Item Search

NameAudit NamePluginCategory
1.5 Configure 'Do not allow users to enable or disable add-ons'CIS IE 11 v1.0.0Windows

ACCESS CONTROL

1.6 Set 'Disable Save this program to disk option' to 'Enabled'CIS IE 10 v1.1.0Windows

ACCESS CONTROL

2.1.3 Ensure chrony is not run as the root userCIS CentOS Linux 7 v4.0.0 L1 ServerUnix

ACCESS CONTROL

2.2 Configure the ESXi host firewall to restrict access to services running on the hostCIS VMware ESXi 5.1 v1.0.1 Level 1VMware

ACCESS CONTROL

2.2 Configure the ESXi host firewall to restrict access to services running on the hostCIS VMware ESXi 5.5 v1.2.0 Level 1VMware

ACCESS CONTROL

2.5 Verify the domains within the DB2DOMAINLIST environment variable are appropriate (Windows only)CIS IBM DB2 v10 v1.1.0 Windows OS Level 2Windows

ACCESS CONTROL

3.1 Configure 'Prevent deleting websites that the user has visited'CIS IE 11 v1.0.0Windows

ACCESS CONTROL

3.11 Ensure 'encryption providers' are locked downCIS IIS 8.0 v1.5.1 Level 2Windows

ACCESS CONTROL

3.11 Ensure 'encryption providers' are locked downCIS IIS 7 L2 v1.8.0Windows

ACCESS CONTROL

4 - Restrict access to $JETTY_HOME - modeTNS Best Practice Jetty 9 LinuxUnix

ACCESS CONTROL

4.01 init.ora - '_trace_file_public = FALSE'CIS v1.1.0 Oracle 11g OS Windows Level 1Windows

ACCESS CONTROL

4.8 Ensure Handler is not granted Write and Script/Execute - DefaultCIS IIS 7 L1 v1.8.0Windows

ACCESS CONTROL

4.12 init.ora - 'sql92_security = TRUE'CIS v1.1.0 Oracle 11g OS L2Unix

ACCESS CONTROL

5.1 Set Sticky Bit on World Writable DirectoriesCIS Solaris 11.2 L1 v1.1.0Unix

ACCESS CONTROL

5.1.4 Check Library folder for world writable filesCIS Apple macOS 10.12 L2 v1.2.0Unix

ACCESS CONTROL

5.1.6 Ensure that Service Account Tokens are only mounted where necessaryCIS Kubernetes v1.10.0 L1 MasterUnix

ACCESS CONTROL

5.2.1 Ensure that the cluster has at least one active policy control mechanism in placeCIS Kubernetes v1.23 Benchmark v1.0.1 L1 MasterUnix

