1.6.1.1 Ensure SELinux is enabled in the bootloader configuration - security=selinux | CIS Debian 9 Workstation L2 v1.0.1 | Unix | ACCESS CONTROL |
1.6.1.2 Ensure the SELinux state is enforcing | CIS Distribution Independent Linux Workstation L2 v1.1.0 | Unix | ACCESS CONTROL |
1.6.1.2 Ensure the SELinux state is enforcing - /etc/selinux/config | CIS Debian 9 Server L2 v1.0.0 | Unix | ACCESS CONTROL |
1.6.1.3 Ensure SELinux policy is configured | CIS CentOS 6 Workstation L1 v3.0.0 | Unix | ACCESS CONTROL |
1.6.1.3 Ensure SELinux policy is configured | CIS Debian 9 Server L2 v1.0.1 | Unix | ACCESS CONTROL |
1.6.1.3 Ensure SELinux policy is configured | CIS Debian 9 Workstation L2 v1.0.0 | Unix | ACCESS CONTROL |
1.6.1.4 Ensure no unconfined daemons exist | CIS Debian 9 Server L2 v1.0.1 | Unix | ACCESS CONTROL |
1.6.1.4 Ensure no unconfined daemons exist | CIS Debian 9 Workstation L2 v1.0.1 | Unix | ACCESS CONTROL |
1.6.1.6 Ensure no unconfined daemons exist | CIS Distribution Independent Linux Workstation L2 v1.1.0 | Unix | ACCESS CONTROL |
1.6.2.2 Ensure all AppArmor Profiles are enforcing - 0 processes are unconfined | CIS Debian 9 Server L2 v1.0.0 | Unix | ACCESS CONTROL |
1.6.2.2 Ensure all AppArmor Profiles are enforcing - 0 processes are unconfined | CIS Debian 9 Workstation L2 v1.0.0 | Unix | ACCESS CONTROL |
1.6.2.2 Ensure all AppArmor Profiles are enforcing - 0 processes are unconfirmed | CIS Distribution Independent Linux Workstation L2 v1.1.0 | Unix | ACCESS CONTROL |
1.6.2.2 Ensure all AppArmor Profiles are enforcing - 0 profiles are in complain mode | CIS Distribution Independent Linux Workstation L2 v1.1.0 | Unix | ACCESS CONTROL |
1.6.2.2 Ensure all AppArmor Profiles are enforcing - 0 profiles are in complain mode | CIS Distribution Independent Linux Server L2 v1.1.0 | Unix | ACCESS CONTROL |
1.6.2.2 Ensure all AppArmor Profiles are enforcing - complain mode | CIS Debian 9 Workstation L2 v1.0.1 | Unix | ACCESS CONTROL |
1.6.2.2 Ensure all AppArmor Profiles are enforcing - profiles loaded | CIS Debian 9 Workstation L2 v1.0.1 | Unix | ACCESS CONTROL |
1.7.1.2 Ensure AppArmor is enabled in the bootloader configuration - apparmor=1 | CIS Debian Family Server L1 v1.0.0 | Unix | ACCESS CONTROL |
1.7.1.2 Ensure SELinux is not disabled in bootloader configuration - selinux | CIS Fedora 19 Family Linux Workstation L1 v1.0.0 | Unix | ACCESS CONTROL |
1.7.1.3 Ensure all AppArmor Profiles are in enforce or complain mode - 0 processes are unconfined | CIS Debian Family Workstation L1 v1.0.0 | Unix | ACCESS CONTROL |
1.7.1.3 Ensure all AppArmor Profiles are in enforce or complain mode - profiles loaded | CIS Debian Family Server L1 v1.0.0 | Unix | ACCESS CONTROL |
1.7.1.4 Ensure all AppArmor Profiles are enforcing - complain mode | CIS Debian Family Workstation L2 v1.0.0 | Unix | ACCESS CONTROL |
1.7.1.4 Ensure all AppArmor Profiles are enforcing - profiles loaded | CIS Debian Family Server L2 v1.0.0 | Unix | ACCESS CONTROL |
1.7.1.4 Ensure all AppArmor Profiles are enforcing - profiles loaded | CIS Debian Family Workstation L2 v1.0.0 | Unix | ACCESS CONTROL |
1.7.1.4 Ensure the SELinux mode is enforcing or permissive - getenforce | CIS Fedora 19 Family Linux Workstation L1 v1.0.0 | Unix | ACCESS CONTROL |
