1.2 Use Dedicated Least Privileged Account for MySQL Daemon/Service | CIS MySQL 5.6 Enterprise Linux OS L1 v2.0.0 | Unix | ACCESS CONTROL |
1.2 Use Dedicated Least Privileged Account for MySQL Daemon/Service | CIS MySQL 5.7 Enterprise Linux OS L1 v2.0.0 | Unix | ACCESS CONTROL |
1.2 Use Dedicated Least Privileged Account for MySQL Daemon/Service | CIS MySQL 5.7 Enterprise Windows OS L1 v2.0.0 | Windows | ACCESS CONTROL |
2.1.3 Ensure chrony is not run as the root user | CIS Oracle Linux 8 Workstation L1 v3.0.0 | Unix | ACCESS CONTROL |
2.1.3 Ensure chrony is not run as the root user | CIS Oracle Linux 8 Server L1 v3.0.0 | Unix | ACCESS CONTROL |
2.3.3 Ensure chrony is not run as the root user | CIS Red Hat Enterprise Linux 9 v2.0.0 L1 Server | Unix | ACCESS CONTROL |
2.8 Ensure that security policies restrict User-ID Agent traffic from crossing into untrusted zones | CIS Palo Alto Firewall 9 v1.1.0 L1 | Palo_Alto | ACCESS CONTROL |
3.5 Review Superuser/Admin Roles - clusterAdmin | CIS MongoDB 5 L2 DB v1.2.0 | MongoDB | ACCESS CONTROL |
3.5 Review Superuser/Admin Roles - clusterAdmin | CIS MongoDB 6 L2 DB v1.1.0 | MongoDB | ACCESS CONTROL |
3.5 Review Superuser/Admin Roles - dbAdminAnyDatabase | CIS MongoDB 6 L2 DB v1.1.0 | MongoDB | ACCESS CONTROL |
3.5 Review Superuser/Admin Roles - dbAdminAnyDatabase | CIS MongoDB 5 L2 DB v1.2.0 | MongoDB | ACCESS CONTROL |
3.5 Review Superuser/Admin Roles - dbOwner | CIS MongoDB 5 L2 DB v1.2.0 | MongoDB | ACCESS CONTROL |
3.5 Review Superuser/Admin Roles - hostManager | CIS MongoDB 6 L2 DB v1.1.0 | MongoDB | ACCESS CONTROL |
3.5 Review Superuser/Admin Roles - hostManager | CIS MongoDB 5 L2 DB v1.2.0 | MongoDB | ACCESS CONTROL |
3.5 Review Superuser/Admin Roles - readWriteAnyDatabase | CIS MongoDB 5 L2 DB v1.2.0 | MongoDB | ACCESS CONTROL |
3.5 Review Superuser/Admin Roles - readWriteAnyDatabase | CIS MongoDB 6 L2 DB v1.1.0 | MongoDB | ACCESS CONTROL |
3.5 Review Superuser/Admin Roles - userAdmin | CIS MongoDB 5 L2 DB v1.2.0 | MongoDB | ACCESS CONTROL |
3.5 Review Superuser/Admin Roles - userAdmin | CIS MongoDB 6 L2 DB v1.1.0 | MongoDB | ACCESS CONTROL |
3.5 Review Superuser/Admin Roles - userAdminAnyDatabase | CIS MongoDB 6 L2 DB v1.1.0 | MongoDB | ACCESS CONTROL |
3.5 Review Superuser/Admin Roles - userAdminAnyDatabase | CIS MongoDB 5 L2 DB v1.2.0 | MongoDB | ACCESS CONTROL |
3.6 Review Superuser/Admin Roles - clusterAdmin | CIS MongoDB 3.6 Database Audit L1 v1.1.0 | MongoDB | ACCESS CONTROL |
3.6 Review Superuser/Admin Roles - dbAdminAnyDatabase | CIS MongoDB 3.6 Database Audit L1 v1.1.0 | MongoDB | ACCESS CONTROL |
3.6 Review Superuser/Admin Roles - dbOwner | CIS MongoDB 3.6 Database Audit L1 v1.1.0 | MongoDB | ACCESS CONTROL |
3.6 Review Superuser/Admin Roles - hostManager | CIS MongoDB 3.6 Database Audit L1 v1.1.0 | MongoDB | ACCESS CONTROL |
3.6 Review Superuser/Admin Roles - readWriteAnyDatabase | CIS MongoDB 3.6 Database Audit L1 v1.1.0 | MongoDB | ACCESS CONTROL |
3.6 Review Superuser/Admin Roles - userAdmin | CIS MongoDB 3.6 Database Audit L1 v1.1.0 | MongoDB | ACCESS CONTROL |
