Item Search

NameAudit NamePluginCategory
1.1 Ensure access to SharePointEmailws.asmx is limited to only the server farm accountCIS Microsoft SharePoint 2019 OS v1.0.0Windows

CONFIGURATION MANAGEMENT

1.1.14 Ensure that the admission control policy is set to SecurityContextDenyCIS Kubernetes 1.7.0 Benchmark v1.1.0 L1Unix

ACCESS CONTROL

1.4.2 Ensure that the apiserver file ownership is set to root:rootCIS Kubernetes 1.7.0 Benchmark v1.1.0 L1Unix

CONFIGURATION MANAGEMENT

1.4.4 Ensure that the config file ownership is set to root:rootCIS Kubernetes 1.7.0 Benchmark v1.1.0 L1Unix

CONFIGURATION MANAGEMENT

1.4.5 Ensure that the scheduler pod specification file permissions are set to 644 or more restrictiveCIS Kubernetes 1.8 Benchmark v1.2.0 L1Unix

CONFIGURATION MANAGEMENT

1.4.9 Ensure that the Container Network Interface file permissions are set to 644 or more restrictiveCIS Kubernetes 1.8 Benchmark v1.2.0 L1Unix

CONFIGURATION MANAGEMENT

1.4.10 Ensure that the Container Network Interface file ownership is set to root:rootCIS Kubernetes 1.8 Benchmark v1.2.0 L1Unix

CONFIGURATION MANAGEMENT

1.4.17 Ensure that the controller-manager.conf file permissions are set to 644 or more restrictiveCIS Kubernetes 1.8 Benchmark v1.2.0 L1Unix

CONFIGURATION MANAGEMENT

1.4.18 Ensure that the controller-manager.conf file ownership is set to root:rootCIS Kubernetes 1.11 Benchmark v1.3.0 L1Unix

CONFIGURATION MANAGEMENT

1.4.20 Ensure that the Kubernetes PKI certificate file permissions are set to 644 or more restrictiveCIS Kubernetes 1.13 Benchmark v1.4.1 L1Unix

CONFIGURATION MANAGEMENT

1.7.1 Do not admit privileged containersCIS Kubernetes 1.11 Benchmark v1.3.0 L1Unix

CONFIGURATION MANAGEMENT

1.7.1.5 Ensure permissions on /etc/issue are configuredCIS Ubuntu Linux 14.04 LTS Server L1 v2.1.0Unix

CONFIGURATION MANAGEMENT

2.2 Ensure the SharePoint farm service account (database access account) is configured with the minimum privileges for the local server.CIS Microsoft SharePoint 2016 OS v1.1.0Windows

ACCESS CONTROL

2.2.2 Ensure that the kubelet.conf file ownership is set to root:rootCIS Kubernetes 1.13 Benchmark v1.4.1 L1Unix

CONFIGURATION MANAGEMENT

2.2.6 Ensure that the proxy file ownership is set to root:rootCIS Kubernetes 1.7.0 Benchmark v1.1.0 L1Unix

CONFIGURATION MANAGEMENT

2.2.6 Ensure that the proxy kubeconfig file ownership is set to root:rootCIS Kubernetes 1.8 Benchmark v1.2.0 L1Unix

CONFIGURATION MANAGEMENT

2.2.9 Ensure that the kubelet configuration file ownership is set to root:rootCIS Kubernetes 1.11 Benchmark v1.3.0 L1Unix

CONFIGURATION MANAGEMENT

3.1 Ensure that docker.service file ownership is set to root:rootCIS Docker Community Edition v1.1.0 L1 DockerUnix

CONFIGURATION MANAGEMENT

3.1.1 Ensure 'Controls when the profile can be removed' is set to 'Never'MobileIron - CIS Apple iOS 11 v1.0.0 Institution Owned L1MDM

ACCESS CONTROL

3.2.1.9 Ensure 'Allow Erase All Content and Settings' is set to 'Disabled'MobileIron - CIS Apple iOS 12 v1.0.0 Institution Owned L1MDM

CONFIGURATION MANAGEMENT

3.2.1.9 Ensure 'Allow Erase All Content and Settings' is set to 'Disabled'AirWatch - CIS Apple iOS 10 v2.0.0 Institution Owned L1MDM

CONFIGURATION MANAGEMENT

3.2.1.9 Ensure 'Allow Erase All Content and Settings' is set to 'Disabled'AirWatch - CIS Apple iOS 11 v1.0.0 Institution Owned L1MDM

CONFIGURATION MANAGEMENT

3.2.1.11 Ensure 'Allow installing configuration profiles' is set to 'Disabled'MobileIron - CIS Apple iOS 11 v1.0.0 Institution Owned L1MDM

CONFIGURATION MANAGEMENT

3.2.1.12 Ensure 'Allow modifying cellular data app settings' is set to 'Disabled'AirWatch - CIS Apple iOS 10 v2.0.0 Institution Owned L2MDM

