1.3.1 Ensure 'Minimum Password Complexity' is enabled | CIS Palo Alto Firewall 8 Benchmark L1 v1.0.0 | Palo_Alto | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION |
1.7.7 Do not admit containers with dangerous capabilities | CIS Kubernetes 1.11 Benchmark v1.3.0 L2 | Unix | CONFIGURATION MANAGEMENT |
2.1.1 Ensure Safe Links for Office Applications is Enabled | CIS Microsoft 365 Foundations E5 L2 v3.1.0 | microsoft_azure | SYSTEM AND INFORMATION INTEGRITY |
2.3.10.3 Ensure 'Network access: Do not allow anonymous enumeration of SAM accounts' is set to 'Enabled' (STIG only) | CIS Microsoft Windows Server 2016 STIG v3.0.0 STIG MS | Windows | ACCESS CONTROL |
2.3.10.5 Ensure 'Network access: Do not allow anonymous enumeration of SAM accounts and shares' is set to 'Enabled' (STIG only) | CIS Microsoft Windows Server 2016 STIG v3.0.0 STIG MS | Windows | ACCESS CONTROL |
4.1.2.9 mrouted | CIS IBM AIX 7.2 L2 v1.1.0 | Unix | CONFIGURATION MANAGEMENT |
4.7.1.1 Home directory must exist | CIS IBM AIX 7.2 L1 v1.1.0 | Unix | CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION |
4.7.1.4 AUDIT subsystem: /audit and /etc/security/audit | CIS IBM AIX 7.2 L1 v1.1.0 | Unix | CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION |
5.2.2 pwd_algorithm | CIS IBM AIX 7.2 L1 v1.1.0 | Unix | IDENTIFICATION AND AUTHENTICATION |
5.2.3 Ensure Complex Password Must Contain Alphabetic Characters Is Configured | CIS Apple macOS 10.15 Catalina v3.0.0 L2 | Unix | IDENTIFICATION AND AUTHENTICATION |
5.2.3 Ensure Complex Password Must Contain Alphabetic Characters Is Configured | CIS Apple macOS 11.0 Big Sur v4.0.0 L2 | Unix | IDENTIFICATION AND AUTHENTICATION |
5.2.4 Ensure Complex Password Must Contain Numeric Character Is Configured | CIS Apple macOS 10.15 Catalina v3.0.0 L2 | Unix | IDENTIFICATION AND AUTHENTICATION |
5.7.2 Ensure that the seccomp profile is set to docker/default in your pod definitions | CIS RedHat OpenShift Container Platform v1.6.0 L2 | OpenShift | CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION |
5.18 Ensure HTTP Header Permissions-Policy is set appropriately | CIS Apache HTTP Server 2.4 L2 v2.1.0 Middleware | Unix | CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY |
17.4.2 Ensure 'Audit Directory Service Access' is set to include 'Success and Failure' (STIG DC only) | CIS Microsoft Windows Server 2022 STIG v1.0.0 STIG DC | Windows | AUDIT AND ACCOUNTABILITY |
17.4.2 Ensure 'Audit Directory Service Access' is set to include 'Success and Failure' (STIG DC only) | CIS Microsoft Windows Server 2016 STIG v3.0.0 STIG DC | Windows | AUDIT AND ACCOUNTABILITY |
17.4.3 Ensure 'Audit Directory Service Access' is set to include 'Success and Failure' (STIG DC only) | CIS Microsoft Windows Server 2019 STIG v2.0.0 STIG DC | Windows | AUDIT AND ACCOUNTABILITY |
