| 1.1.2.1.1 Ensure /tmp is tmpfs or a separate partition | CIS Red Hat Enterprise Linux 8 v4.0.0 L1 Server | Unix | CONFIGURATION MANAGEMENT |
| 1.1.2.1.1 Ensure /tmp is tmpfs or a separate partition | CIS Rocky Linux 8 v3.0.0 L1 Workstation | Unix | CONFIGURATION MANAGEMENT |
| 1.1.2.1.1 Ensure /tmp is tmpfs or a separate partition | CIS AlmaLinux OS 10 v1.0.0 L1 Server | Unix | CONFIGURATION MANAGEMENT |
| 1.3.1.4 Ensure the SELinux mode is not disabled | CIS Oracle Linux 10 v1.0.0 L1 Server | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
| 1.3.1.4 Ensure the SELinux mode is not disabled | CIS Oracle Linux 8 v4.0.0 L1 Server | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
| 1.3.1.4 Ensure the SELinux mode is not disabled | CIS Oracle Linux 8 v4.0.0 L1 Workstation | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
| 1.3.1.5 Ensure the SELinux mode is enforcing | CIS Oracle Linux 8 v4.0.0 L2 Workstation | Unix | SYSTEM AND INFORMATION INTEGRITY |
| 1.4.2 Ensure access to bootloader config is configured | CIS Red Hat Enterprise Linux 8 v4.0.0 L1 Server | Unix | CONFIGURATION MANAGEMENT |
| 1.4.2 Ensure access to bootloader config is configured | CIS Oracle Linux 10 v1.0.0 L1 Server | Unix | CONFIGURATION MANAGEMENT |
| 1.5.5 Ensure kernel.dmesg_restrict is configured | CIS Red Hat Enterprise Linux 8 v4.0.0 L1 Server | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
| 1.6.1.3 Ensure all AppArmor Profiles are in enforce or complain mode - loaded | CIS Ubuntu Linux 16.04 LTS Workstation L1 v2.0.0 | Unix | ACCESS CONTROL |
| 1.6.1.3 Ensure SELinux policy is configured | CIS CentOS 6 Server L1 v3.0.0 | Unix | ACCESS CONTROL |
| 1.6.1.4 Ensure all AppArmor Profiles are enforcing - unconfined | CIS Ubuntu Linux 16.04 LTS Workstation L2 v2.0.0 | Unix | ACCESS CONTROL |
| 1.6.1.4 Ensure the SELinux mode is enforcing or permissive - getenforce | CIS CentOS 6 Workstation L1 v3.0.0 | Unix | ACCESS CONTROL |
| 2.2.45 (L1) Ensure 'Take ownership of files or other objects' is set to 'Administrators' | CIS Azure Compute Microsoft Windows Server 2022 v1.0.0 L1 DC | Windows | ACCESS CONTROL |
| 2.3.10.12 Ensure 'Network access: Shares that can be accessed anonymously' is set to 'None' | CIS Microsoft Windows Server 2025 v2.0.0 L1 MS | Windows | ACCESS CONTROL |
| 4.4 Ensure logrotate assigns appropriate permissions | CIS Ubuntu Linux 18.04 LXD Host L1 Server v1.0.0 | Unix | ACCESS CONTROL |
| 4.4 Ensure logrotate assigns appropriate permissions | CIS Ubuntu Linux 18.04 LXD Host L1 Workstation v1.0.0 | Unix | ACCESS CONTROL |
| 5.1.2.1 Ensure access to at is configured | CIS Amazon Linux 2 v4.0.0 L1 Server | Unix | ACCESS CONTROL |
| 5.1.3 Ensure access to SSH public host key files is configured | CIS AlmaLinux OS 10 v1.0.0 L1 Workstation | Unix | CONFIGURATION MANAGEMENT |
| 5.1.4 Ensure access to SSH private host key files is configured | CIS Rocky Linux 8 v3.0.0 L1 Workstation | Unix | CONFIGURATION MANAGEMENT |
| 5.3.1 Ensure permissions on /etc/ssh/sshd_config are configured | CIS Ubuntu Linux 16.04 LTS Workstation L1 v2.0.0 | Unix | ACCESS CONTROL |
| 5.3.3 Ensure permissions on SSH public host key files are configured | CIS Ubuntu Linux 16.04 LTS Server L1 v2.0.0 | Unix | ACCESS CONTROL |
| 5.4.2.1 Ensure root is the only UID 0 account | CIS Red Hat Enterprise Linux 8 v4.0.0 L1 Server | Unix | CONFIGURATION MANAGEMENT |
| 5.4.2.1 Ensure root is the only UID 0 account | CIS Red Hat Enterprise Linux 10 v1.0.1 L1 Server | Unix | CONFIGURATION MANAGEMENT |
| 5.4.2.1 Ensure root is the only UID 0 account | CIS AlmaLinux OS 10 v1.0.0 L1 Server | Unix | CONFIGURATION MANAGEMENT |
