Item Search

NameAudit NamePluginCategory
1.1.18 Ensure sticky bit is set on all world-writable directoriesCIS Amazon Linux 2 v1.0.0 L1Unix

ACCESS CONTROL

1.1.20 Ensure sticky bit is set on all world-writable directoriesCIS Ubuntu Linux 16.04 LTS Workstation L1 v1.1.0Unix

ACCESS CONTROL

1.1.21 Ensure sticky bit is set on all world-writable directoriesCIS Ubuntu Linux 18.04 LTS Server L1 v2.0.1Unix

ACCESS CONTROL

1.1.21 Ensure sticky bit is set on all world-writable directoriesCIS Oracle Linux 8 Workstation L1 v1.0.0Unix

ACCESS CONTROL

1.1.21 Ensure sticky bit is set on all world-writable directoriesCIS CentOS 6 Workstation L1 v2.1.0Unix

ACCESS CONTROL

1.1.21 Ensure sticky bit is set on all world-writable directoriesCIS Oracle Linux 6 Workstation L1 v1.1.0Unix

ACCESS CONTROL

1.1.21 Ensure sticky bit is set on all world-writable directoriesCIS Red Hat 6 Server L1 v2.1.0Unix

ACCESS CONTROL

1.3.1 Ensure sudo is installedCIS Ubuntu Linux 20.04 LTS Server L1 v1.0.0Unix

ACCESS CONTROL

1.3.2 Ensure sudo commands use ptyCIS Red Hat EL7 Server L1 v3.0.1Unix

ACCESS CONTROL

1.3.2 Ensure sudo commands use ptyCIS CentOS Linux 8 Server L1 v1.0.0Unix

ACCESS CONTROL

1.3.2 Ensure sudo commands use ptyCIS Ubuntu Linux 20.04 LTS Server L1 v1.0.0Unix

ACCESS CONTROL

1.3.2 Ensure sudo commands use ptyCIS Oracle Linux 8 Workstation L1 v1.0.0Unix

ACCESS CONTROL

1.6.1.2 Ensure the SELinux state is enforcing - 'Mode from config file'CIS Ubuntu Linux 16.04 LTS Workstation L2 v1.1.0Unix

ACCESS CONTROL

1.6.1.2 Ensure the SELinux state is enforcing - 'Mode from config file'CIS Ubuntu Linux 14.04 LTS Workstation L2 v2.1.0Unix

ACCESS CONTROL

1.6.1.2 Ensure the SELinux state is enforcing - 'SELINUX'CIS Ubuntu Linux 14.04 LTS Workstation L2 v2.1.0Unix

ACCESS CONTROL

1.6.1.4 Ensure no unconfined daemons existCIS Ubuntu Linux 16.04 LTS Workstation L2 v1.1.0Unix

ACCESS CONTROL

1.6.1.4 Ensure no unconfined daemons existCIS Ubuntu Linux 16.04 LTS Server L2 v1.1.0Unix

ACCESS CONTROL

1.6.1.6 Ensure no unconfined daemons existCIS Oracle Linux 6 Server L2 v1.1.0Unix

ACCESS CONTROL

1.6.1.6 Ensure no unconfined daemons existCIS Red Hat 6 Server L2 v2.1.0Unix

ACCESS CONTROL

1.6.2.2 Ensure all AppArmor Profiles are enforcingCIS Ubuntu Linux 14.04 LTS Server L2 v2.1.0Unix

ACCESS CONTROL

1.6.2.2 Ensure all AppArmor Profiles are enforcing - 'complian mode'CIS Ubuntu Linux 16.04 LTS Server L2 v1.1.0Unix

ACCESS CONTROL

1.6.2.2 Ensure all AppArmor Profiles are enforcing - 'profiles loaded'CIS Ubuntu Linux 14.04 LTS Server L2 v2.1.0Unix

ACCESS CONTROL

1.6.2.2 Ensure all AppArmor Profiles are enforcing - 'unconfined processes'CIS Ubuntu Linux 16.04 LTS Server L2 v1.1.0Unix

ACCESS CONTROL

1.7.1.2 Ensure SELinux is not disabled in bootloader configurationCIS Red Hat EL7 Server L1 v3.0.1Unix

ACCESS CONTROL

1.7.1.3 Ensure all AppArmor Profiles are in enforce or complain mode - processes unconfinedCIS SUSE Linux Enterprise 15 Workstation L1 v1.0.0Unix

