1.4.1 - Remote command lockdown - 'rlogin mode 000' | CIS AIX 5.3/6.1 L2 v1.1.0 | Unix | ACCESS CONTROL |
1.6.1.1 Ensure SELinux is not disabled in bootloader configuration - enforcing | CIS Aliyun Linux 2 L2 v1.0.0 | Unix | ACCESS CONTROL |
1.6.1.3 Ensure SELinux policy is configured | CIS CentOS 6 Server L1 v3.0.0 | Unix | ACCESS CONTROL |
1.6.1.3 Ensure the SELinux state is enforcing - sestatus | CIS Amazon Linux 2 STIG v1.0.0 L2 | Unix | ACCESS CONTROL |
1.6.1.4 Ensure the SELinux mode is enforcing or permissive - config | CIS CentOS 6 Server L1 v3.0.0 | Unix | ACCESS CONTROL |
1.6.1.5 Ensure the SELinux mode is enforcing - getenforce | CIS CentOS 6 Workstation L2 v3.0.0 | Unix | ACCESS CONTROL |
1.6.2.1 Ensure AppArmor is not disabled in bootloader configuration - /boot/grub2/menu.lst apparmor=0 | CIS Distribution Independent Linux Workstation L2 v1.1.0 | Unix | ACCESS CONTROL |
1.7.1.3 Ensure SELinux policy is configured - sestatus | CIS Fedora 19 Family Linux Server L1 v1.0.0 | Unix | ACCESS CONTROL |
1.20 Ensure that S3 Buckets are configured with 'Block public access (bucket settings)' | CIS Amazon Web Services Foundations L1 1.3.0 | amazon_aws | ACCESS CONTROL |
2.2.48 (L1) Ensure 'Take ownership of files or other objects' is set to 'Administrators' | CIS Windows Server 2012 MS L1 v3.0.0 | Windows | ACCESS CONTROL |
2.2.48 (L1) Ensure 'Take ownership of files or other objects' is set to 'Administrators' | CIS Microsoft Windows Server 2008 R2 Domain Controller Level 1 v3.3.1 | Windows | ACCESS CONTROL |
2.3.2 - /etc/mail/sendmail.cf - permissions and ownership - '/etc/mail/sendmail.cf root:system 640' | CIS AIX 5.3/6.1 L1 v1.1.0 | Unix | ACCESS CONTROL |
2.3.10.11 (L1) Ensure 'Network access: Shares that can be accessed anonymously' is set to 'None' | CIS Microsoft Windows 11 Stand-alone v3.0.0 L1 | Windows | ACCESS CONTROL |
2.3.10.11 (L1) Ensure 'Network access: Shares that can be accessed anonymously' is set to 'None' | CIS Microsoft Windows 10 Stand-alone v3.0.0 L1 BL | Windows | ACCESS CONTROL |
2.3.10.12 (L1) Ensure 'Network access: Shares that can be accessed anonymously' is set to 'None' | CIS Windows Server 2012 R2 DC L1 v3.0.0 | Windows | ACCESS CONTROL |
2.210 - The system must enable SELinux. | Tenable Fedora Linux Best Practices v2.0.0 | Unix | ACCESS CONTROL |
3. OpenStack Networking - Policy.json - 'delete_l3-router' | TNS OpenStack Neutron/Networking Security Guide | Unix | ACCESS CONTROL |
3.2 Ensure the Apache User Account Has an Invalid Shell | CIS Apache HTTP Server 2.2 L1 v3.5.0 | Unix | ACCESS CONTROL |
4. OpenStack Networking - Policy.json - 'update_policy_profiles' | TNS OpenStack Neutron/Networking Security Guide | Unix | ACCESS CONTROL |
4.2 Ensure Appropriate Access to Web Content Is Allowed - 'httpd.conf Deny is configured' | CIS Apache HTTP Server 2.2 L1 v3.5.0 | Unix | ACCESS CONTROL |
5. OpenStack Networking - Policy.json - 'get_port:binding:vif_details' | TNS OpenStack Neutron/Networking Security Guide | Unix | ACCESS CONTROL |
5.4.2 Ensure system accounts are non-login | CIS CentOS 6 Server L1 v2.1.0 | Unix | ACCESS CONTROL |
5.4.6 Ensure users must provide password for escalation | CIS Amazon Linux 2 STIG v1.0.0 L3 | Unix | ACCESS CONTROL |
5.4.7 Ensure users must re-autenticate for privilege escalation | CIS Amazon Linux 2 STIG v1.0.0 L3 | Unix | ACCESS CONTROL |
5.10 Ensure Access to .ht* Files Is Restricted | CIS Apache HTTP Server 2.4 L1 v1.5.0 Middleware | Unix | ACCESS CONTROL |