| 5.4.3.3 Ensure default user umask is configured | CIS Red Hat Enterprise Linux 8 v4.0.0 L1 Workstation | Unix | CONFIGURATION MANAGEMENT |
| 5.4.3.3 Ensure default user umask is configured | CIS Oracle Linux 10 v1.0.0 L1 Workstation | Unix | CONFIGURATION MANAGEMENT |
| 5.4.3.3 Ensure default user umask is configured | CIS Oracle Linux 8 v4.0.0 L1 Workstation | Unix | CONFIGURATION MANAGEMENT |
| 5.4.3.3 Ensure default user umask is configured | CIS Red Hat Enterprise Linux 10 v1.0.1 L1 Server | Unix | CONFIGURATION MANAGEMENT |
| 5.4.3.3 Ensure default user umask is configured | CIS AlmaLinux OS 10 v1.0.0 L1 Workstation | Unix | CONFIGURATION MANAGEMENT |
| 5.5.3 Ensure default group for the root account is GID 0 | CIS Ubuntu Linux 16.04 LTS Server L1 v2.0.0 | Unix | ACCESS CONTROL |
| 6.2.5 Ensure users own their home directories | CIS Ubuntu Linux 16.04 LTS Workstation L1 v2.0.0 | Unix | ACCESS CONTROL |
| 6.3.4.3 Ensure audit log files owner is configured | CIS Red Hat Enterprise Linux 10 v1.0.1 L2 Server | Unix | CONFIGURATION MANAGEMENT |
| 6.3.4.3 Ensure audit log files owner is configured | CIS Red Hat Enterprise Linux 8 v4.0.0 L2 Server | Unix | CONFIGURATION MANAGEMENT |
| 6.3.4.5 Ensure audit configuration files mode is configured | CIS Red Hat Enterprise Linux 10 v1.0.1 L2 Server | Unix | AUDIT AND ACCOUNTABILITY |
| 6.3.4.5 Ensure audit configuration files mode is configured | CIS Oracle Linux 10 v1.0.0 L2 Server | Unix | AUDIT AND ACCOUNTABILITY |
| 6.3.4.5 Ensure audit configuration files mode is configured | CIS Oracle Linux 10 v1.0.0 L2 Workstation | Unix | AUDIT AND ACCOUNTABILITY |
| 7.1.11 Ensure world writable files and directories are secured | CIS Red Hat Enterprise Linux 10 v1.0.1 L1 Workstation | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
| 7.1.11 Ensure world writable files and directories are secured | CIS Rocky Linux 8 v3.0.0 L1 Workstation | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
| 7.1.12 Ensure no files or directories without an owner and a group exist | CIS Oracle Linux 8 v4.0.0 L1 Workstation | Unix | CONFIGURATION MANAGEMENT |
| 7.1.12 Ensure no files or directories without an owner and a group exist | CIS Red Hat Enterprise Linux 10 v1.0.1 L1 Server | Unix | CONFIGURATION MANAGEMENT |
| 7.2.8 Ensure local interactive user home directories are configured | CIS Red Hat Enterprise Linux 8 v4.0.0 L1 Server | Unix | CONFIGURATION MANAGEMENT |
| 7.6 Ensure directory in logging.properties is a secure location - check log directory location | CIS Apache Tomcat 8 L1 v1.1.0 | Unix | ACCESS CONTROL |
| 7.6 Ensure directory in logging.properties is a secure location - check log directory location | CIS Apache Tomcat 8 L1 v1.1.0 Middleware | Unix | ACCESS CONTROL |
| 7.6 Ensure directory in logging.properties is a secure location - check prefix application name | CIS Apache Tomcat 8 L1 v1.1.0 | Unix | ACCESS CONTROL |
| 18.10.4.1 Ensure 'Allow a Windows app to share application data between users' is set to 'Disabled' | CIS Microsoft Windows Server 2025 v2.0.0 L2 MS | Windows | ACCESS CONTROL |
| 18.10.4.1 Ensure 'Allow a Windows app to share application data between users' is set to 'Disabled' | CIS Microsoft Windows Server 2022 Stand-alone v2.0.0 L2 MS | Windows | ACCESS CONTROL |
| 19.7.26.1 Ensure 'Prevent users from sharing files within their profile.' is set to 'Enabled' | CIS Microsoft Windows 11 Stand-alone v5.0.0 L1 | Windows | ACCESS CONTROL |
| 19.7.26.1 Ensure 'Prevent users from sharing files within their profile.' is set to 'Enabled' | CIS Microsoft Windows 11 Enterprise v5.0.1 L1 | Windows | ACCESS CONTROL |