Item Search

NameAudit NamePluginCategory
1.6.1.3 Ensure SELinux policy is configuredCIS Debian 8 Workstation L2 v2.0.2Unix

ACCESS CONTROL, MEDIA PROTECTION

1.6.2.1 Ensure AppArmor is enabled in the bootloader configuration - apparmor=1CIS Debian 8 Workstation L2 v2.0.2Unix

ACCESS CONTROL, MEDIA PROTECTION

1.6.2.1 Ensure AppArmor is enabled in the bootloader configuration - security=apparmorCIS Debian 8 Workstation L2 v2.0.2Unix

ACCESS CONTROL, MEDIA PROTECTION

1.6.2.2 Ensure all AppArmor Profiles are enforcing - profiles loadedCIS Debian 8 Server L2 v2.0.2Unix

ACCESS CONTROL, MEDIA PROTECTION

4.1.17 Ensure the audit configuration is immutableCIS SUSE Linux Enterprise 12 v3.1.0 L2 WorkstationUnix

ACCESS CONTROL, MEDIA PROTECTION

4.1.17 Ensure the audit configuration is immutableCIS SUSE Linux Enterprise 15 Server L2 v1.1.1Unix

ACCESS CONTROL, MEDIA PROTECTION

5.1.5 Ensure permissions on /etc/cron.weekly are configuredCIS Debian 8 Server L1 v2.0.2Unix

ACCESS CONTROL, MEDIA PROTECTION

5.1.8 Ensure at/cron is restricted to authorized users - at.allowCIS Debian 8 Server L1 v2.0.2Unix

ACCESS CONTROL, MEDIA PROTECTION

5.2.1 Ensure permissions on /etc/ssh/sshd_config are configuredCIS Debian 8 Server L1 v2.0.2Unix

ACCESS CONTROL, MEDIA PROTECTION

5.5.5 Ensure default user umask is configured - system wide defaultCIS Red Hat Enterprise Linux 7 STIG v2.0.0 L1 ServerUnix

ACCESS CONTROL, MEDIA PROTECTION

5.5.5 Ensure default user umask is configured - system wide umaskCIS Red Hat 6 Workstation L1 v3.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

6.1.6 Ensure permissions on /etc/passwd- are configuredCIS Debian 8 Server L1 v2.0.2Unix

ACCESS CONTROL, MEDIA PROTECTION

6.1.7 Ensure permissions on /etc/shadow- are configuredCIS Debian 8 Workstation L1 v2.0.2Unix

ACCESS CONTROL, MEDIA PROTECTION

6.1.8 Ensure permissions on /etc/group- are configuredCIS Debian 8 Server L1 v2.0.2Unix

ACCESS CONTROL, MEDIA PROTECTION

6.1.8 Ensure permissions on /etc/group- are configuredCIS Debian 8 Workstation L1 v2.0.2Unix

ACCESS CONTROL, MEDIA PROTECTION

6.2.9 Ensure users own their home directoriesCIS Debian 8 Server L1 v2.0.2Unix

ACCESS CONTROL, MEDIA PROTECTION

6.5.3 Ensure additional storage providers are restricted in Outlook on the webCIS Microsoft 365 Foundations E3 L2 v3.1.0microsoft_azure

ACCESS CONTROL, MEDIA PROTECTION

7.2.3 Ensure all groups in /etc/passwd exist in /etc/groupCIS Ubuntu Linux 22.04 LTS v2.0.0 L1 WorkstationUnix

ACCESS CONTROL, MEDIA PROTECTION

7.2.3 Ensure all groups in /etc/passwd exist in /etc/groupCIS Oracle Linux 9 v2.0.0 L1 ServerUnix

ACCESS CONTROL, MEDIA PROTECTION

7.2.6 Ensure SharePoint external sharing is managed through domain whitelist/blacklistsCIS Microsoft 365 Foundations E3 L2 v3.1.0microsoft_azure

ACCESS CONTROL, MEDIA PROTECTION

GEN000980 - The system must prevent the root account from directly logging in except from the system console.DISA STIG AIX 6.1 v1r13Unix

ACCESS CONTROL

GEN001190 - All network services daemon files must not have extended ACLs - /usr/sbin/*DISA STIG AIX 6.1 v1r13Unix

ACCESS CONTROL

GEN001210 - All system command files must not have extended ACLs - '/sbin/*'DISA STIG AIX 6.1 v1r13Unix

ACCESS CONTROL

GEN001210 - All system command files must not have extended ACLs - '/usr/sbin/*'DISA STIG AIX 6.1 v1r13Unix

ACCESS CONTROL

GEN001270 - System log files must not have extended ACLs, except as needed to support authorized software.DISA STIG AIX 6.1 v1r13Unix

ACCESS CONTROL

GEN001290 - All manual page files must not have extended ACLs - '/usr/share/infopage/*'DISA STIG AIX 6.1 v1r13Unix

