Item Search

NameAudit NamePluginCategory
1.2 Use Dedicated Least Privileged Account for MySQL Daemon/ServiceCIS MySQL 5.6 Enterprise Linux OS L1 v2.0.0Unix

ACCESS CONTROL

1.2 Use Dedicated Least Privileged Account for MySQL Daemon/ServiceCIS MySQL 5.7 Enterprise Linux OS L1 v2.0.0Unix

ACCESS CONTROL

1.2 Use Dedicated Least Privileged Account for MySQL Daemon/ServiceCIS MySQL 5.7 Enterprise Windows OS L1 v2.0.0Windows

ACCESS CONTROL

2.1.3 Ensure chrony is not run as the root userCIS AlmaLinux OS 8 Server L1 v3.0.0Unix

ACCESS CONTROL

2.1.3 Ensure chrony is not run as the root userCIS Oracle Linux 8 Server L1 v3.0.0Unix

ACCESS CONTROL

2.12.18 - Miscellaneous Config - unnecessary user and group removal - 'lpd account has been removed'CIS AIX 5.3/6.1 L2 v1.1.0Unix

ACCESS CONTROL

2.12.18 - Miscellaneous Config - unnecessary user and group removal - 'printq group has been removed'CIS AIX 5.3/6.1 L2 v1.1.0Unix

ACCESS CONTROL

2.12.18 - Miscellaneous Config - unnecessary user and group removal - 'uucp account has been removed'CIS AIX 5.3/6.1 L2 v1.1.0Unix

ACCESS CONTROL

3.10 Ensure global .NET trust level is configuredCIS IIS 8.0 v1.5.1 Level 1Windows

ACCESS CONTROL

3.10 Ensure global .NET trust level is configured - ApplicationsCIS IIS 7 L1 v1.8.0Windows

ACCESS CONTROL

3.10 Ensure global .NET trust level is configured - DefaultCIS IIS 7 L1 v1.8.0Windows

ACCESS CONTROL

4.1 Create a user for the containerCIS Docker 1.12.0 v1.0.0 L1 DockerUnix

ACCESS CONTROL

4.7 Restrict access to Tomcat web application directoryCIS Apache Tomcat 7 L1 v1.1.0 MiddlewareUnix

ACCESS CONTROL

4.10 Restrict access to Tomcat context.xmlCIS Apache Tomcat 7 L1 v1.1.0Unix

ACCESS CONTROL

4.11 Restrict access to Tomcat logging.propertiesCIS Apache Tomcat 7 L1 v1.1.0Unix

ACCESS CONTROL

4.13 Restrict access to Tomcat tomcat-users.xmlCIS Apache Tomcat 7 L1 v1.1.0Unix

ACCESS CONTROL

4.13 Restrict access to Tomcat tomcat-users.xmlCIS Apache Tomcat 7 L1 v1.1.0 MiddlewareUnix

ACCESS CONTROL

5.1.2 Minimize access to secretsCIS Kubernetes v1.10.0 L1 MasterUnix

ACCESS CONTROL

5.1.2.4 Ensure 'Restrict access to the Azure AD administration portal' is set to 'Yes'CIS Microsoft 365 Foundations E3 L1 v3.1.0microsoft_azure

ACCESS CONTROL

5.2.2.8 Ensure admin center access is limited to administrative rolesCIS Microsoft 365 Foundations E3 L1 v3.1.0microsoft_azure

