1.6.1.3 Ensure SELinux policy is configured - 'Policy from config file' | CIS Ubuntu Linux 14.04 LTS Workstation L2 v2.1.0 | Unix | ACCESS CONTROL |
1.6.1.3 Ensure SELinux policy is configured - 'SELINUXTYPE' | CIS Ubuntu Linux 14.04 LTS Server L2 v2.1.0 | Unix | ACCESS CONTROL |
2.2 Ensure IAM Policy for EC2 IAM Roles for App tier is configured | CIS Amazon Web Services Three-tier Web Architecture L1 1.0.0 | amazon_aws | ACCESS CONTROL |
2.2.27 Ensure 'Deny log on as a service' to include 'Enterprise Admins Group and Domain Admins Group' (STIG MS only) | CIS Microsoft Windows Server 2016 STIG v3.0.0 STIG MS | Windows | ACCESS CONTROL |
2.2.29 Ensure 'Deny log on locally' to include 'Guests, Enterprise Admins group, and Domain Admins group' (STIG MS only) | CIS Microsoft Windows Server 2016 STIG v3.0.0 STIG MS | Windows | ACCESS CONTROL |
2.4.2 Restrict BIND Access with SELinux 'named_disable_trans' | CIS ISC BIND 9.0/9.5 v2.0.0 | Unix | ACCESS CONTROL |
2.13.2 - PCM - enhanced RBAC (AIX 6.1 only) - 'lskst -t auth info' | CIS AIX 5.3/6.1 L2 v1.1.0 | Unix | ACCESS CONTROL |
2.13.2 - PCM - enhanced RBAC (AIX 6.1 only) - 'lskst -t cmd info' | CIS AIX 5.3/6.1 L2 v1.1.0 | Unix | ACCESS CONTROL |
2.13.2 - PCM - enhanced RBAC (AIX 6.1 only) - 'lskst -t domobj info' | CIS AIX 5.3/6.1 L2 v1.1.0 | Unix | ACCESS CONTROL |
3.1.10 Authenticate federated users at the instance level | CIS IBM DB2 v10 v1.1.0 Linux OS Level 1 | Unix | ACCESS CONTROL |
3.1.11 Authenticate federated users at the instance level | CIS IBM DB2 9 Benchmark v3.0.1 Level 1 DB | IBM_DB2DB | ACCESS CONTROL |
3.1.11 Authenticate federated users at the instance level - 'fed_noauth = no' | CIS IBM DB2 OS L2 v1.2.0 | Unix | ACCESS CONTROL |
4.1.1.10 Ensure access on /var/adm/cron/at.allow is configured | CIS IBM AIX 7 v1.0.0 L1 | Unix | ACCESS CONTROL |
4.2.8 Ensure 'Block Window Management permission on these sites' Is Configured | CIS Google Chrome L2 v3.0.0 | Windows | ACCESS CONTROL |
4.3 Ensure excessive administrative privileges are revoked | CIS PostgreSQL 9.5 OS v1.1.0 | Unix | ACCESS CONTROL |
4.5 Activate AppArmor - 'Profiles are loaded' - Review | CIS Ubuntu 12.04 LTS Benchmark L2 v1.1.0 | Unix | ACCESS CONTROL |
4.5 Activate AppArmor - GRUB_CMDLINE_LINUX - apparmor=1 | CIS Debian Linux 7 L2 v1.0.0 | Unix | ACCESS CONTROL |
4.5 Activate AppArmor - GRUB_CMDLINE_LINUX - security=apparmor | CIS Debian Linux 7 L2 v1.0.0 | Unix | ACCESS CONTROL |
5.1 Use secure Realms | CIS Apache Tomcat 9 L2 v1.2.0 | Unix | ACCESS CONTROL |
5.1 Use secure Realms | CIS Apache Tomcat 9 L2 v1.2.0 Middleware | Unix | ACCESS CONTROL |
5.3 Reduce the sudo timeout period | CIS Apple OSX 10.10 Yosemite L1 v1.2.0 | Unix | ACCESS CONTROL |
5.3 Reduce the sudo timeout period | CIS Apple OSX 10.11 El Capitan L1 v1.1.0 | Unix | ACCESS CONTROL |
5.5 Use a separate timestamp for each user/tty combo | CIS Apple macOS 10.13 L1 v1.1.0 | Unix | ACCESS CONTROL |
6.11 Set 'Never allow users to specify groups when restricting permission for documents' to 'Enabled' | CIS MS Office Outlook 2010 v1.0.0 | Windows | ACCESS CONTROL |
8.1 Block system accounts, Ensure account 'listen' is locked. | CIS Solaris 9 v1.3 | Unix | ACCESS CONTROL |