ACCESS CONTROL

GEN001361 - NIS/NIS+/yp command files must not have extended ACLs - '/var/nis'DISA STIG AIX 6.1 v1r13Unix

ACCESS CONTROL

GEN001390 - The /etc/passwd file must not have an extended ACL.DISA STIG AIX 6.1 v1r13Unix

ACCESS CONTROL

GEN001590 - All run control scripts must have no extended ACLs - '/etc/rc*'DISA STIG AIX 6.1 v1r13Unix

ACCESS CONTROL

GEN001730 - All global initialization files must not have extended ACLs - '/etc/profile.d/*'DISA STIG for Red Hat Enterprise Linux 5 v1r17 AuditUnix

ACCESS CONTROL

GEN001730 - All global initialization files must not have extended ACLs - '/etc/profile'DISA STIG for Red Hat Enterprise Linux 5 v1r17 AuditUnix

ACCESS CONTROL

GEN001730 - All global initialization files must not have extended ACLs - '/etc/suid_profile'DISA STIG for Red Hat Enterprise Linux 5 v1r17 AuditUnix

ACCESS CONTROL

GEN002640 - Default system accounts must be disabled or removed - 'sys'DISA STIG for Red Hat Enterprise Linux 5 v1r17 AuditUnix

ACCESS CONTROL

GEN002718 - System audit tool executables must not have extended ACLs - '/sbin/audispd'DISA STIG for Red Hat Enterprise Linux 5 v1r17 AuditUnix

ACCESS CONTROL

GEN002718 - System audit tool executables must not have extended ACLs - '/sbin/ausearch'DISA STIG for Red Hat Enterprise Linux 5 v1r17 AuditUnix

ACCESS CONTROL

GEN003090 - Crontab files must not have extended ACLs - '/etc/cron.hourly'DISA STIG for Red Hat Enterprise Linux 5 v1r17 AuditUnix

ACCESS CONTROL

GEN003090 - Crontab files must not have extended ACLs - '/etc/crontab'DISA STIG for Red Hat Enterprise Linux 5 v1r17 AuditUnix

ACCESS CONTROL

GEN003220 - Cron programs must not set the umask to a value less restrictive than 077 - '/etc/cron.d/*'DISA STIG for Red Hat Enterprise Linux 5 v1r17 AuditUnix

ACCESS CONTROL

GEN003220 - Cron programs must not set the umask to a value less restrictive than 077 - '/etc/cron.monthly/*'DISA STIG for Red Hat Enterprise Linux 5 v1r17 AuditUnix

ACCESS CONTROL

GEN003220 - Cron programs must not set the umask to a value less restrictive than 077 - '/etc/cron.weekly/*'DISA STIG for Red Hat Enterprise Linux 5 v1r17 AuditUnix

ACCESS CONTROL

GEN003220 - Cron programs must not set the umask to a value less restrictive than 077 - '/var/spool/cron/*'DISA STIG for Red Hat Enterprise Linux 5 v1r17 AuditUnix

ACCESS CONTROL

GEN003410 - The 'at' directory must not have an extended ACL.DISA STIG for Red Hat Enterprise Linux 5 v1r17 AuditUnix

ACCESS CONTROL

GEN003790 - The services file must not have an extended ACL.DISA STIG for Red Hat Enterprise Linux 5 v1r17 AuditUnix

ACCESS CONTROL

GEN004390 - The alias file must not have an extended ACL - '/etc/aliases'DISA STIG for Red Hat Enterprise Linux 5 v1r17 AuditUnix

ACCESS CONTROL

GEN004390 - The alias file must not have an extended ACL - '/etc/postfix/aliases'DISA STIG for Red Hat Enterprise Linux 5 v1r17 AuditUnix

ACCESS CONTROL

GEN004950 - The ftpusers file must not have an extended ACL - '/etc/vsftpd.ftpusers'DISA STIG for Red Hat Enterprise Linux 5 v1r17 AuditUnix

ACCESS CONTROL

GEN005040 - All FTP gssftp users must have a default umask of 077 - '/etc/vsftpd/vsftpd.conf local_umask'DISA STIG for Red Hat Enterprise Linux 5 v1r17 AuditUnix

ACCESS CONTROL

GEN005040 - All FTP gssftp users must have a default umask of 077 - '/etc/xinetd.d/gssftp'DISA STIG for Red Hat Enterprise Linux 5 v1r17 AuditUnix

ACCESS CONTROL

GEN006270 - The /etc/news/incoming.conf file must not have an extended ACL.DISA STIG for Red Hat Enterprise Linux 5 v1r17 AuditUnix

ACCESS CONTROL

GEN006290 - The /etc/news/hosts.nntp.nolimit file must not have an extended ACL.DISA STIG for Red Hat Enterprise Linux 5 v1r17 AuditUnix

ACCESS CONTROL