1.1.4 Ensure nosuid option set on /tmp partition | CIS Ubuntu Linux 14.04 LTS Server L1 v2.1.0 | Unix | ACCESS CONTROL |
1.1.7 Ensure nodev option set on /var/tmp partition | CIS Ubuntu Linux 14.04 LTS Workstation L1 v2.1.0 | Unix | ACCESS CONTROL |
1.1.14 Ensure nodev option set on /run/shm partition | CIS Ubuntu Linux 14.04 LTS Server L1 v2.1.0 | Unix | ACCESS CONTROL |
1.1.17 Ensure nodev option set on removable media partitions | CIS Ubuntu Linux 14.04 LTS Server L1 v2.1.0 | Unix | ACCESS CONTROL |
1.1.18 Ensure nosuid option set on removable media partitions | CIS Ubuntu Linux 14.04 LTS Workstation L1 v2.1.0 | Unix | ACCESS CONTROL |
1.4.4 Ensure core dump storage is disabled | CIS Red Hat Enterprise Linux 7 v4.0.0 L1 Server | Unix | ACCESS CONTROL |
2.2 Ensure Access to Sensitive Site Features Is Restricted To Authenticated Principals Only - Applications | CIS IIS 7 L1 v1.8.0 | Windows | ACCESS CONTROL |
2.3.10.2 (L1) Ensure 'Network access: Do not allow anonymous enumeration of SAM accounts' is set to 'Enabled' (MS only) | CIS Microsoft Windows Server 2019 STIG v2.0.0 L1 MS | Windows | ACCESS CONTROL |
2.3.10.4 (L1) Ensure 'Network access: Do not allow anonymous enumeration of SAM accounts and shares' is set to 'Enabled' (MS only) | CIS Microsoft Windows Server 2019 STIG v2.0.0 L1 MS | Windows | ACCESS CONTROL |
2.3.10.12 (L1) Ensure 'Network access: Restrict anonymous access to Named Pipes and Shares' is set to 'Enabled' | CIS Microsoft Windows Server 2019 STIG v2.0.0 L1 MS | Windows | ACCESS CONTROL |
2.3.10.13 (L1) Ensure 'Network access: Restrict clients allowed to make remote calls to SAM' is set to 'Administrators: Remote Access: Allow' (MS only) | CIS Microsoft Windows Server 2019 STIG v2.0.0 L1 MS | Windows | ACCESS CONTROL |
2.3.11.2 (L1) Ensure 'Network security: Allow LocalSystem NULL session fallback' is set to 'Disabled' | CIS Microsoft Windows Server 2019 STIG v2.0.0 L1 DC | Windows | ACCESS CONTROL |
2.3.13.1 (L1) Ensure 'Shutdown: Allow system to be shut down without having to log on' is set to 'Disabled' | CIS Microsoft Windows Server 2019 STIG v2.0.0 L1 MS | Windows | ACCESS CONTROL |
2.3.17.3 (L1) Ensure 'User Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode' is set to 'Prompt for consent on the secure desktop' or higher | CIS Microsoft Windows Server 2019 STIG v2.0.0 L1 DC | Windows | ACCESS CONTROL |
2.3.17.3 (L1) Ensure 'User Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode' is set to 'Prompt for consent on the secure desktop' or higher | CIS Microsoft Windows Server 2019 STIG v2.0.0 L1 MS | Windows | ACCESS CONTROL |
2.3.17.6 (L1) Ensure 'User Account Control: Detect application installations and prompt for elevation' is set to 'Enabled' | CIS Microsoft Windows Server 2019 STIG v2.0.0 L1 MS | Windows | ACCESS CONTROL |
3.1 Restrict Core Dumps to Protected Directory - global core file content | CIS Solaris 11 L1 v1.1.0 | Unix | ACCESS CONTROL |
3.1 Restrict Core Dumps to Protected Directory - global setid core dumps = enabled | CIS Solaris 11.1 L1 v1.0.0 | Unix | ACCESS CONTROL |
3.1 Restrict Core Dumps to Protected Directory - init core file content | CIS Solaris 11.1 L1 v1.0.0 | Unix | ACCESS CONTROL |
3.2 Restrict Core Dumps to Protected Directory - Check if COREADM_GLOB_ENABLED is set to yes | CIS Solaris 10 L1 v5.2 | Unix | ACCESS CONTROL |
3.2 Restrict Core Dumps to Protected Directory - Check if COREADM_GLOB_PATTERN is set to /var/cores/core_%n_%f_%u_%g_%t_%p | CIS Solaris 10 L1 v5.2 | Unix | ACCESS CONTROL |