8.1 Block system accounts, Ensure account 'smtp' is locked. | CIS Solaris 9 v1.3 | Unix | ACCESS CONTROL |
8.1 Block System Accounts, should pass if the default shell for 'adm' is set to /dev/null. | CIS Solaris 9 v1.3 | Unix | ACCESS CONTROL |
8.1 Block System Accounts, should pass if the default shell for 'smmsp' is set to /dev/null. | CIS Solaris 9 v1.3 | Unix | ACCESS CONTROL |
8.4.1 Control access to VMs through the dvfilter network APIs | CIS VMware ESXi 5.1 v1.0.1 Level 1 | VMware | ACCESS CONTROL |
10. OpenStack Compute - Policy.json - 'os_compute_api:os-console-auth-tokens' | TNS OpenStack Nova/Compute Security Guide | Unix | ACCESS CONTROL |
20.2 (L1) Ensure 'Event Logs are protected' | CIS Microsoft Windows 10 EMS Gateway v3.0.0 L1 | Windows | ACCESS CONTROL |
20.37 Ensure 'Non-administrative accounts or groups only have print permissions on printer shares' | CIS Microsoft Windows Server 2022 STIG v1.0.0 STIG MS | Windows | ACCESS CONTROL |
20.47 Ensure 'Permissions for program file directories must conform to minimum requirements' | CIS Microsoft Windows Server 2019 STIG v2.0.0 STIG MS | Windows | ACCESS CONTROL |
105. OpenStack Compute - Policy.json - 'os_compute_api:os-flavor-extra-specs:delete' | TNS OpenStack Nova/Compute Security Guide | Unix | ACCESS CONTROL |
108. OpenStack Compute - Policy.json - 'admin_or_owner' | TNS OpenStack Nova/Compute Security Guide | Unix | ACCESS CONTROL |
Ensure 'HTTP source restriction' is set to an authorized IP address | Tenable Cisco Firepower Threat Defense Best Practices Audit | Cisco_Firepower | ACCESS CONTROL |
ESXi : verify-dvfilter-bind | VMWare vSphere 5.X Hardening Guide | VMware | ACCESS CONTROL |
IBM i : Allow User Domain Objects (QALWUSRDMN) - '*ALL' | IBM System i Security Reference for V7R3 | AS/400 | ACCESS CONTROL |
IBM i : Use Adopted Authority (QUSEADPAUT) - AUTH_LIST_NAME | IBM System i Security Reference for V7R1 and V6R1 | AS/400 | ACCESS CONTROL |
Network access: Allow anonymous SID/Name translation | MSCT Windows Server v20H2 MS v1.0.0 | Windows | ACCESS CONTROL |
Network access: Allow anonymous SID/Name translation | MSCT Windows 10 1903 v1.19.9 | Windows | ACCESS CONTROL |
Network access: Allow anonymous SID/Name translation | MSCT Windows 10 1909 v1.0.0 | Windows | ACCESS CONTROL |
Network access: Allow anonymous SID/Name translation | MSCT Windows 10 v2004 v1.0.0 | Windows | ACCESS CONTROL |
Network access: Allow anonymous SID/Name translation | MSCT Windows 11 v22H2 v1.0.0 | Windows | ACCESS CONTROL |
Network access: Allow anonymous SID/Name translation | MSCT Windows Server 2022 v1.0.0 | Windows | ACCESS CONTROL |
Remote user login policy | Tenable Cisco ACI | Cisco_ACI | ACCESS CONTROL |
User IDs which disclose the privileges associated with it, should not be created. 'nologin' | TNS IBM HTTP Server Best Practice | Unix | ACCESS CONTROL |
VM : verify-network-filter | VMWare vSphere 5.X Hardening Guide | VMware | ACCESS CONTROL |
vNetwork : verify-dvfilter-bind | VMWare vSphere 6.0 Hardening Guide | VMware | ACCESS CONTROL |
vNetwork : verify-dvfilter-bind | VMWare vSphere 6.5 Hardening Guide | VMware | ACCESS CONTROL |