3.6 Review Superuser/Admin Roles - userAdminAnyDatabase | CIS MongoDB 3.6 Database Audit L1 v1.1.0 | MongoDB | ACCESS CONTROL |
3.10 Ensure global .NET trust level is configured | CIS IIS 8.0 v1.5.1 Level 1 | Windows | ACCESS CONTROL |
3.10 Ensure global .NET trust level is configured - Applications | CIS IIS 7 L1 v1.8.0 | Windows | ACCESS CONTROL |
3.10 Ensure global .NET trust level is configured - Default | CIS IIS 7 L1 v1.8.0 | Windows | ACCESS CONTROL |
4.5.2 Ensure 'ALL' Is Revoked from Unauthorized 'GRANTEE' on 'USER_HISTORY$' | CIS Oracle Server 11g R2 DB v2.2.0 | OracleDB | ACCESS CONTROL |
4.5.5 Ensure 'ALL' Is Revoked from Unauthorized 'GRANTEE' on 'DBA_%' | CIS Oracle Server 11g R2 DB v2.2.0 | OracleDB | ACCESS CONTROL |
4.5.6 Ensure 'ALL' Is Revoked from Unauthorized 'GRANTEE' on 'SYS.SCHEDULER$_CREDENTIAL' | CIS Oracle Server 11g R2 DB v2.2.0 | OracleDB | ACCESS CONTROL |
5.1 Ensure Only Administrative Users Have Full Database Access | CIS MySQL 5.6 Enterprise Database L1 v2.0.0 | MySQLDB | ACCESS CONTROL |
5.1 Ensure Only Administrative Users Have Full Database Access | CIS MySQL 5.7 Community Database L1 v2.0.0 | MySQLDB | ACCESS CONTROL |
5.1 Ensure Only Administrative Users Have Full Database Access | CIS MySQL 5.7 Enterprise Database L1 v2.0.0 | MySQLDB | ACCESS CONTROL |
5.1 Ensure Only Administrative Users Have Full Database Access | CIS MariaDB 10.6 Database L1 v1.1.0 | MySQLDB | ACCESS CONTROL |
5.1 Ensure Only Administrative Users Have Full Database Access | CIS MariaDB 10.6 on Linux L1 v1.1.0 | Unix | ACCESS CONTROL |
5.1 Ensure Only Administrative Users Have Full Database Access | CIS MySQL 5.6 Community Database L1 v2.0.0 | MySQLDB | ACCESS CONTROL |
13 - Restrict access to temp directory - mode | TNS Best Practice Jetty 9 Linux | Unix | ACCESS CONTROL |
14 - Restrict access to binaries directory - mode | TNS Best Practice Jetty 9 Linux | Unix | ACCESS CONTROL |
15 - Restrict access to web application directory - mode | TNS Best Practice Jetty 9 Linux | Unix | ACCESS CONTROL |
17 - Restrict access to JETTY.properties - owner | TNS Best Practice Jetty 9 Linux | Unix | ACCESS CONTROL |
20.51 Ensure 'Permissions for the system drive root directory must conform to minimum requirements' | CIS Microsoft Windows Server 2019 STIG v2.0.0 STIG DC | Windows | ACCESS CONTROL |
20.51 Ensure 'Permissions for the system drive root directory must conform to minimum requirements' | CIS Microsoft Windows Server 2019 STIG v2.0.0 STIG MS | Windows | ACCESS CONTROL |
40 - Do not allow symbolic linking | TNS Best Practice Jetty 9 Linux | Unix | ACCESS CONTROL |
42 - Do not allow cross context requests | TNS Best Practice Jetty 9 Linux | Unix | ACCESS CONTROL |
Directory access permissions should be restricted. | TNS IBM HTTP Server Best Practice | Windows | ACCESS CONTROL |
FireEye - User 'admin' SSH access is disabled | TNS FireEye | FireEye | ACCESS CONTROL |
Management Services Security - Configure read-only access; use read-write only when required | Juniper Hardening JunOS 12 Devices Checklist | Juniper | ACCESS CONTROL |