3.2 Restrict Core Dumps to Protected Directory - Check if COREADM_GLOB_SETID_ENABLED is set to yes | CIS Solaris 10 L1 v5.2 | Unix | ACCESS CONTROL |
3.2 Restrict Core Dumps to Protected Directory - Check if COREADM_INIT_PATTERN is set to core | CIS Solaris 10 L1 v5.2 | Unix | ACCESS CONTROL |
4.1 Restrict core dumps to protected directory - Check if COREADM_GLOB_PATTERN is set to /var/core/core_%n_%f_%u_%g_%t_%p | CIS Solaris 9 v1.3 | Unix | ACCESS CONTROL |
4.13 listener.ora - 'admin_restrictions_listener_name = on' | CIS v1.1.0 Oracle 11g OS Windows Level 2 | Windows | ACCESS CONTROL |
5.4.2.1 Ensure root is the only UID 0 account | CIS Ubuntu Linux 24.04 LTS v1.0.0 L1 Server | Unix | ACCESS CONTROL |
5.4.2.1 Ensure root is the only UID 0 account | CIS Rocky Linux 9 v2.0.0 L1 Server | Unix | ACCESS CONTROL |
5.5 Ensure root login is restricted to system console | CIS SUSE Linux Enterprise Workstation 11 L1 v2.1.1 | Unix | ACCESS CONTROL |
6.1.11 Audit SUID executables | CIS SUSE Linux Enterprise Server 11 L1 v2.1.1 | Unix | ACCESS CONTROL |
6.1.12 Audit SGID executables | CIS SUSE Linux Enterprise Workstation 11 L1 v2.1.1 | Unix | ACCESS CONTROL |
6.1.12 Audit SGID executables | CIS SUSE Linux Enterprise Server 11 L1 v2.1.1 | Unix | ACCESS CONTROL |
6.2 Add 'nosuid' option to /etc/rmmount.conf, Check if nosuid option is set. | CIS Solaris 9 v1.3 | Unix | ACCESS CONTROL |
6.6 Find Unauthorized SUID/SGID System Executables | CIS Solaris 9 v1.3 | Unix | ACCESS CONTROL |
6.9 Restrict FTP Use | CIS Solaris 11 L1 v1.1.0 | Unix | ACCESS CONTROL |
6.9 Restrict FTP Use | CIS Solaris 11.1 L1 v1.0.0 | Unix | ACCESS CONTROL |
6.9 Restrict FTP Use - /etc/ftpd/ftpusers | CIS Solaris 11.2 L1 v1.1.0 | Unix | ACCESS CONTROL |
6.13 Restrict at/cron to Authorized Users - /etc/cron.d/at.allow | CIS Solaris 11.1 L1 v1.0.0 | Unix | ACCESS CONTROL |
6.14 Restrict root Login to System Console - CONSOLE = /dev/console | CIS Solaris 11 L1 v1.1.0 | Unix | ACCESS CONTROL |
7.4 Create /etc/ftpd/ftpusers | CIS Solaris 9 v1.3 | Unix | ACCESS CONTROL |
7.4 Create /etc/ftpusers | CIS Solaris 9 v1.3 | Unix | ACCESS CONTROL |
7.9 Restrict at/cron To Authorized Users, should pass if 'root' exists in /etc/at.allow. | CIS Solaris 9 v1.3 | Unix | ACCESS CONTROL |
8.2.7 Prevent unauthorized connection of devices. | CIS VMware ESXi 5.5 v1.2.0 Level 1 | VMware | ACCESS CONTROL |
9.1 Check for Remote Consoles | CIS Solaris 11.2 L1 v1.1.0 | Unix | ACCESS CONTROL |
9.1 Check for Remote Consoles | CIS Solaris 11.1 L1 v1.0.0 | Unix | ACCESS CONTROL |
10.1 SN.1 Restrict access to suspend feature | CIS Solaris 11.2 L2 v1.1.0 | Unix | ACCESS CONTROL |
18.9.27.7 (L1) Ensure 'Turn on convenience PIN sign-in' is set to 'Disabled' | CIS Microsoft Windows Server 2019 STIG v2.0.0 L1 MS | Windows | ACCESS CONTROL |
18.10.14.2 (L1) Ensure 'Enumerate administrator accounts on elevation' is set to 'Disabled' | CIS Microsoft Windows Server 2019 STIG v2.0.0 STIG DC | Windows | ACCESS CONTROL |
18.10.87.2 (L1) Ensure 'Turn on PowerShell Transcription' is set to 'Enabled' | CIS Microsoft Windows Server 2019 STIG v2.0.0 L1 MS | Windows | ACCESS CONTROL |
45.18 (L1) Ensure 'Network access: Do not allow anonymous enumeration of SAM accounts' is set to 'Enabled' | CIS Microsoft Intune for Windows 11 v3.0.1 L1 | Windows | ACCESS CONTROL |
45.29 (L1) Ensure 'User Account Control: Behavior of the elevation prompt for administrators' is set to 'Prompt for consent on the secure desktop' or higher | CIS Microsoft Intune for Windows 11 v3.0.1 L1 | Windows | ACCESS CONTROL |