1.3.6 Ensure the customer lockbox feature is enabled | CIS Microsoft 365 Foundations E5 L2 v3.1.0 | microsoft_azure | ACCESS CONTROL |
1.8 Ensure all Customer owned Amazon Machine Images for Application Tier are not shared publicly | CIS Amazon Web Services Three-tier Web Architecture L1 1.0.0 | amazon_aws | ACCESS CONTROL |
2.4 Verify the groups within the DB2_GRP_LOOKUP environment variable are appropriate (Windows only) | CIS IBM DB2 v10 v1.1.0 Windows OS Level 2 | Windows | ACCESS CONTROL |
2.5 Verify the domains within the DB2DOMAINLIST environment variable are appropriate (Windows only) | CIS IBM DB2 v10 v1.1.0 Windows OS Level 1 | Windows | ACCESS CONTROL |
2.17 Set Sticky Bit on All World-Writable Directories | CIS Debian Linux 7 L1 v1.0.0 | Unix | ACCESS CONTROL |
3.1 Configure 'Prevent deleting websites that the user has visited' | CIS IE 10 v1.1.0 | Windows | ACCESS CONTROL |
3.2 Configure 'Prevent Deleting Temporary Internet Files' | CIS IE 9 v1.0.0 | Windows | ACCESS CONTROL |
3.5 Configure 'Prevent Deleting Temporary Internet Files' | CIS IE 10 v1.1.0 | Windows | ACCESS CONTROL |
3.5 Configure 'Prevent Deleting Temporary Internet Files' | CIS IE 11 v1.0.0 | Windows | ACCESS CONTROL |
3.11 Block non-privileged mountd requests | CIS FreeBSD v1.0.5 | Unix | ACCESS CONTROL |
4.1 Ensure a SNS topic is created for sending out notifications from Cloudtwatch Alarms and Auto-Scaling Groups - List SNS Subscriptions | CIS Amazon Web Services Three-tier Web Architecture L1 1.0.0 | amazon_aws | ACCESS CONTROL |
4.2 Ensure a SNS topic is created for sending out notifications from RDS events - List SNS Subscriptions | CIS Amazon Web Services Three-tier Web Architecture L1 1.0.0 | amazon_aws | ACCESS CONTROL |
5.1.2.3 Ensure 'Restrict non-admin users from creating tenants' is set to 'Yes' | CIS Microsoft 365 Foundations E3 L1 v3.1.0 | microsoft_azure | ACCESS CONTROL |
5.2.1 Ensure that the cluster has at least one active policy control mechanism in place | CIS Kubernetes v1.10.0 L1 Master | Unix | ACCESS CONTROL |
5.2.1 Ensure that the cluster has at least one active policy control mechanism in place | CIS Kubernetes v1.24 Benchmark v1.0.0 L1 Master | Unix | ACCESS CONTROL |
5.2.5 Ensure re-authentication for privilege escalation is not disabled globally | CIS Ubuntu Linux 24.04 LTS v1.0.0 L1 Workstation | Unix | ACCESS CONTROL |
5.4 Set 'Disable changing certificate settings' to 'Enabled' | CIS IE 9 v1.0.0 | Windows | ACCESS CONTROL |
6.4 Restrict Access to SYSCAT.COLAUTH | CIS IBM DB2 v10 v1.1.0 Database Level 1 | IBM_DB2DB | ACCESS CONTROL |
6.4.2 Do Not Allow Trusted Context to Switch Users Without Authentication | CIS IBM DB2 11 v1.1.0 Database Level 1 | IBM_DB2DB | ACCESS CONTROL |
6.5 Restrict Access to SYSCAT.EVENTS | CIS IBM DB2 9 Benchmark v3.0.1 Level 1 DB | IBM_DB2DB | ACCESS CONTROL |
6.7 Restrict Access to SYSCAT.ROUTINES | CIS IBM DB2 v10 v1.1.0 Database Level 1 | IBM_DB2DB | ACCESS CONTROL |
6.8 Restrict Access to SYSCAT.INDEXAUTH | CIS IBM DB2 v10 v1.1.0 Database Level 2 | IBM_DB2DB | ACCESS CONTROL |
6.8 Restrict Access to SYSCAT.INDEXAUTH | CIS IBM DB2 9 Benchmark v3.0.1 Level 2 DB | IBM_DB2DB | ACCESS CONTROL |
