2.1.11 Ensure the spoofed domains report is reviewed weekly | CIS Microsoft 365 Foundations E5 L1 v3.1.0 | microsoft_azure | AUDIT AND ACCOUNTABILITY |
4.1.1.1 Ensure auditd is installed - audit-libs | CIS Red Hat Enterprise Linux 7 STIG v2.0.0 L2 Workstation | Unix | AUDIT AND ACCOUNTABILITY |
4.1.1.2 Ensure auditd service is enabled and running - enabled | CIS Red Hat Enterprise Linux 7 STIG v2.0.0 L2 Workstation | Unix | AUDIT AND ACCOUNTABILITY |
4.1.1.2 Ensure auditd service is enabled and running - running | CIS Red Hat Enterprise Linux 7 STIG v2.0.0 L2 Workstation | Unix | AUDIT AND ACCOUNTABILITY |
4.1.1.5 Ensure rsyslog is configured to send logs to a remote log host | CIS Ubuntu Linux 18.04 LXD Container L1 v1.0.0 | Unix | AUDIT AND ACCOUNTABILITY |
4.1.2.3 Ensure system is disabled when audit logs are full - space_left_action = root | CIS Fedora 19 Family Linux Workstation L2 v1.0.0 | Unix | AUDIT AND ACCOUNTABILITY |
4.1.3 Ensure auditing for processes that start prior to auditd is enabled | CIS SUSE Linux Enterprise Workstation 11 L2 v2.1.1 | Unix | AUDIT AND ACCOUNTABILITY |
4.1.5 Ensure events that modify the system's network environment are collected - auditctl /etc/hosts | CIS Red Hat 6 Server L2 v3.0.0 | Unix | AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT |
4.1.5 Ensure events that modify the system's network environment are collected - auditctl /etc/issue | CIS CentOS 6 Server L2 v3.0.0 | Unix | AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT |
4.1.5 Ensure events that modify the system's network environment are collected - auditctl /etc/issue | CIS Red Hat 6 Server L2 v3.0.0 | Unix | AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT |
4.1.5 Ensure events that modify the system's network environment are collected - auditctl /etc/issue.net | CIS Fedora 19 Family Linux Server L2 v1.0.0 | Unix | AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT |
4.1.5 Ensure events that modify the system's network environment are collected - auditctl /etc/issue.net | CIS Fedora 19 Family Linux Workstation L2 v1.0.0 | Unix | AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT |
4.1.5 Ensure events that modify the system's network environment are collected - auditctl b64 sethostname | CIS Fedora 19 Family Linux Workstation L2 v1.0.0 | Unix | AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT |
4.1.5 Ensure events that modify the system's network environment are collected - auditctl sethostname setdomainname 64-bit | CIS CentOS 6 Server L2 v3.0.0 | Unix | AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT |
4.1.5 Ensure events that modify the system's network environment are collected - auditctl sethostname setdomainname 64-bit | CIS CentOS 6 Workstation L2 v3.0.0 | Unix | AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT |
4.1.5 Ensure events that modify the system's network environment are collected - auditctl sethostname setdomainname 64-bit | CIS Red Hat 6 Server L2 v3.0.0 | Unix | AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT |
4.1.5 Ensure events that modify the system's network environment are collected - b32 sethostname | CIS Fedora 19 Family Linux Server L2 v1.0.0 | Unix | AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT |
4.1.5 Ensure events that modify the system's network environment are collected - rules.d /etc/hosts | CIS CentOS 6 Workstation L2 v3.0.0 | Unix | AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT |
4.1.5 Ensure events that modify the system's network environment are collected - rules.d /etc/issue.net | CIS Red Hat 6 Server L2 v3.0.0 | Unix | AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT |
4.1.5 Ensure events that modify the system's network environment are collected - rules.d /etc/issue.net | CIS Red Hat 6 Workstation L2 v3.0.0 | Unix | AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT |
4.1.5 Ensure events that modify the system's network environment are collected - rules.d /etc/sysconfig/network | CIS CentOS 6 Server L2 v3.0.0 | Unix | AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT |
4.1.5 Ensure events that modify the system's network environment are collected - rules.d /etc/sysconfig/network | CIS CentOS 6 Workstation L2 v3.0.0 | Unix | AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT |
