Item Search

NameAudit NamePluginCategory
1.1.21 Ensure sticky bit is set on all world-writable directoriesCIS Red Hat EL8 Server L1 v1.0.0Unix

ACCESS CONTROL

1.1.21 Ensure sticky bit is set on all world-writable directoriesCIS SUSE Linux Enterprise Workstation 12 L1 v2.1.0Unix

ACCESS CONTROL

1.1.21 Ensure sticky bit is set on all world-writable directoriesCIS CentOS 6 Server L1 v2.1.0Unix

ACCESS CONTROL

1.6.1.1 Ensure SELinux is not disabled in bootloader configuration - selinux = 0CIS Amazon Linux v2.1.0 L2Unix

ACCESS CONTROL

1.6.1.2 Ensure the SELinux state is enforcingCIS Oracle Linux 6 Workstation L2 v1.1.0Unix

ACCESS CONTROL

1.6.1.3 Ensure SELinux policy is configuredCIS CentOS 6 Server L2 v2.1.0Unix

ACCESS CONTROL

1.6.1.3 Ensure SELinux policy is configuredCIS Ubuntu Linux 14.04 LTS Server L2 v2.1.0Unix

ACCESS CONTROL

1.6.1.3 Ensure SELinux policy is configuredCIS Oracle Linux 6 Server L2 v1.1.0Unix

ACCESS CONTROL

1.6.1.3 Ensure SELinux policy is configuredCIS SUSE Linux Enterprise Workstation 12 L2 v2.1.0Unix

ACCESS CONTROL

1.6.1.3 Ensure SELinux policy is configuredCIS Red Hat 6 Workstation L2 v2.1.0Unix

ACCESS CONTROL

1.6.1.3 Ensure SELinux policy is configuredCIS Ubuntu Linux 14.04 LTS Workstation L2 v2.1.0Unix

ACCESS CONTROL

1.6.1.3 Ensure SELinux policy is configured - 'Policy from config file'CIS Ubuntu Linux 14.04 LTS Server L2 v2.1.0Unix

ACCESS CONTROL

1.6.1.3 Ensure SELinux policy is configured - 'SELINUXTYPE'CIS Ubuntu Linux 14.04 LTS Workstation L2 v2.1.0Unix

ACCESS CONTROL

1.6.1.6 Ensure no unconfined daemons existCIS Amazon Linux 2 v1.0.0 L2Unix

ACCESS CONTROL

1.6.2 Ensure SELinux is installedCIS Amazon Linux v2.1.0 L2Unix

ACCESS CONTROL

1.6.2.1 Ensure SELinux is not disabled in bootloader configuration - enforcing=0CIS Distribution Independent Linux Server L2 v2.0.0Unix

ACCESS CONTROL

1.6.2.1 Ensure SELinux is not disabled in bootloader configuration - selinux=0CIS Distribution Independent Linux Server L2 v2.0.0Unix

ACCESS CONTROL

1.6.2.1 Ensure SELinux is not disabled in bootloader configuration - selinux=0CIS Distribution Independent Linux Workstation L2 v2.0.0Unix

