Item Search

NameAudit NamePluginCategory
1.3.6 Ensure the customer lockbox feature is enabledCIS Microsoft 365 Foundations E5 L2 v3.1.0microsoft_azure

ACCESS CONTROL

1.8 Ensure all Customer owned Amazon Machine Images for Application Tier are not shared publiclyCIS Amazon Web Services Three-tier Web Architecture L1 1.0.0amazon_aws

ACCESS CONTROL

2.4 Verify the groups within the DB2_GRP_LOOKUP environment variable are appropriate (Windows only)CIS IBM DB2 v10 v1.1.0 Windows OS Level 2Windows

ACCESS CONTROL

2.5 Verify the domains within the DB2DOMAINLIST environment variable are appropriate (Windows only)CIS IBM DB2 v10 v1.1.0 Windows OS Level 1Windows

ACCESS CONTROL

2.17 Set Sticky Bit on All World-Writable DirectoriesCIS Debian Linux 7 L1 v1.0.0Unix

ACCESS CONTROL

3.1 Configure 'Prevent deleting websites that the user has visited'CIS IE 10 v1.1.0Windows

ACCESS CONTROL

3.2 Configure 'Prevent Deleting Temporary Internet Files'CIS IE 9 v1.0.0Windows

ACCESS CONTROL

3.5 Configure 'Prevent Deleting Temporary Internet Files'CIS IE 10 v1.1.0Windows

ACCESS CONTROL

3.5 Configure 'Prevent Deleting Temporary Internet Files'CIS IE 11 v1.0.0Windows

ACCESS CONTROL

3.11 Block non-privileged mountd requestsCIS FreeBSD v1.0.5Unix

ACCESS CONTROL

4.1 Ensure a SNS topic is created for sending out notifications from Cloudtwatch Alarms and Auto-Scaling Groups - List SNS SubscriptionsCIS Amazon Web Services Three-tier Web Architecture L1 1.0.0amazon_aws

ACCESS CONTROL

4.2 Ensure a SNS topic is created for sending out notifications from RDS events - List SNS SubscriptionsCIS Amazon Web Services Three-tier Web Architecture L1 1.0.0amazon_aws

ACCESS CONTROL

5.1.2.3 Ensure 'Restrict non-admin users from creating tenants' is set to 'Yes'CIS Microsoft 365 Foundations E3 L1 v3.1.0microsoft_azure

ACCESS CONTROL

5.2.1 Ensure that the cluster has at least one active policy control mechanism in placeCIS Kubernetes v1.10.0 L1 MasterUnix

ACCESS CONTROL

5.2.1 Ensure that the cluster has at least one active policy control mechanism in placeCIS Kubernetes v1.24 Benchmark v1.0.0 L1 MasterUnix

ACCESS CONTROL

5.2.5 Ensure re-authentication for privilege escalation is not disabled globallyCIS Ubuntu Linux 24.04 LTS v1.0.0 L1 WorkstationUnix

