Item Search

NameAudit NamePluginCategory
1.3.7 Ensure 'Required Password Change Period' is less than or equal to 90 daysCIS Palo Alto Firewall 9 v1.1.0 L1Palo_Alto

ACCESS CONTROL

1.8 Ensure that users who did not log in for 90 days are disabledCIS Snowflake Foundations v1.0.0 L1Snowflake

ACCESS CONTROL

2.2.16 (L1) Ensure 'Deny access to this computer from the network' to include 'Guests, Local account'CIS Microsoft Windows 8.1 v2.4.1 L1 BitlockerWindows

ACCESS CONTROL

2.2.19 (L1) Ensure 'Deny log on locally' to include 'Guests'CIS Microsoft Windows 8.1 v2.4.1 L1 BitlockerWindows

ACCESS CONTROL

2.3.1.2 (L1) Ensure 'Accounts: Block Microsoft accounts' is set to 'Users can't add or log on with Microsoft accounts'CIS Microsoft Windows 8.1 v2.4.1 L1 BitlockerWindows

ACCESS CONTROL

2.3.1.5 (L1) Configure 'Accounts: Rename administrator account'CIS Microsoft Windows 8.1 v2.4.1 L1 BitlockerWindows

ACCESS CONTROL

2.7 (L1) Ensure expired and revoked SSL certificates are removed from the ESXi serverCIS VMware ESXi 7.0 v1.4.0 L1 Bare MetalUnix

ACCESS CONTROL

2.7 Ensure expired and revoked SSL certificates are removed from the ESXi serverCIS VMware ESXi 6.7 v1.3.0 Level 1 Bare MetalUnix

ACCESS CONTROL

2.7 Lock Out Accounts if Not Currently in UseCIS MariaDB 10.6 on Linux L2 v1.1.0Unix

ACCESS CONTROL

2.8 Lock Out Accounts if Not Currently in UseCIS MySQL 5.7 Enterprise Database L2 v2.0.0MySQLDB

ACCESS CONTROL

2.11 Lock Out Accounts if Not Currently in UseCIS MySQL 8.0 Enterprise Database L2 v1.3.0MySQLDB

ACCESS CONTROL

2.13 Ensure 'sa' Login Account is set to 'Disabled'CIS SQL Server 2014 Database L1 DB v1.5.0MS_SQLDB

ACCESS CONTROL

2.13 Ensure the 'sa' Login Account is set to 'Disabled'CIS SQL Server 2016 Database L1 DB v1.4.0MS_SQLDB

ACCESS CONTROL

2.13 Ensure the 'sa' Login Account is set to 'Disabled'CIS Microsoft SQL Server 2019 v1.4.0 L1 Database EngineMS_SQLDB

ACCESS CONTROL

2.13 Ensure the 'sa' Login Account is set to 'Disabled'CIS SQL Server 2022 Database L1 DB v1.1.0MS_SQLDB

ACCESS CONTROL

2.14 Ensure 'sa' Login Account is set to 'Disabled'CIS SQL Server 2008 R2 DB Engine L1 v1.7.0MS_SQLDB

ACCESS CONTROL

3.3 Ensure 'Orphaned Users' are Dropped From SQL Server DatabasesCIS SQL Server 2012 Database L1 AWS RDS v1.6.0MS_SQLDB

ACCESS CONTROL

3.3 Ensure the Apache User Account Is LockedCIS Apache HTTP Server 2.4 L1 v2.1.0 MiddlewareUnix

ACCESS CONTROL

3.3 Ensure the Apache User Account Is LockedCIS Apache HTTP Server 2.2 L1 v3.6.0Unix

ACCESS CONTROL

3.3 Ensure the Apache User Account Is LockedCIS Apache HTTP Server 2.2 L1 v3.6.0 MiddlewareUnix

ACCESS CONTROL

3.9 Ensure 'INACTIVE_ACCOUNT_TIME' Is Less than or Equal to '120'CIS Oracle Server 19c DB Unified Auditing v1.2.0OracleDB

ACCESS CONTROL

4.2 Ensure 'CHECK_EXPIRATION' Option is set to 'ON' for All SQL Authenticated Logins Within the Sysadmin RoleCIS SQL Server 2016 Database L1 AWS RDS v1.4.0MS_SQLDB

ACCESS CONTROL

4.2 Ensure 'CHECK_EXPIRATION' Option is set to 'ON' for All SQL Authenticated Logins Within the Sysadmin RoleCIS SQL Server 2017 Database L1 AWS RDS v1.3.0MS_SQLDB

ACCESS CONTROL

4.2 Ensure 'CHECK_EXPIRATION' Option is set to 'ON' for All SQL Authenticated Logins Within the Sysadmin RoleCIS SQL Server 2022 Database L1 DB v1.1.0MS_SQLDB

