Item Search

NameAudit NamePluginCategory
1.3.4 Ensure AIDE is configured to verify XATTRSCIS Amazon Linux 2 STIG v1.0.0 L3Unix

ACCESS CONTROL

1.6.1.1 Ensure AppArmor is installedCIS Ubuntu Linux 16.04 LTS Server L1 v2.0.0Unix

ACCESS CONTROL

1.6.1.2 Ensure AppArmor is enabled in the bootloader configuration - apparmorCIS Ubuntu Linux 16.04 LTS Server L1 v2.0.0Unix

ACCESS CONTROL

1.6.1.2 Ensure AppArmor is enabled in the bootloader configuration - apparmorCIS Ubuntu Linux 16.04 LTS Workstation L1 v2.0.0Unix

ACCESS CONTROL

1.6.1.2 Ensure AppArmor is enabled in the bootloader configuration - securityCIS Ubuntu Linux 16.04 LTS Workstation L1 v2.0.0Unix

ACCESS CONTROL

1.6.1.3 Ensure all AppArmor Profiles are in enforce or complain mode - unconfinedCIS Ubuntu Linux 16.04 LTS Server L1 v2.0.0Unix

ACCESS CONTROL

1.6.2.2 Ensure all AppArmor Profiles are enforcing - 0 processes are unconfinedCIS Debian 9 Server L2 v1.0.1Unix

ACCESS CONTROL

1.7.1.3 Ensure SELinux policy is configured - sestatusCIS Fedora 19 Family Linux Workstation L1 v1.0.0Unix

ACCESS CONTROL

1.7.1.4 Ensure the SELinux mode is enforcing or permissive - getenforceCIS Fedora 19 Family Linux Server L1 v1.0.0Unix

ACCESS CONTROL

1.7.1.5 Ensure the SELinux mode is enforcing - /etc/selinux/configCIS Fedora 19 Family Linux Server L2 v1.0.0Unix

ACCESS CONTROL

1.8.1.4 Ensure permissions on /etc/motd are configuredCIS Fedora 19 Family Linux Server L1 v1.0.0Unix

ACCESS CONTROL

1.8.1.4 Ensure permissions on /etc/motd are configuredCIS Fedora 19 Family Linux Workstation L1 v1.0.0Unix

ACCESS CONTROL

2.2.13 Ensure 'SEC_PROTOCOL_ERROR_FURTHER_ACTION' Is Set to 'DROP,3'CIS Oracle Server 12c DB Traditional Auditing v3.0.0OracleDB

ACCESS CONTROL

2.2.48 (L1) Ensure 'Take ownership of files or other objects' is set to 'Administrators'CIS Windows Server 2012 R2 DC L1 v3.0.0Windows

ACCESS CONTROL

2.2.48 (L1) Ensure 'Take ownership of files or other objects' is set to 'Administrators'CIS Windows Server 2012 DC L1 v3.0.0Windows

ACCESS CONTROL

2.3 Set umask value for DB2 admin user .profile fileCIS IBM DB2 9 Benchmark v3.0.1 Level 1 OS LinuxUnix

ACCESS CONTROL

2.3.10.12 (L1) Ensure 'Network access: Shares that can be accessed anonymously' is set to 'None'CIS Microsoft Windows Server 2019 v3.0.1 L1 MSWindows

ACCESS CONTROL

3.4 The JMXInvokerServlet servlet must be secured against web attacks - 'http-method,'POST' = false'Redhat JBoss EAP 5.xUnix

ACCESS CONTROL

4.4 Ensure logrotate assigns appropriate permissionsCIS Ubuntu Linux 16.04 LTS Server L1 v2.0.0Unix

ACCESS CONTROL

5.1.4 Ensure permissions on /etc/cron.daily are configuredCIS Fedora 19 Family Linux Server L1 v1.0.0Unix

ACCESS CONTROL

5.1.8 Ensure cron is restricted to authorized users - '/etc/cron.allow'CIS Ubuntu Linux 16.04 LTS Server L1 v2.0.0Unix

ACCESS CONTROL

5.1.8 Ensure cron is restricted to authorized users - '/etc/cron.deny'CIS Ubuntu Linux 16.04 LTS Workstation L1 v2.0.0Unix

ACCESS CONTROL

5.1.9 Ensure at is restricted to authorized users - '/etc/at.deny'CIS Ubuntu Linux 16.04 LTS Server L1 v2.0.0Unix

ACCESS CONTROL

5.2.2 Ensure permissions on SSH private host key files are configuredCIS Ubuntu Linux 18.04 LXD Host L1 Workstation v1.0.0Unix