CONFIGURATION MANAGEMENT

3.2.1.13 Ensure 'Allow modifying cellular data app settings' is set to 'Disabled'AirWatch - CIS Apple iOS 11 v1.0.0 Institution Owned L2MDM

CONFIGURATION MANAGEMENT

3.2.1.13 Ensure 'Allow modifying cellular data app settings' is set to 'Disabled'AirWatch - CIS Apple iOS 12 v1.0.0 Institution Owned L2MDM

CONFIGURATION MANAGEMENT

3.2.1.13 Ensure 'Allow modifying cellular data app settings' is set to 'Disabled'MobileIron - CIS Apple iOS 12 v1.0.0 Institution Owned L2MDM

CONFIGURATION MANAGEMENT

3.7 Ensure that registry certificate file ownership is set to root:rootCIS Docker Community Edition v1.1.0 L1 DockerUnix

CONFIGURATION MANAGEMENT

3.11 Ensure that Docker server certificate file ownership is set to root:rootCIS Docker Community Edition v1.1.0 L1 DockerUnix

CONFIGURATION MANAGEMENT

3.13 Ensure that Docker server certificate key file ownership is set to root:rootCIS Docker Community Edition v1.1.0 L1 DockerUnix

CONFIGURATION MANAGEMENT

3.19 Ensure that /etc/default/docker file ownership is set to root:rootCIS Docker Community Edition v1.1.0 L1 DockerUnix

CONFIGURATION MANAGEMENT

4.1 Ensure a user for the container has been createdCIS Docker Community Edition v1.1.0 L1 DockerUnix

ACCESS CONTROL

4.1 Ensure Device is not Obviously JailbrokenMobileIron - CIS Apple iOS 10 v2.0.0 End User Owned L1MDM

ACCESS CONTROL

4.1 Ensure Device is not Obviously JailbrokenMobileIron - CIS Apple iOS 10 v2.0.0 Institution Owned L1MDM

ACCESS CONTROL

4.1 Ensure device is not obviously jailbrokenAirWatch - CIS Apple iOS 11 v1.0.0 End User Owned L1MDM

ACCESS CONTROL

4.1 Ensure device is not obviously jailbrokenAirWatch - CIS Apple iOS 12 v1.0.0 End User Owned L1MDM

ACCESS CONTROL

4.1.12 Ensure use of privileged commands is collectedCIS Ubuntu Linux 14.04 LTS Server L2 v2.1.0Unix

AUDIT AND ACCOUNTABILITY

4.1.12 Ensure use of privileged commands is collectedCIS Ubuntu Linux 14.04 LTS Workstation L2 v2.1.0Unix

AUDIT AND ACCOUNTABILITY

4.1.12 Ensure use of privileged commands is collectedCIS Amazon Linux v2.1.0 L2Unix

AUDIT AND ACCOUNTABILITY

5.1.3 Ensure permissions on /etc/cron.hourly are configuredCIS Ubuntu Linux 14.04 LTS Server L1 v2.1.0Unix

CONFIGURATION MANAGEMENT

5.1.6 Ensure permissions on /etc/cron.monthly are configuredCIS Ubuntu Linux 14.04 LTS Server L1 v2.1.0Unix

CONFIGURATION MANAGEMENT

5.2.1 Ensure permissions on /etc/ssh/sshd_config are configuredCIS Ubuntu Linux 14.04 LTS Workstation L1 v2.1.0Unix

CONFIGURATION MANAGEMENT

6.1 Mongodb Database Running with Least PrivilegesCIS MongoDB 3.2 L1 Unix Audit v1.0.0Unix

ACCESS CONTROL

6.31 Restrict Access to SYSIBMADM.PRIVILEGESCIS IBM DB2 v10 v1.1.0 Database Level 1IBM_DB2DB

ACCESS CONTROL

Audit Sensitive Privilege UseMSCT Windows 10 v2004 v1.0.0Windows

AUDIT AND ACCOUNTABILITY

Audit Sensitive Privilege UseMSCT Windows Server v1909 DC v1.0.0Windows

AUDIT AND ACCOUNTABILITY

Ensure permissions on /etc/cron.monthly are configuredTenable Cisco Firepower Management Center OS Best Practices AuditUnix

CONFIGURATION MANAGEMENT

Ensure permissions on /etc/cron.weekly are configuredTenable Cisco Firepower Management Center OS Best Practices AuditUnix

CONFIGURATION MANAGEMENT

Ensure permissions on /etc/crontab are configuredTenable Cisco Firepower Management Center OS Best Practices AuditUnix

CONFIGURATION MANAGEMENT

Ensure permissions on /etc/motd are configuredTenable Cisco Firepower Management Center OS Best Practices AuditUnix

CONFIGURATION MANAGEMENT