.3.2 Ensure sudo commands use ptyCIS Ubuntu Linux 18.04 LTS Server L1 v2.0.1Unix

ACCESS CONTROL

1.6.1.3 Ensure SELinux policy is configuredCIS CentOS 6 Server L2 v2.1.0Unix

ACCESS CONTROL

1.6.2.1 Ensure SELinux is not disabled in bootloader configuration - selinux=0CIS Distribution Independent Linux Server L2 v2.0.0Unix

ACCESS CONTROL

1.7.1.3 Ensure SELinux policy is configuredCIS Oracle Linux 7 Server L1 v3.0.0Unix

ACCESS CONTROL

1.7.1.3 Ensure SELinux policy is configuredCIS Oracle Linux 7 Workstation L1 v3.0.0Unix

ACCESS CONTROL

1.7.1.4 Ensure the SELinux mode is enforcing or permissiveCIS Oracle Linux 7 Server L1 v3.0.0Unix

ACCESS CONTROL

1.7.1.4 Ensure the SELinux mode is enforcing or permissive - configCIS Oracle Linux 7 Workstation L1 v3.0.0Unix

ACCESS CONTROL

1.350 - Users must re-authenticate for privilege escalation.Tenable Fedora Linux Best Practices v2.0.0Unix

ACCESS CONTROL

2.3 Ensure an IAM Role for Amazon EC2 is created for Web TierCIS Amazon Web Services Three-tier Web Architecture L1 1.0.0amazon_aws

ACCESS CONTROL

2.3.4 Restrict Sudo Users to being able to Access Only Required CommandsCIS Apple OSX 10.5 Leopard L2 v1.0.0Unix

ACCESS CONTROL

2.4.2 Restrict BIND Access with SELinux 'named_write_master_zones'CIS ISC BIND 9.0/9.5 v2.0.0Unix

ACCESS CONTROL

2.5 Ensure AutoScaling Group Launch Configuration for Web Tier is configured to use a customer created Web-Tier IAM RoleCIS Amazon Web Services Three-tier Web Architecture L1 1.0.0amazon_aws

ACCESS CONTROL

2.220 - The operating system must enable the SELinux targeted policy.Tenable Fedora Linux Best Practices v2.0.0Unix

ACCESS CONTROL

3.2 Set Daemon umaskCIS Red Hat Enterprise Linux 5 L1 v2.2Unix

ACCESS CONTROL

5.2 Verify SELinux security options, if applicable (Scored)CIS Docker 1.6 v1.0.0 L2 DockerUnix

ACCESS CONTROL

5.4 CIFS - 'cifs.gpo.enable = on'TNS NetApp Data ONTAP 7GNetApp

ACCESS CONTROL

5.4 Use a separate timestamp for each user/tty comboCIS Apple macOS 10.12 L1 v1.1.0Unix

ACCESS CONTROL

6. OpenStack Networking - Policy.json - 'get_port:binding:host_id'TNS OpenStack Neutron/Networking Security GuideUnix

ACCESS CONTROL

6.4 Ensure system device files are labeled - device_tCIS Amazon Linux 2 STIG v1.0.0 L3Unix

ACCESS CONTROL

12 - Restrict BIND Access with SELinux - named_write_master_zonesBIND - TNS BIND Best Practices Audit v1.0.0Unix

ACCESS CONTROL

12 - Restrict BIND Access with SELinux - SELINUXBIND - TNS BIND Best Practices Audit v1.0.0Unix

ACCESS CONTROL

18 - Role Based Authentication per queueTNS Best Practice JBoss 7 LinuxUnix

ACCESS CONTROL

48. OpenStack Networking - Policy.json - 'get_firewall_policy'TNS OpenStack Neutron/Networking Security GuideUnix

ACCESS CONTROL

51. OpenStack Networking - Policy.json - 'update_subnet'TNS OpenStack Neutron/Networking Security GuideUnix

ACCESS CONTROL

59. OpenStack Networking - Policy.json - 'create_port:mac_learning_enabled'TNS OpenStack Neutron/Networking Security GuideUnix