ACCESS CONTROL

5.4 CIFS - 'cifs.restrict_anonymous = 2'TNS NetApp Data ONTAP 7GNetApp

ACCESS CONTROL

6.2 Restrict Access to SYSCAT.AUDITUSECIS IBM DB2 v10 v1.1.0 Database Level 2IBM_DB2DB

ACCESS CONTROL

6.2 Restrict Access to SYSCAT.AUDITUSECIS IBM DB2 9 Benchmark v3.0.1 Level 1 DBIBM_DB2DB

ACCESS CONTROL

6.3 Restrict Access to SYSCAT.DBAUTHCIS IBM DB2 9 Benchmark v3.0.1 Level 2 DBIBM_DB2DB

ACCESS CONTROL

6.4 Restrict Access to SYSCAT.COLAUTHCIS IBM DB2 v10 v1.1.0 Database Level 2IBM_DB2DB

ACCESS CONTROL

6.5 Find Unauthorized World-Writable FilesCIS Solaris 9 v1.3Unix

ACCESS CONTROL

6.5 Restrict Access to SYSCAT.EVENTSCIS IBM DB2 9 Benchmark v3.0.1 Level 2 DBIBM_DB2DB

ACCESS CONTROL

6.12 Restrict Access to SYSCAT.SECURITYLABELACCESSCIS IBM DB2 9 Benchmark v3.0.1 Level 2 DBIBM_DB2DB

ACCESS CONTROL

6.13 Restrict Access to SYSCAT.SECURITYPOLICYEXEMPTIONSCIS IBM DB2 v10 v1.1.0 Database Level 1IBM_DB2DB

ACCESS CONTROL

6.14 Restrict Access to SYSCAT.SECURITYLABELCOMPONENTSCIS IBM DB2 9 Benchmark v3.0.1 Level 2 DBIBM_DB2DB

ACCESS CONTROL

6.14 Restrict Access to SYSCAT.SURROGATEAUTHIDSCIS IBM DB2 v10 v1.1.0 Database Level 1IBM_DB2DB

ACCESS CONTROL

6.14 Restrict Access to SYSCAT.SURROGATEAUTHIDSCIS IBM DB2 v10 v1.1.0 Database Level 2IBM_DB2DB

ACCESS CONTROL

6.16 Restrict Access to SYSCAT.ROLESCIS IBM DB2 v10 v1.1.0 Database Level 2IBM_DB2DB

ACCESS CONTROL

6.17 Restrict Access to SYSCAT.ROUTINEAUTHCIS IBM DB2 v10 v1.1.0 Database Level 2IBM_DB2DB

ACCESS CONTROL

6.20 Restrict Access to SYSCAT.ROLEAUTHCIS IBM DB2 9 Benchmark v3.0.1 Level 2 DBIBM_DB2DB

ACCESS CONTROL

6.21 Restrict Access to SYSCAT.STATEMENTSCIS IBM DB2 v10 v1.1.0 Database Level 1IBM_DB2DB

ACCESS CONTROL

6.25 Restrict Access to SYSCAT.SEQUENCEAUTHCIS IBM DB2 9 Benchmark v3.0.1 Level 1 DBIBM_DB2DB

ACCESS CONTROL

6.26 Restrict Access to SYSCAT.STATEMENTSCIS IBM DB2 9 Benchmark v3.0.1 Level 2 DBIBM_DB2DB

ACCESS CONTROL

6.27 Restrict Access to SYSCAT.WORKLOADAUTHCIS IBM DB2 v10 v1.1.0 Database Level 2IBM_DB2DB

ACCESS CONTROL

6.28 Restrict Access to SYSCAT.TABAUTHCIS IBM DB2 9 Benchmark v3.0.1 Level 2 DBIBM_DB2DB

ACCESS CONTROL

6.30 Restrict Access to TablespacesCIS IBM DB2 9 Benchmark v3.0.1 Level 2 DBIBM_DB2DB

ACCESS CONTROL

6.31 Restrict Access to SYSCAT.MODULEAUTHCIS IBM DB2 9 Benchmark v3.0.1 Level 2 DBIBM_DB2DB

ACCESS CONTROL

6.35 Restrict Access to SYSIBMADM.OBJECTOWNERSCIS IBM DB2 9 Benchmark v3.0.1 Level 2 DBIBM_DB2DB

ACCESS CONTROL

8.1.17 Set 'Software channel permissions' to 'Enabled:High safety'CIS IE 9 v1.0.0Windows

ACCESS CONTROL

9.6 Ensure root PATH Integrity - writeable dir in pathCIS Solaris 11.2 L1 v1.1.0Unix

ACCESS CONTROL

10.2 Disable System AccountsCIS Debian Linux 7 L1 v1.0.0Unix

ACCESS CONTROL

10.15 Do not run applications as privilegedCIS Apache Tomcat 7 L1 v1.1.0Unix

ACCESS CONTROL

14.12 Screening router - 'Implement to restrict access to database host'CIS v1.1.0 Oracle 11g OS L2Unix

ACCESS CONTROL

14.12 Screening router - 'Implement to restrict access to database host'CIS v1.1.0 Oracle 11g OS Windows Level 2Windows

ACCESS CONTROL

18 - Restrict access to context.xml - modeTNS Best Practice Jetty 9 LinuxUnix

ACCESS CONTROL

18 - Restrict access to context.xml - ownerTNS Best Practice Jetty 9 LinuxUnix

ACCESS CONTROL

21 - Restrict access to users.xml - modeTNS Best Practice Jetty 9 LinuxUnix

ACCESS CONTROL

45 - Restrict runtime access to sensitive packagesTNS Best Practice Jetty 9 LinuxUnix

ACCESS CONTROL