1.7.1.5 Ensure the SELinux mode is enforcing - /etc/selinux/config | CIS Fedora 19 Family Linux Workstation L2 v1.0.0 | Unix | ACCESS CONTROL |
1.8.1.5 Ensure permissions on /etc/issue are configured | CIS Fedora 19 Family Linux Server L1 v1.0.0 | Unix | ACCESS CONTROL |
2.3 Set umask value for DB2 admin user .profile file | CIS IBM DB2 v10 v1.1.0 Linux OS Level 1 | Unix | ACCESS CONTROL |
2.3.10.12 (L1) Ensure 'Network access: Shares that can be accessed anonymously' is set to 'None' | CIS Windows Server 2012 DC L1 v3.0.0 | Windows | ACCESS CONTROL |
3.3 Set daemon umask (/etc/* umask) | CIS FreeBSD v1.0.5 | Unix | ACCESS CONTROL |
4.4 Ensure logrotate assigns appropriate permissions | CIS Debian Family Workstation L1 v1.0.0 | Unix | ACCESS CONTROL |
5.1.2 Ensure permissions on /etc/crontab are configured | CIS Fedora 19 Family Linux Server L1 v1.0.0 | Unix | ACCESS CONTROL |
5.1.2 Ensure permissions on /etc/crontab are configured | CIS Fedora 19 Family Linux Workstation L1 v1.0.0 | Unix | ACCESS CONTROL |
5.1.5 Ensure permissions on /etc/cron.weekly are configured | CIS Fedora 19 Family Linux Workstation L1 v1.0.0 | Unix | ACCESS CONTROL |
5.1.6 Ensure permissions on /etc/cron.monthly are configured | CIS Fedora 19 Family Linux Workstation L1 v1.0.0 | Unix | ACCESS CONTROL |
5.1.7 Ensure permissions on /etc/cron.d are configured | CIS Fedora 19 Family Linux Server L1 v1.0.0 | Unix | ACCESS CONTROL |
5.1.7 Ensure permissions on /etc/cron.d are configured | CIS Fedora 19 Family Linux Workstation L1 v1.0.0 | Unix | ACCESS CONTROL |
5.2.1 Ensure permissions on /etc/ssh/sshd_config are configured | CIS Fedora 19 Family Linux Server L1 v1.0.0 | Unix | ACCESS CONTROL |
5.2.3 Ensure permissions on SSH public host key files are configured | CIS Fedora 19 Family Linux Workstation L1 v1.0.0 | Unix | ACCESS CONTROL |
5.3.2 Ensure permissions on SSH private host key files are configured | CIS CentOS 6 Workstation L1 v3.0.0 | Unix | ACCESS CONTROL |
5.6 Ensure access to the su command is restricted - /etc/group | CIS Debian 9 Workstation L1 v1.0.0 | Unix | ACCESS CONTROL |
6.1.1 Audit system file permissions | CIS Fedora 19 Family Linux Workstation L2 v1.0.0 | Unix | ACCESS CONTROL |
6.1.1 Audit system file permissions | CIS Debian 9 Workstation L2 v1.0.1 | Unix | ACCESS CONTROL |
6.1.2 Ensure permissions on /etc/passwd are configured | CIS Fedora 19 Family Linux Server L1 v1.0.0 | Unix | ACCESS CONTROL |
6.1.2 Ensure permissions on /etc/passwd are configured | CIS Fedora 19 Family Linux Workstation L1 v1.0.0 | Unix | ACCESS CONTROL |
6.1.8 Ensure permissions on /etc/group- are configured | CIS Fedora 19 Family Linux Server L1 v1.0.0 | Unix | ACCESS CONTROL |
6.1.8 Ensure permissions on /etc/group- are configured | CIS Fedora 19 Family Linux Workstation L1 v1.0.0 | Unix | ACCESS CONTROL |
6.2.17 Ensure shadow group is empty | CIS Debian Family Server L1 v1.0.0 | Unix | ACCESS CONTROL |
8.8 Set default umask for users (/etc/csh.cshrc) | CIS FreeBSD v1.0.5 | Unix | ACCESS CONTROL |
10.3 Ensure the named_t Process Type is Not in Permissive Mode | CIS BIND DNS v1.0.0 L2 Caching Only Name Server | Unix | ACCESS CONTROL |
CIS Control 14 (14.6) Protect Information Through Access Control Lists | CAS Implementation Group 1 Audit File | Unix | ACCESS CONTROL |