4.1.5 Ensure events that modify the system's network environment are collected - rules.d sethostname setdomainname 32-bit | CIS Red Hat 6 Server L2 v3.0.0 | Unix | AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT |
4.1.5 Ensure events that modify the system's network environment are collected - rules.d sethostname setdomainname 64-bit | CIS CentOS 6 Workstation L2 v3.0.0 | Unix | AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT |
4.1.5 Ensure events that modify the system's network environment are collected - rules.d sethostname setdomainname 64-bit | CIS Red Hat 6 Workstation L2 v3.0.0 | Unix | AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT |
4.2.1.1 Ensure rsyslog service is enabled | CIS Debian 8 Server L1 v2.0.2 | Unix | AUDIT AND ACCOUNTABILITY |
4.2.1.1 Ensure rsyslog Service is enabled - chkconfig | CIS SUSE Linux Enterprise Workstation 11 L1 v2.1.1 | Unix | AUDIT AND ACCOUNTABILITY |
4.2.1.1 Ensure rsyslog Service is enabled - chkconfig | CIS SUSE Linux Enterprise Server 11 L1 v2.1.1 | Unix | AUDIT AND ACCOUNTABILITY |
4.2.1.2 Ensure logging is configured | CIS Debian 8 Workstation L1 v2.0.2 | Unix | AUDIT AND ACCOUNTABILITY |
4.2.1.2 Ensure rsyslog service is enabled | CIS Debian Family Workstation L1 v1.0.0 | Unix | AUDIT AND ACCOUNTABILITY |
4.2.1.2 Ensure rsyslog service is enabled and running | CIS Ubuntu Linux 18.04 LXD Host L1 Workstation v1.0.0 | Unix | AUDIT AND ACCOUNTABILITY |
4.2.1.2 Ensure rsyslog service is enabled and running | CIS Red Hat Enterprise Linux 7 STIG v2.0.0 L1 Workstation | Unix | AUDIT AND ACCOUNTABILITY |
4.2.1.4 Ensure logging is configured | CIS Fedora 19 Family Linux Server L1 v1.0.0 | Unix | AUDIT AND ACCOUNTABILITY |
4.2.1.4 Ensure rsyslog is configured to send logs to a remote log host | CIS Debian 8 Server L1 v2.0.2 | Unix | AUDIT AND ACCOUNTABILITY |
4.2.1.4 Ensure rsyslog is configured to send logs to a remote log host | CIS Debian 9 Server L1 v1.0.1 | Unix | AUDIT AND ACCOUNTABILITY |
4.2.1.5 Ensure logging is configured - '*.emerg :omusrmsg:*' | CIS Debian Family Workstation L1 v1.0.0 | Unix | AUDIT AND ACCOUNTABILITY |
4.2.1.5 Ensure rsyslog is configured to send logs to a remote log host | CIS Ubuntu Linux 18.04 LXD Host L1 Workstation v1.0.0 | Unix | AUDIT AND ACCOUNTABILITY |
4.2.1.5 Ensure rsyslog is configured to send logs to a remote log host | CIS Red Hat Enterprise Linux 7 STIG v2.0.0 L1 Server | Unix | AUDIT AND ACCOUNTABILITY |
4.2.1.5 Ensure rsyslog is configured to send logs to a remote log host | CIS Red Hat Enterprise Linux 7 STIG v2.0.0 L1 Workstation | Unix | AUDIT AND ACCOUNTABILITY |
4.2.2.1 Ensure rsyslog service is enabled | CIS Amazon Linux 2 STIG v1.0.0 L1 | Unix | AUDIT AND ACCOUNTABILITY |
4.2.2.1 Ensure syslog-ng service is enabled | CIS SUSE Linux Enterprise Server 11 L1 v2.1.1 | Unix | AUDIT AND ACCOUNTABILITY |
4.2.2.2 Ensure logging is configured | CIS SUSE Linux Enterprise Server 11 L1 v2.1.1 | Unix | AUDIT AND ACCOUNTABILITY |
4.2.3 Ensure rsyslog or syslog-ng is installed | CIS SUSE Linux Enterprise Server 11 L1 v2.1.1 | Unix | AUDIT AND ACCOUNTABILITY |
5.2.4.2 Ensure the self-service password reset activity report is reviewed at least weekly | CIS Microsoft 365 Foundations E3 L1 v3.1.0 | microsoft_azure | AUDIT AND ACCOUNTABILITY |
6.1 Ensure the Error Log Filename and Severity Level Are Configured Correctly - ErrorLog | CIS Apache HTTP Server 2.4 L1 v2.1.0 Middleware | Unix | AUDIT AND ACCOUNTABILITY |
6.2.2 Ensure the 'ALTER USER' Action Audit Is Enabled | CIS Oracle Server 12c DB Unified Auditing v3.0.0 | OracleDB | AUDIT AND ACCOUNTABILITY |
6.2.4 Ensure the 'CREATE ROLE' Action Audit Is Enabled | CIS Oracle Server 12c DB Unified Auditing v3.0.0 | OracleDB | AUDIT AND ACCOUNTABILITY |
6.2.6 Ensure the 'DROP ROLE' Action Audit Is Enabled | CIS Oracle Server 18c DB Unified Auditing v1.1.0 | OracleDB | AUDIT AND ACCOUNTABILITY |
6.2.27 Ensure the 'LOGON' AND 'LOGOFF' Actions Audit Is Enabled | CIS Oracle Server 12c DB Unified Auditing v3.0.0 | OracleDB | AUDIT AND ACCOUNTABILITY |
6.3 Ensure the Server Access Log Is Configured Correctly - 'httpd.conf LogFormat is configured' | CIS Apache HTTP Server 2.4 L1 v2.1.0 | Unix | AUDIT AND ACCOUNTABILITY |