Item Search

NameAudit NamePluginCategory
1.1.4 Ensure nosuid option set on /tmp partitionCIS SUSE Linux Enterprise Server 11 L1 v2.1.1Unix

ACCESS CONTROL, MEDIA PROTECTION

1.1.4.1 Ensure separate partition exists for /var/tmpCIS Ubuntu Linux 20.04 LTS Workstation L2 v2.0.1Unix

ACCESS CONTROL, MEDIA PROTECTION

1.1.7.1 Ensure separate partition exists for /homeCIS Ubuntu Linux 20.04 LTS Server L2 v2.0.1Unix

ACCESS CONTROL, MEDIA PROTECTION

1.1.21 Ensure sticky bit is set on all world-writable directoriesCIS SUSE Linux Enterprise Server 11 L1 v2.1.1Unix

ACCESS CONTROL, MEDIA PROTECTION

1.2.1 Ensure that anonymous requests are authorizedCIS RedHat OpenShift Container Platform v1.6.0 L1OpenShift

ACCESS CONTROL, MEDIA PROTECTION

1.5.1.5 Ensure the SELinux mode is enforcingCIS Oracle Linux 8 Server L2 v3.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

1.6.1.1 Ensure SELinux is not disabled in bootloader configuration - selinuxCIS SUSE Linux Enterprise Server 11 L2 v2.1.1Unix

ACCESS CONTROL, MEDIA PROTECTION

1.6.1.2 Ensure the SELinux state is enforcingCIS SUSE Linux Enterprise Server 11 L2 v2.1.1Unix

ACCESS CONTROL, MEDIA PROTECTION

1.6.1.4 Ensure the SELinux mode is enforcing or permissive - getenforceCIS Red Hat Enterprise Linux 7 STIG v2.0.0 L1 ServerUnix

ACCESS CONTROL, MEDIA PROTECTION

1.6.1.6 Ensure no unconfined daemons existCIS SUSE Linux Enterprise Server 11 L2 v2.1.1Unix

ACCESS CONTROL, MEDIA PROTECTION

1.6.2.1 Ensure AppArmor is not disabled in bootloader configurationCIS SUSE Linux Enterprise Server 11 L2 v2.1.1Unix

ACCESS CONTROL, MEDIA PROTECTION

1.6.2.2 Ensure all AppArmor Profiles are enforcing - profiles loadedCIS SUSE Linux Enterprise Server 11 L2 v2.1.1Unix

ACCESS CONTROL, MEDIA PROTECTION

1.7.1.6 Ensure permissions on /etc/issue.net are configuredCIS SUSE Linux Enterprise Server 11 L1 v2.1.1Unix

ACCESS CONTROL, MEDIA PROTECTION

2.1 Ensure the file permissions mask is correctCIS PostgreSQL 14 OS v 1.2.0Unix

ACCESS CONTROL, MEDIA PROTECTION

2.1 Ensure the file permissions mask is correctCIS PostgreSQL 15 OS v1.1.0Unix

ACCESS CONTROL, MEDIA PROTECTION

3.4 Ensure 'slow_query_log' Has Appropriate PermissionsCIS MySQL 8.0 Enterprise Linux OS L1 v1.3.0Unix

ACCESS CONTROL, MEDIA PROTECTION

3.5 Ensure 'relay_log_basename' Files Have Appropriate PermissionsCIS MySQL 8.0 Enterprise Linux OS L1 v1.3.0Unix

ACCESS CONTROL, MEDIA PROTECTION

3.7 Ensure SSL Key Files Have Appropriate PermissionsCIS MySQL 8.0 Enterprise Linux OS L1 v1.3.0Unix

ACCESS CONTROL, MEDIA PROTECTION

3.10 Secure MySQL KeyringCIS MySQL 8.0 Enterprise Linux OS L1 v1.3.0Unix

ACCESS CONTROL, MEDIA PROTECTION

4.2.4 Ensure permissions on all logfiles are configuredCIS SUSE Linux Enterprise Server 11 L1 v2.1.1Unix

ACCESS CONTROL, MEDIA PROTECTION

4.7 Ensure Row Level Security (RLS) is configured correctlyCIS PostgreSQL 13 DB v1.2.0PostgreSQLDB

ACCESS CONTROL, MEDIA PROTECTION

5.1.3 Ensure permissions on /etc/cron.hourly are configuredCIS Red Hat Enterprise Linux 7 STIG v2.0.0 L1 ServerUnix

ACCESS CONTROL, MEDIA PROTECTION

5.1.3 Ensure permissions on /etc/cron.hourly are configuredCIS SUSE Linux Enterprise Server 11 L1 v2.1.1Unix

ACCESS CONTROL, MEDIA PROTECTION

5.1.6 Ensure permissions on /etc/cron.monthly are configuredCIS SUSE Linux Enterprise Server 11 L1 v2.1.1Unix

ACCESS CONTROL, MEDIA PROTECTION

5.1.8 Ensure cron is restricted to authorized users - /etc/cron.denyCIS Red Hat 6 Server L1 v3.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