6.2.8 Ensure users' home directories permissions are 750 or more restrictive | CIS Amazon Linux 2 STIG v1.0.0 L1 | Unix | ACCESS CONTROL |
6.2.20 Ensure shadow group is empty - /etc/passwd | CIS CentOS 6 Server L1 v3.0.0 | Unix | ACCESS CONTROL |
7.1 Extensible Firmware Interface (EFI) password | CIS Apple macOS 10.14 v1.3.0 L2 | Unix | ACCESS CONTROL |
7.4 Ensure directory in context.xml is a secure location - configuration | CIS Apache Tomcat 8 L1 v1.1.0 | Unix | ACCESS CONTROL |
8.4 Restrict Access to Zone and Key Signing Keys | CIS BIND DNS v1.0.0 L2 Authoritative Name Server | Unix | ACCESS CONTROL |
11.3 Ensure the httpd_t Type Is Not in Permissive Mode | CIS Apache HTTP Server 2.2 L2 v3.5.0 | Unix | ACCESS CONTROL |
11.4 Ensure Only the Necessary SELinux Booleans Are Enabled | CIS Apache HTTP Server 2.2 L2 v3.5.0 | Unix | ACCESS CONTROL |
18.10.3.1 (L2) Ensure 'Allow a Windows app to share application data between users' is set to 'Disabled' | CIS Microsoft Windows 10 Stand-alone v3.0.0 L2 NG | Windows | ACCESS CONTROL |
35. OpenStack Networking - Policy.json - 'create_metering_label' | TNS OpenStack Neutron/Networking Security Guide | Unix | ACCESS CONTROL |
47. OpenStack Networking - Policy.json - 'create_router:distributed' | TNS OpenStack Neutron/Networking Security Guide | Unix | ACCESS CONTROL |
50. OpenStack Networking - Policy.json - 'update_network_profile' | TNS OpenStack Neutron/Networking Security Guide | Unix | ACCESS CONTROL |
60. OpenStack Networking - Policy.json - 'update_firewall' | TNS OpenStack Neutron/Networking Security Guide | Unix | ACCESS CONTROL |
62. OpenStack Networking - Policy.json - 'delete_agent' | TNS OpenStack Neutron/Networking Security Guide | Unix | ACCESS CONTROL |
63. OpenStack Networking - Policy.json - 'delete_firewall' | TNS OpenStack Neutron/Networking Security Guide | Unix | ACCESS CONTROL |
65. OpenStack Networking - Policy.json - 'update_network' | TNS OpenStack Neutron/Networking Security Guide | Unix | ACCESS CONTROL |
72. OpenStack Networking - Policy.json - 'create_port:binding:profile' | TNS OpenStack Neutron/Networking Security Guide | Unix | ACCESS CONTROL |
77. OpenStack Networking - Policy.json - 'get_metering_label_rule' | TNS OpenStack Neutron/Networking Security Guide | Unix | ACCESS CONTROL |
81. OpenStack Networking - Policy.json - 'delete_firewall_rule' | TNS OpenStack Neutron/Networking Security Guide | Unix | ACCESS CONTROL |
86.1.1 (L2) Ensure 'Allow a Windows app to share application data between users' is set to 'Disabled' | CIS Microsoft Intune for Windows 10 v3.0.1 L2 | Windows | ACCESS CONTROL |
89. OpenStack Networking - Policy.json - 'delete_metering_label_rule' | TNS OpenStack Neutron/Networking Security Guide | Unix | ACCESS CONTROL |
90. OpenStack Networking - Policy.json - 'create_floatingip' | TNS OpenStack Neutron/Networking Security Guide | Unix | ACCESS CONTROL |
91. OpenStack Networking - Policy.json - 'get_port:binding:profile' | TNS OpenStack Neutron/Networking Security Guide | Unix | ACCESS CONTROL |
98. OpenStack Networking - Policy.json - 'delete_subnet' | TNS OpenStack Neutron/Networking Security Guide | Unix | ACCESS CONTROL |
PCI 7.1.2 - Assignment of privileges is based on job classification and function - 'lskst -t dom info' | PCI DSS 2.0/3.0 - AIX | Unix | ACCESS CONTROL |
Review the list of active Rackspace Role Names (RBAC) | Tenable Best Practices RackSpace v2.0.0 | Rackspace | ACCESS CONTROL |