ACCESS CONTROL

1.7.1.3 Ensure all AppArmor Profiles are in enforce or complain mode - unconfinedCIS Ubuntu Linux 18.04 LTS Server L1 v2.0.1Unix

ACCESS CONTROL

1.7.1.3 Ensure SELinux policy is configuredCIS Oracle Linux 8 Workstation L2 v1.0.0Unix

ACCESS CONTROL

1.7.1.3 Ensure SELinux policy is configured - /etc/selinux/configCIS CentOS Linux 8 Workstation L2 v1.0.0Unix

ACCESS CONTROL

1.7.1.3 Ensure SELinux policy is configured - sestatusCIS Red Hat EL7 Server L1 v3.0.1Unix

ACCESS CONTROL

1.7.1.4 Ensure the SELinux state is enforcingCIS Oracle Linux 8 Workstation L2 v1.0.0Unix

ACCESS CONTROL

1.7.1.4 Ensure the SELinux state is enforcingCIS Red Hat EL8 Server L2 v1.0.0Unix

ACCESS CONTROL

1.7.1.4 Ensure the SELinux state is enforcingCIS Red Hat EL8 Workstation L2 v1.0.0Unix

ACCESS CONTROL

1.7.1.4 Ensure the SELinux state is enforcing - /etc/selinux/configCIS CentOS Linux 8 Workstation L2 v1.0.0Unix

ACCESS CONTROL

1.7.1.4 Ensure the SELinux state is enforcing - Current mode: enforcingCIS CentOS Linux 8 Server L2 v1.0.0Unix

ACCESS CONTROL

1.7.1.5 Ensure the SELinux mode is enforcing - /etc/selinux/configCIS Red Hat EL7 Workstation L2 v3.0.1Unix

ACCESS CONTROL

1.7.1.5 Ensure the SELinux mode is enforcing - configCIS Oracle Linux 7 Server L2 v3.0.0Unix

ACCESS CONTROL

1.7.1.5 Ensure the SELinux mode is enforcing - configCIS Oracle Linux 7 Workstation L2 v3.0.0Unix

ACCESS CONTROL

1.7.1.5 Ensure the SELinux mode is enforcing - getenforceCIS Red Hat EL7 Workstation L2 v3.0.1Unix

ACCESS CONTROL

1.7.1.6 Ensure no unconfined services existCIS Red Hat EL7 Server L1 v3.0.1Unix

ACCESS CONTROL

3.5.2.11 Ensure nftables rules are permanentCIS Red Hat EL7 Server L1 v3.0.1Unix

ACCESS CONTROL

5.2 Ensure SELinux security options are set, if applicableCIS Docker Community Edition v1.1.0 L2 DockerUnix

ACCESS CONTROL

5.4.4 Ensure default user umask is 027 or more restrictive - /etc/bashrcCIS Red Hat 6 Workstation L1 v2.1.0Unix

ACCESS CONTROL

5.4.4 Ensure default user umask is 027 or more restrictive - /etc/profileCIS CentOS 6 Server L1 v2.1.0Unix

ACCESS CONTROL

5.4.4 Ensure default user umask is 027 or more restrictive - /etc/profileCIS Oracle Linux 6 Server L1 v1.1.0Unix

ACCESS CONTROL

5.4.5 Ensure default user umask is configured - System Wide defaultCIS SUSE Linux Enterprise 15 Server L1 v1.0.0Unix

ACCESS CONTROL

5.4.5 Ensure default user umask is configured - System Wide defaultCIS SUSE Linux Enterprise 15 Workstation L1 v1.0.0Unix

ACCESS CONTROL

5.5 Use a separate timestamp for each user/tty comboCIS Apple macOS 10.15 v1.3.0 L1Unix

ACCESS CONTROL

10.17 Setting Security Lifecycle Listener - check for umask present in startupCIS Apache Tomcat 9 L1 v1.0.0 MiddlewareUnix

ACCESS CONTROL

10.17 Setting Security Lifecycle Listener - check for umask uncommented in startupCIS Apache Tomcat 9 L1 v1.0.0 MiddlewareUnix

ACCESS CONTROL

Ensure no unconfined daemons existTenable Cisco Firepower Management Center OS Best Practices AuditUnix

ACCESS CONTROL