ACCESS CONTROL

66. OpenStack Networking - Policy.json - 'create_subnetpool:shared'TNS OpenStack Neutron/Networking Security GuideUnix

ACCESS CONTROL

76. OpenStack Networking - Policy.json - 'update_floatingip'TNS OpenStack Neutron/Networking Security GuideUnix

ACCESS CONTROL

83. OpenStack Networking - Policy.json - 'create_firewall:shared'TNS OpenStack Neutron/Networking Security GuideUnix

ACCESS CONTROL

84. OpenStack Networking - Policy.json - 'shared_firewall_policies'TNS OpenStack Neutron/Networking Security GuideUnix

ACCESS CONTROL

87. OpenStack Networking - Policy.json - 'update_port:allowed_address_pairs'TNS OpenStack Neutron/Networking Security GuideUnix

ACCESS CONTROL

88. OpenStack Networking - Policy.json - 'delete_firewall_policy'TNS OpenStack Neutron/Networking Security GuideUnix

ACCESS CONTROL

93. OpenStack Networking - Policy.json - 'create_router:ha'TNS OpenStack Neutron/Networking Security GuideUnix

ACCESS CONTROL

100. OpenStack Compute - Policy.json - 'compute_extension:admin_actions:migrate'TNS OpenStack Nova/Compute Security GuideUnix

ACCESS CONTROL

107. OpenStack Compute - Policy.json - 'os_compute_api:os-networks-associate'TNS OpenStack Nova/Compute Security GuideUnix

ACCESS CONTROL

113. OpenStack Compute - Policy.json - 'os_compute_api:os-quota-sets:update'TNS OpenStack Nova/Compute Security GuideUnix

ACCESS CONTROL

115. OpenStack Compute - Policy.json - 'compute_extension:admin_actions:resetNetwork'TNS OpenStack Nova/Compute Security GuideUnix

ACCESS CONTROL

119. OpenStack Compute - Policy.json - 'compute_extension:admin_actions:unpause'TNS OpenStack Nova/Compute Security GuideUnix

ACCESS CONTROL

123. OpenStack Compute - Policy.json - 'compute_extension:admin_actions:pause'TNS OpenStack Nova/Compute Security GuideUnix

ACCESS CONTROL

124. OpenStack Compute - Policy.json - 'os_compute_api:os-fixed-ips'TNS OpenStack Nova/Compute Security GuideUnix

ACCESS CONTROL

129. OpenStack Compute - Policy.json - 'compute_extension:simple_tenant_usage:show'TNS OpenStack Nova/Compute Security GuideUnix

ACCESS CONTROL

IBM i : Allow User Domain Objects (QALWUSRDMN) - '*ALL'IBM System i Security Reference for V7R1 and V6R1AS/400

ACCESS CONTROL

PCI 2.2.4 Verify common security parameter settings - System default umask settingPCI DSS 2.0/3.0 - Red Hat LinuxUnix

ACCESS CONTROL

PCI 2.2.4 Verify common security parameter settings - System default umask setting - 'UMASK set to 077 in /etc/default/login'PCI DSS 2.0/3.0 - Solaris 10Unix

ACCESS CONTROL

PCI 2.2.4 Verify common security parameter settings - System default umask setting - 'umask set to 077 in /etc/profile'PCI DSS 2.0/3.0 - Solaris 10Unix

ACCESS CONTROL

PCI 7.1.2 - Assignment of privileges is based on job classification and function - 'lskst -t auth info'PCI DSS 2.0/3.0 - AIXUnix

ACCESS CONTROL

PCI 7.1.2 - Assignment of privileges is based on job classification and function - 'lskst -t cmd info'PCI DSS 2.0/3.0 - AIXUnix

ACCESS CONTROL