ACCESS CONTROL

4.2 Ensure 'CHECK_EXPIRATION' Option is set to 'ON' for All SQL Authenticated Logins Within the Sysadmin RoleCIS SQL Server 2008 R2 DB Engine L1 v1.7.0MS_SQLDB

ACCESS CONTROL

4.2 Ensure 'CHECK_EXPIRATION' Option is set to 'ON' for All SQL Authenticated Logins Within the Sysadmin RoleCIS SQL Server 2012 Database L1 DB v1.6.0MS_SQLDB

ACCESS CONTROL

5.1.5 Ensure that default service accounts are not actively used.CIS RedHat OpenShift Container Platform v1.6.0 L1OpenShift

ACCESS CONTROL

5.3.2 Ensure 'Access reviews' for Guest Users are configuredCIS Microsoft 365 Foundations E5 L1 v3.1.0microsoft_azure

ACCESS CONTROL

5.4.1.4 Ensure inactive password lock is 30 days or less - useraddCIS SUSE Linux Enterprise Server 11 L1 v2.1.1Unix

ACCESS CONTROL

5.4.1.4 Ensure inactive password lock is 30 days or less - useraddCIS Ubuntu Linux 14.04 LTS Server L1 v2.1.0Unix

ACCESS CONTROL

5.4.1.4 Ensure inactive password lock is 30 days or less - useraddCIS Amazon Linux v2.1.0 L1Unix

ACCESS CONTROL

5.4.1.4 Ensure inactive password lock is 30 days or less - usersCIS SUSE Linux Enterprise Server 11 L1 v2.1.1Unix

ACCESS CONTROL

5.4.1.4 Ensure inactive password lock is 30 days or less - usersCIS Ubuntu Linux 14.04 LTS Server L1 v2.1.0Unix

ACCESS CONTROL

6.9 Disable root login for SSHCIS Oracle Solaris 11.4 L1 v1.1.0Unix

ACCESS CONTROL

6.14 Disable 'nobody' Access for RPC Encryption Key Storage ServiceCIS Oracle Solaris 11.4 L1 v1.1.0Unix

ACCESS CONTROL

6.16 Restrict root Login to System ConsoleCIS Oracle Solaris 11.4 L1 v1.1.0Unix

ACCESS CONTROL

7.4 Set 'default_password_lifetime' to Require a Yearly Password ChangeCIS MySQL 8.0 Community Database L1 v1.0.0MySQLDB

ACCESS CONTROL

7.5 Set 'default_password_lifetime' to Require a Yearly Password ChangeCIS MySQL 5.7 Community Database L1 v2.0.0MySQLDB

ACCESS CONTROL

7.5 Set 'default_password_lifetime' to Require a Yearly Password ChangeCIS MySQL 5.7 Enterprise Database L1 v2.0.0MySQLDB

ACCESS CONTROL

7.6 Lock Inactive User Accounts - useradd -D, 35CIS Solaris 11 L1 v1.1.0Unix

ACCESS CONTROL

18.2.2 (L1) Ensure 'Do not allow password expiration time longer than required by policy' is set to 'Enabled'CIS Microsoft Windows 8.1 v2.4.1 L1 BitlockerWindows

ACCESS CONTROL

18.3.2 (L1) Ensure 'Do not allow password expiration time longer than required by policy' is set to 'Enabled' (MS only)CIS Microsoft Windows Server 2019 STIG v2.0.0 L1 MSWindows

ACCESS CONTROL

20.44 Ensure 'Orphaned security identifiers (SIDs) must be removed from user rights'CIS Microsoft Windows Server 2019 STIG v2.0.0 STIG DCWindows

ACCESS CONTROL

20.45 Ensure 'Outdated or unused accounts are removed or disabled'CIS Microsoft Windows Server 2019 STIG v2.0.0 STIG MSWindows

ACCESS CONTROL

20.46 Ensure 'Passwords are configured to expire'CIS Microsoft Windows Server 2019 STIG v2.0.0 STIG DCWindows

ACCESS CONTROL

20.62 Ensure 'Temporary user accounts must be automatically removed or disabled after 72 hours'CIS Microsoft Windows Server 2022 STIG v1.0.0 STIG DCWindows

ACCESS CONTROL

20.62 Ensure 'Temporary user accounts must be automatically removed or disabled after 72 hours'CIS Microsoft Windows Server 2022 STIG v1.0.0 STIG MSWindows

ACCESS CONTROL

20.63 Ensure 'Temporary user accounts must be automatically removed or disabled after 72 hours'CIS Microsoft Windows Server 2016 STIG v3.0.0 STIG MSWindows

ACCESS CONTROL

20.63 Ensure 'Temporary user accounts must be automatically removed or disabled after 72 hours'CIS Microsoft Windows Server 2019 STIG v2.0.0 STIG MSWindows

ACCESS CONTROL

CIS Control 16 (16.8(b)) Disable Any Unassociated AccountsCAS Implementation Group 1 Audit FileUnix

ACCESS CONTROL