ACCESS CONTROL

5.4 Set 'Disable changing certificate settings' to 'Enabled'CIS IE 9 v1.0.0Windows

ACCESS CONTROL

6.4 Restrict Access to SYSCAT.COLAUTHCIS IBM DB2 v10 v1.1.0 Database Level 1IBM_DB2DB

ACCESS CONTROL

6.4.2 Do Not Allow Trusted Context to Switch Users Without AuthenticationCIS IBM DB2 11 v1.1.0 Database Level 1IBM_DB2DB

ACCESS CONTROL

6.5 Restrict Access to SYSCAT.EVENTSCIS IBM DB2 9 Benchmark v3.0.1 Level 1 DBIBM_DB2DB

ACCESS CONTROL

6.7 Restrict Access to SYSCAT.ROUTINESCIS IBM DB2 v10 v1.1.0 Database Level 1IBM_DB2DB

ACCESS CONTROL

6.8 Restrict Access to SYSCAT.INDEXAUTHCIS IBM DB2 v10 v1.1.0 Database Level 2IBM_DB2DB

ACCESS CONTROL

6.8 Restrict Access to SYSCAT.INDEXAUTHCIS IBM DB2 9 Benchmark v3.0.1 Level 2 DBIBM_DB2DB

ACCESS CONTROL

6.10 Restrict Access to SYSCAT.PACKAGESCIS IBM DB2 v10 v1.1.0 Database Level 1IBM_DB2DB

ACCESS CONTROL

6.11 Restrict Access to SYSCAT.PASSTHRUAUTHCIS IBM DB2 v10 v1.1.0 Database Level 1IBM_DB2DB

ACCESS CONTROL

6.11 Restrict Access to SYSCAT.PASSTHRUAUTHCIS IBM DB2 9 Benchmark v3.0.1 Level 2 DBIBM_DB2DB

ACCESS CONTROL

6.15 Restrict Access to SYSCAT.ROLEAUTHCIS IBM DB2 v10 v1.1.0 Database Level 2IBM_DB2DB

ACCESS CONTROL

6.15 Restrict Access to SYSCAT.SECURITYLABELSCIS IBM DB2 9 Benchmark v3.0.1 Level 1 DBIBM_DB2DB

ACCESS CONTROL

6.15 Restrict Access to SYSCAT.SECURITYLABELSCIS IBM DB2 9 Benchmark v3.0.1 Level 2 DBIBM_DB2DB

ACCESS CONTROL

6.16 Restrict Access to SYSCAT.ROLESCIS IBM DB2 v10 v1.1.0 Database Level 1IBM_DB2DB

ACCESS CONTROL

6.17 Restrict Access to SYSCAT.ROUTINEAUTHCIS IBM DB2 v10 v1.1.0 Database Level 1IBM_DB2DB

ACCESS CONTROL

6.17 Restrict Access to SYSCAT.SECURITYPOLICYCOMPONENTRULESCIS IBM DB2 9 Benchmark v3.0.1 Level 2 DBIBM_DB2DB

ACCESS CONTROL

6.19 Restrict Access to SYSCAT.SURROGATEAUTHIDSCIS IBM DB2 9 Benchmark v3.0.1 Level 2 DBIBM_DB2DB

ACCESS CONTROL

6.20 Restrict Access to SYSCAT.ROLEAUTHCIS IBM DB2 9 Benchmark v3.0.1 Level 1 DBIBM_DB2DB

ACCESS CONTROL

6.22 Restrict Access to SYSCAT.ROUTINEAUTHCIS IBM DB2 9 Benchmark v3.0.1 Level 1 DBIBM_DB2DB

ACCESS CONTROL

6.22 Restrict Access to SYSCAT.TABAUTHCIS IBM DB2 v10 v1.1.0 Database Level 1IBM_DB2DB

ACCESS CONTROL

6.22 Restrict Access to SYSCAT.TABAUTHCIS IBM DB2 v10 v1.1.0 Database Level 2IBM_DB2DB

ACCESS CONTROL

6.23 Restrict Access to SYSCAT.SCHEMAAUTHCIS IBM DB2 9 Benchmark v3.0.1 Level 1 DBIBM_DB2DB

ACCESS CONTROL

6.23 Restrict Access to SYSCAT.TBSPACEAUTHCIS IBM DB2 v10 v1.1.0 Database Level 1IBM_DB2DB

ACCESS CONTROL

6.24 Restrict Access to SYSCAT.SCHEMATACIS IBM DB2 9 Benchmark v3.0.1 Level 1 DBIBM_DB2DB

ACCESS CONTROL

6.25 Restrict Access to SYSCAT.MODULEAUTHCIS IBM DB2 v10 v1.1.0 Database Level 2IBM_DB2DB

ACCESS CONTROL

6.27 Restrict Access to SYSCAT.PROCEDURESCIS IBM DB2 9 Benchmark v3.0.1 Level 2 DBIBM_DB2DB

ACCESS CONTROL

6.28 Restrict Access to SYSCAT.TABAUTHCIS IBM DB2 9 Benchmark v3.0.1 Level 1 DBIBM_DB2DB

ACCESS CONTROL

6.30 Restrict Access to TablespacesCIS IBM DB2 9 Benchmark v3.0.1 Level 1 DBIBM_DB2DB

ACCESS CONTROL

6.31 Restrict Access to SYSCAT.MODULEAUTHCIS IBM DB2 9 Benchmark v3.0.1 Level 1 DBIBM_DB2DB

ACCESS CONTROL

6.34 Restrict Access to SYSCAT.XSROBJECTAUTHCIS IBM DB2 9 Benchmark v3.0.1 Level 2 DBIBM_DB2DB

ACCESS CONTROL

6.35 Restrict Access to SYSIBMADM.OBJECTOWNERSCIS IBM DB2 9 Benchmark v3.0.1 Level 1 DBIBM_DB2DB

ACCESS CONTROL

8.3.33 Set 'Software channel permissions' to 'Enabled:High safety'CIS IE 10 v1.1.0Windows

ACCESS CONTROL

8.5.5 Ensure meeting chat does not allow anonymous usersCIS Microsoft 365 Foundations E3 L2 v3.1.0microsoft_azure

ACCESS CONTROL

8.5.7 Ensure external participants can't give or request controlCIS Microsoft 365 Foundations E3 L1 v3.1.0microsoft_azure

ACCESS CONTROL