Item Search

NameAudit NamePluginCategory
1.1.11 Ensure that the admission control plugin AlwaysPullImages is setCIS Kubernetes 1.11 Benchmark v1.3.0 L1Unix

ACCESS CONTROL

1.1.12 Ensure that the admission control policy is set to AlwaysPullImagesCIS Kubernetes 1.7.0 Benchmark v1.1.0 L1Unix

ACCESS CONTROL

2.2.1.6 Ensure 'Allow documents from managed sources in unmanaged destinations' is set to 'Disabled'AirWatch - CIS Apple iOS 11 v1.0.0 End User Owned L1MDM

CONFIGURATION MANAGEMENT

2.2.1.6 Ensure 'Allow documents from managed sources in unmanaged destinations' is set to 'Disabled'MobileIron - CIS Apple iOS 11 v1.0.0 End User Owned L1MDM

CONFIGURATION MANAGEMENT

2.2.1.7 Ensure 'Allow documents from unmanaged sources in managed destinations' is set to 'Disabled'MobileIron - CIS Apple iOS 11 v1.0.0 End User Owned L1MDM

CONFIGURATION MANAGEMENT

2.2.1.7 Ensure 'Allow documents from unmanaged sources in managed destinations' is set to 'Disabled'AirWatch - CIS Apple iOS 12 v1.0.0 End User Owned L1MDM

CONFIGURATION MANAGEMENT

2.2.1.7 Ensure 'Allow documents from unmanaged sources in managed destinations' is set to 'Disabled'MobileIron - CIS Apple iOS 12 v1.0.0 End User Owned L1MDM

CONFIGURATION MANAGEMENT

2.2.1.8 Ensure 'Treat AirDrop as unmanaged destination' is set to 'Enabled'AirWatch - CIS Apple iOS 12 v1.0.0 End User Owned L1MDM

ACCESS CONTROL

2.2.1.8 Ensure 'Treat AirDrop as unmanaged destination' is set to 'Enabled'AirWatch - CIS Apple iOS 10 v2.0.0 End User Owned L1MDM

ACCESS CONTROL

2.2.1.8 Ensure 'Treat AirDrop as unmanaged destination' is set to 'Enabled'AirWatch - CIS Apple iOS 11 v1.0.0 End User Owned L1MDM

ACCESS CONTROL

2.2.1.9 Ensure 'Allow Handoff' is set to 'Disabled'AirWatch - CIS Apple iOS 12 v1.0.0 End User Owned L2MDM

CONFIGURATION MANAGEMENT

2.2.1.9 Ensure 'Allow Handoff' is set to 'Disabled'AirWatch - CIS Apple iOS 11 v1.0.0 End User Owned L2MDM

CONFIGURATION MANAGEMENT

2.4 Set root Ownership of BIND DirectoriesCIS BIND DNS v3.0.1 Caching Only Name ServerUnix

ACCESS CONTROL

2.6 Set Group named or root for BIND Directories and FilesCIS BIND DNS v3.0.1 Caching Only Name ServerUnix

ACCESS CONTROL

2.6.1 Ensure 'Allow user to move messages from this account' is set to 'Disabled'AirWatch - CIS Apple iOS 12 v1.0.0 End User Owned L1MDM

CONFIGURATION MANAGEMENT

2.6.1 Ensure 'Allow user to move messages from this account' is set to 'Disabled'MobileIron - CIS Apple iOS 10 v2.0.0 End User Owned L1MDM

ACCESS CONTROL

2.6.1 Ensure 'Allow user to move messages from this account' is set to 'Disabled'AirWatch - CIS Apple iOS 11 v1.0.0 End User Owned L1MDM

CONFIGURATION MANAGEMENT

2.6.1 Ensure 'Allow user to move messages from this account' is set to 'Disabled'MobileIron - CIS Apple iOS 11 v1.0.0 End User Owned L1MDM

ACCESS CONTROL

3.2.1.1 Ensure 'Allow screenshots and screen recording' is set to 'Disabled'MobileIron - CIS Apple iOS 12 v1.0.0 Institution Owned L2MDM

ACCESS CONTROL

3.2.1.1 Ensure 'Allow screenshots and screen recording' is set to 'Disabled'AirWatch - CIS Apple iOS 10 v2.0.0 Institution Owned L2MDM

CONFIGURATION MANAGEMENT

3.2.1.1 Ensure 'Allow screenshots and screen recording' is set to 'Disabled'AirWatch - CIS Apple iOS 11 v1.0.0 Institution Owned L2MDM

CONFIGURATION MANAGEMENT

3.2.1.14 Ensure 'Allow documents from managed sources in unmanaged destinations' is set to 'Disabled'AirWatch - CIS Apple iOS 10 v2.0.0 Institution Owned L1MDM

CONFIGURATION MANAGEMENT

3.2.1.15 Ensure 'Allow documents from unmanaged sources in managed destinations' is set to 'Disabled'AirWatch - CIS Apple iOS 10 v2.0.0 Institution Owned L1MDM

CONFIGURATION MANAGEMENT

3.2.1.16 Ensure 'Allow documents from managed sources in unmanaged destinations' is set to 'Disabled'MobileIron - CIS Apple iOS 12 v1.0.0 Institution Owned L1MDM