6.10 Restrict Access to SYSCAT.PACKAGES | CIS IBM DB2 v10 v1.1.0 Database Level 1 | IBM_DB2DB | ACCESS CONTROL |
6.11 Restrict Access to SYSCAT.PASSTHRUAUTH | CIS IBM DB2 v10 v1.1.0 Database Level 1 | IBM_DB2DB | ACCESS CONTROL |
6.11 Restrict Access to SYSCAT.PASSTHRUAUTH | CIS IBM DB2 9 Benchmark v3.0.1 Level 2 DB | IBM_DB2DB | ACCESS CONTROL |
6.15 Restrict Access to SYSCAT.ROLEAUTH | CIS IBM DB2 v10 v1.1.0 Database Level 2 | IBM_DB2DB | ACCESS CONTROL |
6.15 Restrict Access to SYSCAT.SECURITYLABELS | CIS IBM DB2 9 Benchmark v3.0.1 Level 1 DB | IBM_DB2DB | ACCESS CONTROL |
6.15 Restrict Access to SYSCAT.SECURITYLABELS | CIS IBM DB2 9 Benchmark v3.0.1 Level 2 DB | IBM_DB2DB | ACCESS CONTROL |
6.16 Restrict Access to SYSCAT.ROLES | CIS IBM DB2 v10 v1.1.0 Database Level 1 | IBM_DB2DB | ACCESS CONTROL |
6.17 Restrict Access to SYSCAT.ROUTINEAUTH | CIS IBM DB2 v10 v1.1.0 Database Level 1 | IBM_DB2DB | ACCESS CONTROL |
6.17 Restrict Access to SYSCAT.SECURITYPOLICYCOMPONENTRULES | CIS IBM DB2 9 Benchmark v3.0.1 Level 2 DB | IBM_DB2DB | ACCESS CONTROL |
6.19 Restrict Access to SYSCAT.SURROGATEAUTHIDS | CIS IBM DB2 9 Benchmark v3.0.1 Level 2 DB | IBM_DB2DB | ACCESS CONTROL |
6.20 Restrict Access to SYSCAT.ROLEAUTH | CIS IBM DB2 9 Benchmark v3.0.1 Level 1 DB | IBM_DB2DB | ACCESS CONTROL |
6.22 Restrict Access to SYSCAT.ROUTINEAUTH | CIS IBM DB2 9 Benchmark v3.0.1 Level 1 DB | IBM_DB2DB | ACCESS CONTROL |
6.22 Restrict Access to SYSCAT.TABAUTH | CIS IBM DB2 v10 v1.1.0 Database Level 1 | IBM_DB2DB | ACCESS CONTROL |
6.22 Restrict Access to SYSCAT.TABAUTH | CIS IBM DB2 v10 v1.1.0 Database Level 2 | IBM_DB2DB | ACCESS CONTROL |
6.23 Restrict Access to SYSCAT.SCHEMAAUTH | CIS IBM DB2 9 Benchmark v3.0.1 Level 1 DB | IBM_DB2DB | ACCESS CONTROL |
6.23 Restrict Access to SYSCAT.TBSPACEAUTH | CIS IBM DB2 v10 v1.1.0 Database Level 1 | IBM_DB2DB | ACCESS CONTROL |
6.24 Restrict Access to SYSCAT.SCHEMATA | CIS IBM DB2 9 Benchmark v3.0.1 Level 1 DB | IBM_DB2DB | ACCESS CONTROL |
6.25 Restrict Access to SYSCAT.MODULEAUTH | CIS IBM DB2 v10 v1.1.0 Database Level 2 | IBM_DB2DB | ACCESS CONTROL |
6.27 Restrict Access to SYSCAT.PROCEDURES | CIS IBM DB2 9 Benchmark v3.0.1 Level 2 DB | IBM_DB2DB | ACCESS CONTROL |
6.28 Restrict Access to SYSCAT.TABAUTH | CIS IBM DB2 9 Benchmark v3.0.1 Level 1 DB | IBM_DB2DB | ACCESS CONTROL |
6.30 Restrict Access to Tablespaces | CIS IBM DB2 9 Benchmark v3.0.1 Level 1 DB | IBM_DB2DB | ACCESS CONTROL |
6.31 Restrict Access to SYSCAT.MODULEAUTH | CIS IBM DB2 9 Benchmark v3.0.1 Level 1 DB | IBM_DB2DB | ACCESS CONTROL |
6.34 Restrict Access to SYSCAT.XSROBJECTAUTH | CIS IBM DB2 9 Benchmark v3.0.1 Level 2 DB | IBM_DB2DB | ACCESS CONTROL |
6.35 Restrict Access to SYSIBMADM.OBJECTOWNERS | CIS IBM DB2 9 Benchmark v3.0.1 Level 1 DB | IBM_DB2DB | ACCESS CONTROL |
8.3.33 Set 'Software channel permissions' to 'Enabled:High safety' | CIS IE 10 v1.1.0 | Windows | ACCESS CONTROL |
8.5.5 Ensure meeting chat does not allow anonymous users | CIS Microsoft 365 Foundations E3 L2 v3.1.0 | microsoft_azure | ACCESS CONTROL |
8.5.7 Ensure external participants can't give or request control | CIS Microsoft 365 Foundations E3 L1 v3.1.0 | microsoft_azure | ACCESS CONTROL |