ACCESS CONTROL

5.2.2 Ensure permissions on SSH private host key files are configuredCIS Fedora 19 Family Linux Server L1 v1.0.0Unix

ACCESS CONTROL

5.2.3 Ensure permissions on SSH public host key files are configuredCIS Fedora 19 Family Linux Server L1 v1.0.0Unix

ACCESS CONTROL

5.3.3 Ensure permissions on SSH public host key files are configuredCIS Ubuntu Linux 16.04 LTS Workstation L1 v2.0.0Unix

ACCESS CONTROL

5.4.2 Ensure system accounts are non-loginCIS Ubuntu Linux 16.04 LTS Workstation L1 v1.1.0Unix

ACCESS CONTROL

5.4.4 Ensure default user umask is 027 or more restrictive - /etc/bash.bashrcCIS Debian 9 Server L1 v1.0.0Unix

ACCESS CONTROL

5.4.4 Ensure default user umask is 027 or more restrictive - /etc/bash.bashrcCIS Debian 9 Workstation L1 v1.0.0Unix

ACCESS CONTROL

5.4.4 Ensure default user umask is 027 or more restrictive - /etc/profileCIS Debian 9 Workstation L1 v1.0.0Unix

ACCESS CONTROL

5.4.4 Ensure default user umask is 027 or more restrictive - /etc/profile.d/*.shCIS Debian 9 Server L1 v1.0.0Unix

ACCESS CONTROL

5.4.8 Ensure Default user umask is 077CIS Amazon Linux 2 STIG v1.0.0 L3Unix

ACCESS CONTROL

5.5.4 Ensure default user umask is 027 or more restrictive - '/etc/bash.bashrc'CIS Ubuntu Linux 16.04 LTS Workstation L1 v2.0.0Unix

ACCESS CONTROL

5.5.4 Ensure default user umask is 027 or more restrictive - /etc/profile /etc/profile.dCIS Ubuntu Linux 16.04 LTS Workstation L1 v2.0.0Unix

ACCESS CONTROL

5.5.5 Ensure default user umask is 027 or more restrictive - /etc/profile /etc/profile.d/*.shCIS Red Hat EL8 Workstation L1 v1.0.0Unix

ACCESS CONTROL

5.6 Ensure access to the su command is restricted - /etc/groupCIS Debian 9 Server L1 v1.0.0Unix

ACCESS CONTROL

6.1.1 Audit system file permissionsCIS Debian 9 Server L2 v1.0.1Unix

ACCESS CONTROL

6.1.4 Ensure permissions on /etc/group are configuredCIS Fedora 19 Family Linux Server L1 v1.0.0Unix

ACCESS CONTROL

6.2.6 Ensure users' home directories permissions are 750 or more restrictiveCIS Ubuntu Linux 16.04 LTS Server L1 v2.0.0Unix

ACCESS CONTROL

6.2.7 Ensure users' dot files are not group or world writableCIS Ubuntu Linux 16.04 LTS Workstation L1 v2.0.0Unix

ACCESS CONTROL

6.2.8 Ensure users' dot files are not group or world writableCIS Fedora 19 Family Linux Server L1 v1.0.0Unix

ACCESS CONTROL

6.2.11 Ensure users' .netrc Files are not group or world accessibleCIS Fedora 19 Family Linux Server L1 v1.0.0Unix

ACCESS CONTROL

7.2 Ensure appropriate database file permissions are setCIS MongoDB 7 L1 OS Linux v1.0.0Unix

ACCESS CONTROL

7.2 Ensure appropriate database file permissions are setCIS MongoDB 7 L1 OS Windows v1.0.0Windows

ACCESS CONTROL

7.2 Ensure appropriate database file permissions are set.CIS MongoDB 4 L1 OS Linux v1.0.0Unix

ACCESS CONTROL

7.2 Ensure appropriate database file permissions are set.CIS MongoDB 4 L1 OS Windows v1.0.0Windows

ACCESS CONTROL

10.3 Ensure the named_t Process Type is Not in Permissive ModeCIS BIND DNS v1.0.0 L2 Authoritative Name ServerUnix

ACCESS CONTROL

18.10.3.1 (L2) Ensure 'Allow a Windows app to share application data between users' is set to 'Disabled'CIS Microsoft Windows Server 2022 v3.0.0 L2 Domain ControllerWindows

ACCESS CONTROL

18.10.3.1 (L2) Ensure 'Allow a Windows app to share application data between users' is set to 'Disabled'CIS Microsoft Windows Server 2019 Stand-alone v2.0.0 L2 MSWindows

ACCESS CONTROL