ACCESS CONTROL

1.6.2.2 Ensure all AppArmor Profiles are enforcing - complain modeCIS SUSE Linux Enterprise Server 12 L2 v2.1.0Unix

ACCESS CONTROL

1.6.2.2 Ensure all AppArmor Profiles are enforcing - complain modeCIS SUSE Linux Enterprise Workstation 12 L2 v2.1.0Unix

ACCESS CONTROL

1.6.2.2 Ensure all AppArmor Profiles are enforcing - profiles loadedCIS SUSE Linux Enterprise Server 12 L2 v2.1.0Unix

ACCESS CONTROL

1.7.1.2 Ensure SELinux is not disabled in bootloader configurationCIS CentOS Linux 8 Workstation L2 v1.0.0Unix

ACCESS CONTROL

1.7.1.3 Ensure SELinux policy is configuredCIS Oracle Linux 7 Server L1 v3.0.0Unix

ACCESS CONTROL

1.7.1.3 Ensure SELinux policy is configuredCIS Oracle Linux 7 Workstation L1 v3.0.0Unix

ACCESS CONTROL

1.7.1.3 Ensure SELinux policy is configured - sestatusCIS CentOS Linux 8 Workstation L2 v1.0.0Unix

ACCESS CONTROL

1.7.1.4 Ensure the SELinux mode is enforcing or permissiveCIS Oracle Linux 7 Server L1 v3.0.0Unix

ACCESS CONTROL

1.7.1.4 Ensure the SELinux mode is enforcing or permissiveCIS Oracle Linux 7 Workstation L1 v3.0.0Unix

ACCESS CONTROL

1.7.1.4 Ensure the SELinux mode is enforcing or permissive - configCIS Oracle Linux 7 Workstation L1 v3.0.0Unix

ACCESS CONTROL

1.7.1.4 Ensure the SELinux state is enforcing - Mode from config file: enforcingCIS CentOS Linux 8 Workstation L2 v1.0.0Unix

ACCESS CONTROL

1.7.1.5 Ensure the SELinux mode is enforcing - getenforceCIS Oracle Linux 7 Server L2 v3.0.0Unix

ACCESS CONTROL

1.7.1.6 Ensure no unconfined services existCIS Oracle Linux 7 Server L1 v3.0.0Unix

ACCESS CONTROL

2.4.2 Restrict BIND Access with SELinux 'named_write_master_zones'CIS ISC BIND 9.0/9.5 v2.0.0Unix

ACCESS CONTROL

2.210 - The system must enable SELinux.Tenable Fedora Linux Best Practices v2.0.0Unix

ACCESS CONTROL

2.900 - All system device files must be correctly labeled to prevent unauthorized modification - device_tTenable Fedora Linux Best Practices v2.0.0Unix

ACCESS CONTROL

2.900 - All system device files must be correctly labeled to prevent unauthorized modification - unlabeled_tTenable Fedora Linux Best Practices v2.0.0Unix

ACCESS CONTROL

3.5.2.11 Ensure nftables rules are permanentCIS Oracle Linux 7 Workstation L1 v3.0.0Unix

ACCESS CONTROL

4.5 Activate AppArmor - '0 processes unconfined'CIS Ubuntu 12.04 LTS Benchmark L2 v1.1.0Unix

ACCESS CONTROL

4.5 Activate AppArmor - GRUB_CMDLINE_LINUX - 0 processes are unconfirmedCIS Debian Linux 7 L2 v1.0.0Unix

ACCESS CONTROL

4.5 Activate AppArmor - GRUB_CMDLINE_LINUX - 0 profiles are in complain modeCIS Debian Linux 7 L2 v1.0.0Unix

ACCESS CONTROL

5.1 Do not disable AppArmor ProfileCIS Docker 1.13.0 v1.0.0 L1 DockerUnix

ACCESS CONTROL

5.2 Verify SELinux security options, if applicableCIS Docker 1.11.0 v1.0.0 L2 DockerUnix

ACCESS CONTROL

5.2 Verify SELinux security options, if applicableCIS Docker 1.13.0 v1.0.0 L2 DockerUnix

ACCESS CONTROL

5.2 Verify SELinux security options, if applicable (Scored)CIS Docker 1.6 v1.0.0 L2 DockerUnix

ACCESS CONTROL

5.5 NFS - 'nfs.v4.acl.enable = on'TNS NetApp Data ONTAP 7GNetApp

ACCESS CONTROL

6.4 Ensure system device files are labeled - unlabeled_tCIS Amazon Linux 2 STIG v1.0.0 L3Unix

ACCESS CONTROL

12 - Restrict BIND Access with SELinux - named_disable_transBIND - TNS BIND Best Practices Audit v1.0.0Unix

ACCESS CONTROL

12 - Restrict BIND Access with SELinux - SELINUXTYPEBIND - TNS BIND Best Practices Audit v1.0.0Unix

ACCESS CONTROL

IBM i : Allow User Domain Objects (QALWUSRDMN) - '*ALL'IBM System i Security Reference for V7R1 and V6R1AS/400

ACCESS CONTROL

PCI 7.1 Limit access to system components and cardholder data to only those individuals whose job requires such access -SELINUX=enforcingPCI DSS 2.0/3.0 - Red Hat LinuxUnix

ACCESS CONTROL

PCI 7.1 Limit access to system components and cardholder data to only those individuals whose job requires such access -sestatusPCI DSS 2.0/3.0 - Red Hat LinuxUnix

ACCESS CONTROL