Item Search

NameAudit NamePluginCategory
1.1.2.2.2 Ensure nodev option set on /dev/shm partitionCIS Oracle Linux 8 Server L1 v3.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

1.1.2.2.3 Ensure nosuid option set on /dev/shm partitionCIS Red Hat EL8 Workstation L1 v3.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

1.1.2.3.1 Ensure separate partition exists for /homeCIS Oracle Linux 7 v4.0.0 L2 WorkstationUnix

ACCESS CONTROL, MEDIA PROTECTION

1.1.2.3.2 Ensure nodev option set on /home partitionCIS Red Hat EL8 Workstation L1 v3.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

1.1.2.3.3 Ensure nosuid option set on /home partitionCIS Red Hat EL8 Workstation L1 v3.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

1.1.2.4.1 Ensure separate partition exists for /varCIS Oracle Linux 7 v4.0.0 L2 WorkstationUnix

ACCESS CONTROL, MEDIA PROTECTION

1.1.2.5.3 Ensure nosuid option set on /var/tmp partitionCIS Oracle Linux 8 Server L1 v3.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

1.1.2.5.4 Ensure noexec option set on /var/tmp partitionCIS Red Hat EL8 Workstation L1 v3.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

1.1.2.6.3 Ensure nosuid option set on /var/log partitionCIS Red Hat EL8 Workstation L1 v3.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

1.1.2.6.4 Ensure noexec option set on /var/log partitionCIS Red Hat EL8 Workstation L1 v3.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

1.1.2.7.2 Ensure nodev option set on /var/log/audit partitionCIS Oracle Linux 8 Server L1 v3.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

1.1.2.7.3 Ensure nosuid option set on /var/log/audit partitionCIS Oracle Linux 8 Server L1 v3.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

1.3.1 Ensure bootloader password is setCIS Oracle Linux 8 Server L1 v3.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

1.3.2 Ensure permissions on bootloader config are configuredCIS Oracle Linux 8 Server L1 v3.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

1.5.1.5 Ensure the SELinux mode is enforcingCIS Oracle Linux 7 v4.0.0 L2 WorkstationUnix

ACCESS CONTROL, MEDIA PROTECTION

1.7.5 Ensure access to /etc/issue is configuredCIS Red Hat EL8 Workstation L1 v3.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

1.7.7 Ensure permissions on /etc/issue.net are configuredCIS Red Hat Enterprise Linux 7 STIG v2.0.0 L1 ServerUnix

ACCESS CONTROL, MEDIA PROTECTION

2.2.2 Ensure the NGINX service account is lockedCIS NGINX Benchmark v2.1.0 L1 ProxyUnix

ACCESS CONTROL, MEDIA PROTECTION

2.2.2 Ensure the NGINX service account is lockedCIS NGINX Benchmark v2.1.0 L1 WebserverUnix

ACCESS CONTROL, MEDIA PROTECTION

2.3.3 Ensure the NGINX process ID (PID) file is securedCIS NGINX Benchmark v2.1.0 L1 ProxyUnix

ACCESS CONTROL, MEDIA PROTECTION

4.1.1.4 Ensure permissions on /etc/cron.daily are configuredCIS Red Hat EL8 Workstation L1 v3.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

4.1.1.5 Ensure permissions on /etc/cron.weekly are configuredCIS Oracle Linux 8 Server L1 v3.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

4.1.1.6 Ensure permissions on /etc/cron.monthly are configuredCIS Red Hat EL8 Workstation L1 v3.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

4.1.1.8 Ensure crontab is restricted to authorized usersCIS Oracle Linux 8 Server L1 v3.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

4.1.1.8 Ensure crontab is restricted to authorized usersCIS Red Hat EL8 Workstation L1 v3.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

4.2.4 Ensure sshd access is configuredCIS Red Hat EL8 Workstation L1 v3.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

4.5.2.2 Ensure root user umask is configuredCIS Oracle Linux 8 Server L1 v3.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

4.5.2.2 Ensure root user umask is configuredCIS Red Hat EL8 Workstation L1 v3.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

4.5.2.4 Ensure root password is setCIS Oracle Linux 8 Server L1 v3.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

4.5.2.4 Ensure root password is setCIS Red Hat EL8 Workstation L1 v3.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

5.1.7 Ensure permissions on /etc/cron.d are configuredCIS Red Hat Enterprise Linux 7 STIG v2.0.0 L1 ServerUnix

ACCESS CONTROL, MEDIA PROTECTION

5.1.8 Ensure cron is restricted to authorized users - /etc/cron.allowCIS Red Hat 6 Server L1 v3.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

5.1.8 Ensure cron is restricted to authorized users - /etc/cron.allowCIS Red Hat 6 Workstation L1 v3.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

5.2.4.1 Ensure the audit log directory is 0750 or more restrictiveCIS Red Hat EL8 Workstation L2 v3.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

5.2.4.2 Ensure audit log files are mode 0640 or less permissiveCIS Oracle Linux 7 v4.0.0 L2 WorkstationUnix

ACCESS CONTROL, MEDIA PROTECTION

5.2.4.2 Ensure audit log files are mode 0640 or less permissiveCIS Red Hat EL8 Workstation L2 v3.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

5.2.4.5 Ensure audit configuration files are 640 or more restrictiveCIS Oracle Linux 7 v4.0.0 L2 WorkstationUnix

ACCESS CONTROL, MEDIA PROTECTION

5.2.4.8 Ensure audit tools are 755 or more restrictiveCIS Oracle Linux 7 v4.0.0 L2 WorkstationUnix

ACCESS CONTROL, MEDIA PROTECTION

5.2.4.9 Ensure audit tools are owned by rootCIS Oracle Linux 7 v4.0.0 L2 WorkstationUnix

ACCESS CONTROL, MEDIA PROTECTION

5.2.4.9 Ensure audit tools are owned by rootCIS Oracle Linux 8 Server L2 v3.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

5.2.4.10 Ensure audit tools belong to group rootCIS Oracle Linux 8 Server L2 v3.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

6.1.5 Ensure permissions on /etc/group- are configuredCIS Red Hat EL8 Workstation L1 v3.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

6.1.7 Ensure permissions on /etc/shadow- are configuredCIS Oracle Linux 8 Server L1 v3.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

6.1.7 Ensure permissions on /etc/shadow- are configuredCIS Red Hat EL8 Workstation L1 v3.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

6.1.8 Ensure permissions on /etc/gshadow are configuredCIS Oracle Linux 8 Server L1 v3.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

6.1.13 Ensure SUID and SGID files are reviewedCIS Red Hat EL8 Workstation L1 v3.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

6.2.11 Ensure local interactive user dot files access is configuredCIS Oracle Linux 8 Server L1 v3.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

6.2.11 Ensure local interactive user dot files access is configuredCIS Red Hat EL8 Workstation L1 v3.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

18.10.3.1 Ensure 'Allow a Windows app to share application data between users' is set to 'Disabled'CIS Microsoft Windows Server 2022 STIG v1.0.0 L2 DCWindows

ACCESS CONTROL, MEDIA PROTECTION

19.7.25.1 Ensure 'Prevent users from sharing files within their profile.' is set to 'Enabled'CIS Microsoft Windows Server 2022 STIG v1.0.0 L1 MSWindows

ACCESS CONTROL, MEDIA PROTECTION