CONFIGURATION MANAGEMENT

3.2.1.16 Ensure 'Allow documents from unmanaged sources in managed destinations' is set to 'Disabled'AirWatch - CIS Apple iOS 11 v1.0.0 Institution Owned L1MDM

CONFIGURATION MANAGEMENT

3.2.1.16 Ensure 'Treat AirDrop as unmanaged destination' is set to 'Enabled'AirWatch - CIS Apple iOS 10 v2.0.0 Institution Owned L1MDM

ACCESS CONTROL

3.2.1.17 Ensure 'Allow documents from unmanaged sources in managed destinations' is set to 'Disabled'MobileIron - CIS Apple iOS 12 v1.0.0 Institution Owned L1MDM

CONFIGURATION MANAGEMENT

3.2.1.17 Ensure 'Treat AirDrop as unmanaged destination' is set to 'Enabled'AirWatch - CIS Apple iOS 11 v1.0.0 Institution Owned L1MDM

ACCESS CONTROL

3.2.1.18 Ensure 'Allow Handoff' is set to 'Disabled'AirWatch - CIS Apple iOS 11 v1.0.0 Institution Owned L1MDM

CONFIGURATION MANAGEMENT

3.2.1.18 Ensure 'Allow Handoff' is set to 'Disabled'MobileIron - CIS Apple iOS 11 v1.0.0 Institution Owned L1MDM

CONFIGURATION MANAGEMENT

3.2.1.19 Ensure 'Allow Handoff' is set to 'Disabled'AirWatch - CIS Apple iOS 12 v1.0.0 Institution Owned L1MDM

CONFIGURATION MANAGEMENT

3.4 Ensure that docker.socket file permissions are set to 644 or more restrictiveCIS Docker Community Edition v1.1.0 L1 DockerUnix

CONFIGURATION MANAGEMENT

3.6.1 Ensure 'Allow user to move messages from this account' is set to 'Disabled'AirWatch - CIS Apple iOS 11 v1.0.0 Institution Owned L1MDM

CONFIGURATION MANAGEMENT

3.6.1 Ensure 'Allow user to move messages from this account' is set to 'Disabled'MobileIron - CIS Apple iOS 11 v1.0.0 Institution Owned L1MDM

ACCESS CONTROL

3.6.1 Ensure 'Allow user to move messages from this account' is set to 'Disabled'MobileIron - CIS Apple iOS 12 v1.0.0 Institution Owned L1MDM

ACCESS CONTROL

3.6.1 Ensure 'Allow user to move messages from this account' is set to 'Disabled'MobileIron - CIS Apple iOS 10 v2.0.0 Institution Owned L1MDM

ACCESS CONTROL

3.10 Ensure that TLS CA certificate file permissions are set to 444 or more restrictiveCIS Docker Community Edition v1.1.0 L1 DockerUnix

CONFIGURATION MANAGEMENT

3.20 Ensure that /etc/default/docker file permissions are set to 644 or more restrictiveCIS Docker Community Edition v1.1.0 L1 DockerUnix

CONFIGURATION MANAGEMENT

4.4 Restrict Access to All Key Files - group root/namedCIS BIND DNS v3.0.1 Authoritative Name ServerUnix

ACCESS CONTROL

4.4 Restrict Access to All Key Files - group root/namedCIS BIND DNS v3.0.1 Caching Only Name ServerUnix

ACCESS CONTROL

4.4 Restrict Access to All Key Files - permissionsCIS BIND DNS v3.0.1 Caching Only Name ServerUnix

ACCESS CONTROL

4.4 Restrict Access to All Key Files - user root/namedCIS BIND DNS v3.0.1 Caching Only Name ServerUnix

ACCESS CONTROL

6.2.8 Ensure users' home directories permissions are 750 or more restrictiveCIS Ubuntu Linux 14.04 LTS Server L1 v2.1.0Unix

CONFIGURATION MANAGEMENT

6.2.9 Ensure users own their home directoriesCIS Ubuntu Linux 14.04 LTS Server L1 v2.1.0Unix

CONFIGURATION MANAGEMENT

6.2.10 Ensure users' dot files are not group or world writableCIS Ubuntu Linux 14.04 LTS Server L1 v2.1.0Unix

CONFIGURATION MANAGEMENT

6.2.10 Ensure users' dot files are not group or world writableCIS Ubuntu Linux 14.04 LTS Workstation L1 v2.1.0Unix

CONFIGURATION MANAGEMENT

6.2.13 Ensure users' .netrc Files are not group or world accessibleCIS Ubuntu Linux 14.04 LTS Workstation L1 v2.1.0Unix

CONFIGURATION MANAGEMENT

7.2 Ensure that database file permissions are set correctlyCIS MongoDB 3.2 L1 Windows Audit v1.0.0Windows

CONFIGURATION MANAGEMENT

7.2 Ensure that database file permissions are set correctlyCIS MongoDB 3.4 L1 Unix Audit v1.0.0Unix

CONFIGURATION MANAGEMENT

Ensure users' home directories permissions are 750 or more restrictiveTenable Cisco Firepower Management Center OS Best Practices AuditUnix

CONFIGURATION MANAGEMENT