ACCESS CONTROL

5.7.1 Create administrative boundaries between resources using namespacesCIS Kubernetes v1.10.0 L1 MasterUnix

ACCESS CONTROL

6.3 Restrict Access to SYSCAT.DBAUTHCIS IBM DB2 v10 v1.1.0 Database Level 2IBM_DB2DB

ACCESS CONTROL

6.3 Restrict Access to SYSCAT.DBAUTHCIS IBM DB2 9 Benchmark v3.0.1 Level 1 DBIBM_DB2DB

ACCESS CONTROL

6.4 Restrict Access to SYSCAT.COLAUTHCIS IBM DB2 9 Benchmark v3.0.1 Level 1 DBIBM_DB2DB

ACCESS CONTROL

6.4 Restrict Access to SYSCAT.COLAUTHCIS IBM DB2 9 Benchmark v3.0.1 Level 2 DBIBM_DB2DB

ACCESS CONTROL

6.6 Restrict Access to SYSCAT.EVENTTABLESCIS IBM DB2 9 Benchmark v3.0.1 Level 2 DBIBM_DB2DB

ACCESS CONTROL

6.7 Restrict Access to SYSCAT.ROUTINESCIS IBM DB2 9 Benchmark v3.0.1 Level 1 DBIBM_DB2DB

ACCESS CONTROL

6.8 Restrict Access to SYSCAT.INDEXAUTHCIS IBM DB2 9 Benchmark v3.0.1 Level 1 DBIBM_DB2DB

ACCESS CONTROL

6.10 Restrict Access to SYSCAT.PACKAGESCIS IBM DB2 9 Benchmark v3.0.1 Level 1 DBIBM_DB2DB

ACCESS CONTROL

6.10 Restrict Access to SYSCAT.PACKAGESCIS IBM DB2 9 Benchmark v3.0.1 Level 2 DBIBM_DB2DB

ACCESS CONTROL

6.12 Restrict Access to SYSCAT.SECURITYLABELACCESSCIS IBM DB2 9 Benchmark v3.0.1 Level 1 DBIBM_DB2DB

ACCESS CONTROL

6.13 Restrict Access to SYSCAT.SECURITYLABELCOMPONENTELEMENTSCIS IBM DB2 9 Benchmark v3.0.1 Level 1 DBIBM_DB2DB

ACCESS CONTROL

6.13 Restrict Access to SYSCAT.SECURITYLABELCOMPONENTELEMENTSCIS IBM DB2 9 Benchmark v3.0.1 Level 2 DBIBM_DB2DB

ACCESS CONTROL

6.16 Restrict Access to SYSCAT.SECURITYPOLICIESCIS IBM DB2 9 Benchmark v3.0.1 Level 1 DBIBM_DB2DB

ACCESS CONTROL

6.18 Restrict Access to SYSCAT.SECURITYPOLICYEXEMPTIONSCIS IBM DB2 9 Benchmark v3.0.1 Level 2 DBIBM_DB2DB

ACCESS CONTROL

6.19 Restrict Access to SYSCAT.SURROGATEAUTHIDSCIS IBM DB2 9 Benchmark v3.0.1 Level 1 DBIBM_DB2DB

ACCESS CONTROL

6.21 Restrict Access to SYSCAT.ROLESCIS IBM DB2 9 Benchmark v3.0.1 Level 1 DBIBM_DB2DB

ACCESS CONTROL

6.22 Restrict Access to SYSCAT.ROUTINEAUTHCIS IBM DB2 9 Benchmark v3.0.1 Level 2 DBIBM_DB2DB

ACCESS CONTROL

6.23 Restrict Access to SYSCAT.SCHEMAAUTHCIS IBM DB2 9 Benchmark v3.0.1 Level 2 DBIBM_DB2DB

ACCESS CONTROL

6.26 Restrict Access to SYSCAT.STATEMENTSCIS IBM DB2 9 Benchmark v3.0.1 Level 1 DBIBM_DB2DB

ACCESS CONTROL

6.32 Restrict Access to SYSCAT.VARIABLEAUTHCIS IBM DB2 9 Benchmark v3.0.1 Level 1 DBIBM_DB2DB

ACCESS CONTROL

6.32 Restrict Access to SYSCAT.VARIABLEAUTHCIS IBM DB2 9 Benchmark v3.0.1 Level 2 DBIBM_DB2DB

ACCESS CONTROL

6.34 Restrict Access to SYSCAT.XSROBJECTAUTHCIS IBM DB2 9 Benchmark v3.0.1 Level 1 DBIBM_DB2DB

ACCESS CONTROL

6.36 Restrict Access to SYSIBMADM.PRIVILEGESCIS IBM DB2 9 Benchmark v3.0.1 Level 1 DBIBM_DB2DB

ACCESS CONTROL

7.1 Disable System Accounts - Ensure account 'bin' is locked.CIS Solaris 10 L1 v5.2Unix

ACCESS CONTROL

7.1 Disable System Accounts - Ensure account 'lp' disallows password login.CIS Solaris 10 L1 v5.2Unix

ACCESS CONTROL

7.1 Disable System Accounts - Ensure account 'nobody' is locked.CIS Solaris 10 L1 v5.2Unix

ACCESS CONTROL

8.3.26 Set 'Software channel permissions' to 'Enabled:High safety'CIS IE 9 v1.0.0Windows

ACCESS CONTROL

20.51 Ensure 'Permissions for the system drive root directory must conform to minimum requirements'CIS Microsoft Windows Server 2019 STIG v2.0.0 STIG DCWindows

ACCESS CONTROL

20.51 Ensure 'Permissions for the system drive root directory must conform to minimum requirements'CIS Microsoft Windows Server 2019 STIG v2.0.0 STIG MSWindows

ACCESS CONTROL