5.1.9 Ensure at is restricted to authorized users - /etc/at.allowCIS Red Hat Enterprise Linux 7 STIG v2.0.0 L1 ServerUnix

ACCESS CONTROL, MEDIA PROTECTION

5.1.9 Ensure at is restricted to authorized users - /etc/at.denyCIS Red Hat 6 Workstation L1 v3.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

5.1.9 Ensure at is restricted to authorized users - /etc/at.denyCIS Red Hat Enterprise Linux 7 STIG v2.0.0 L1 ServerUnix

ACCESS CONTROL, MEDIA PROTECTION

5.2.4.1 Ensure audit log files are mode 0640 or less permissiveCIS Ubuntu Linux 20.04 LTS Workstation L2 v2.0.1Unix

ACCESS CONTROL, MEDIA PROTECTION

5.2.4.1 Ensure the audit log directory is 0750 or more restrictiveCIS Oracle Linux 7 v4.0.0 L2 ServerUnix

ACCESS CONTROL, MEDIA PROTECTION

5.2.4.1 Ensure the audit log directory is 0750 or more restrictiveCIS Oracle Linux 8 Server L2 v3.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

5.2.4.2 Ensure only authorized users own audit log filesCIS Ubuntu Linux 20.04 LTS Workstation L2 v2.0.1Unix

ACCESS CONTROL, MEDIA PROTECTION

5.2.4.3 Ensure only authorized groups are assigned ownership of audit log filesCIS Ubuntu Linux 18.04 LTS v2.2.0 L2 WorkstationUnix

ACCESS CONTROL, MEDIA PROTECTION

5.2.4.5 Ensure audit configuration files are 640 or more restrictiveCIS Ubuntu Linux 20.04 LTS Workstation L2 v2.0.1Unix

ACCESS CONTROL, MEDIA PROTECTION

5.2.4.6 Ensure audit configuration files are owned by rootCIS Red Hat EL8 Server L2 v3.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

5.2.4.6 Ensure audit configuration files are owned by rootCIS Ubuntu Linux 20.04 LTS Server L2 v2.0.1Unix

ACCESS CONTROL, MEDIA PROTECTION

5.2.4.6 Ensure audit configuration files are owned by rootCIS Ubuntu Linux 20.04 LTS Workstation L2 v2.0.1Unix

ACCESS CONTROL, MEDIA PROTECTION

5.2.4.6 Ensure audit configuration files are owned by rootCIS Ubuntu Linux 18.04 LTS v2.2.0 L2 ServerUnix

ACCESS CONTROL, MEDIA PROTECTION

5.2.4.7 Ensure audit configuration files belong to group rootCIS Oracle Linux 7 v4.0.0 L2 WorkstationUnix

ACCESS CONTROL, MEDIA PROTECTION

5.2.4.7 Ensure audit configuration files belong to group rootCIS Ubuntu Linux 18.04 LTS v2.2.0 L2 ServerUnix

ACCESS CONTROL, MEDIA PROTECTION

5.2.4.8 Ensure audit tools are 755 or more restrictiveCIS Oracle Linux 7 v4.0.0 L2 ServerUnix

ACCESS CONTROL, MEDIA PROTECTION

5.2.4.8 Ensure audit tools are 755 or more restrictiveCIS Ubuntu Linux 20.04 LTS Server L2 v2.0.1Unix

ACCESS CONTROL, MEDIA PROTECTION

5.2.4.10 Ensure audit tools belong to group rootCIS Oracle Linux 7 v4.0.0 L2 WorkstationUnix

ACCESS CONTROL, MEDIA PROTECTION

5.5.2 Ensure system accounts are secured - non-login shellCIS Red Hat 6 Server L1 v3.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

5.5.2 Ensure system accounts are secured - unlocked non-rootCIS Red Hat 6 Workstation L1 v3.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

6.1.3 Ensure permissions on /etc/passwd- are configuredCIS Red Hat Enterprise Linux 7 STIG v2.0.0 L1 ServerUnix

ACCESS CONTROL, MEDIA PROTECTION

6.1.14 Audit system file permissionsCIS Oracle Linux 7 v4.0.0 L2 WorkstationUnix

ACCESS CONTROL, MEDIA PROTECTION

6.1.14 Audit system file permissionsCIS Oracle Linux 8 Server L2 v3.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

6.1.14 Audit system file permissionsCIS Red Hat EL8 Server L2 v3.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

7.1 Ensure application security policies exist when allowing traffic from an untrusted zone to a more trusted zoneCIS Palo Alto Firewall 9 v1.1.0 L1Palo_Alto

ACCESS CONTROL, MEDIA PROTECTION