18.10.76.2.2 Ensure 'Configure Windows Defender SmartScreen' is set to 'Enabled: Warn' or 'Enabled: Warn and prevent bypass' (STIG only) | CIS Microsoft Windows Server 2022 STIG v1.0.0 STIG MS | Windows | SYSTEM AND INFORMATION INTEGRITY |
18.10.76.2.2 Ensure 'Configure Windows Defender SmartScreen' is set to 'Enabled: Warn' or 'Enabled: Warn and prevent bypass' (STIG only) | CIS Microsoft Windows Server 2019 STIG v2.0.0 STIG DC | Windows | SYSTEM AND INFORMATION INTEGRITY |
CIS Control 3 (3.4(a)) Deploy Automated Operating System Patch Management Tools | CAS Implementation Group 1 Audit File | Unix | SYSTEM AND INFORMATION INTEGRITY |
CIS Control 3 (3.4(b)) Deploy Automated Operating System Patch Management Tools | CAS Implementation Group 1 Audit File | Unix | SYSTEM AND INFORMATION INTEGRITY |
CIS Control 3 (3.4(c)) Deploy Automated Operating System Patch Management Tools | CAS Implementation Group 1 Audit File | Unix | SYSTEM AND INFORMATION INTEGRITY |
CIS MS Office Outlook 2010 v1.0.0.audit for MS Outlook 06-28-2013 | CIS MS Office Outlook 2010 v1.0.0 | Windows | |
CIS_Apple_macOS_12.0_Monterey_Cloud-tailored_v1.0.0_L1.audit from CIS Apple macOS 12.0 Monterey Cloud-tailored Benchmark v1.0.0 | CIS Apple macOS 12.0 Monterey Cloud-tailored v1.0.0 L1 | Unix | |
CIS_Apple_macOS_12.0_Monterey_Cloud-tailored_v1.0.0_L2.audit from CIS Apple macOS 12.0 Monterey Cloud-tailored Benchmark v1.0.0 | CIS Apple macOS 12.0 Monterey Cloud-tailored v1.0.0 L2 | Unix | |
CIS_Apple_macOS_13.0_Ventura_Cloud-tailored_v1.0.0_L1.audit from CIS Apple macOS 13.0 Ventura Cloud-tailored Benchmark v1.0.0 | CIS Apple macOS 13.0 Ventura Cloud-tailored v1.0.0 L1 | Unix | |
CIS_Apple_macOS_13.0_Ventura_Cloud-tailored_v1.0.0_L2.audit from CIS Apple macOS 13.0 Ventura Cloud-tailored Benchmark v1.0.0 | CIS Apple macOS 13.0 Ventura Cloud-tailored v1.0.0 L2 | Unix | |
CIS_Apple_macOS_14.0_Sonoma_Cloud-tailored_v1.0.0_L1.audit from CIS Apple macOS 14.0 Sonoma Cloud-tailored Benchmark v1.0.0 | CIS Apple macOS 14.0 Sonoma Cloud-tailored v1.0.0 L1 | Unix | |
CIS_Apple_macOS_14.0_Sonoma_Cloud-tailored_v1.0.0_L2.audit from CIS Apple macOS 14.0 Sonoma Cloud-tailored Benchmark v1.0.0 | CIS Apple macOS 14.0 Sonoma Cloud-tailored v1.0.0 L2 | Unix | |
CIS_Cisco_ASA_9.x_Firewall_v1.1.0_L1.audit from CIS Cisco ASA 9.x Firewall Benchmark v1.1.0 | CIS Cisco ASA 9.x Firewall L1 v1.1.0 | Cisco | |
CIS_Cisco_ASA_9.x_Firewall_v1.1.0_L2.audit from CIS Cisco ASA 9.x Firewall Benchmark v1.1.0 | CIS Cisco ASA 9.x Firewall L2 v1.1.0 | Cisco | |
CIS_Cisco_IOS_12_v4.0.0_Level_1.audit for Cisco IOS 12 from CIS Cisco IOS 12 Benchmark v4.0.0 | CIS Cisco IOS 12 L1 v4.0.0 | Cisco | |
CIS_Cisco_IOS_12_v4.0.0_Level_2.audit for Cisco IOS 12 from CIS Cisco IOS 12 Benchmark v4.0.0 | CIS Cisco IOS 12 L2 v4.0.0 | Cisco | |
CIS_Cisco_IOS_XE_16.x_v2.1.0_L1.audit from CIS Cisco IOS XE 16.x Benchmark v2.1.0 | CIS Cisco IOS XE 16.x v2.1.0 L1 | Cisco | |
CIS_Cisco_IOS_XE_16.x_v2.1.0_L2.audit from CIS Cisco IOS XE 16.x Benchmark v2.1.0 | CIS Cisco IOS XE 16.x v2.1.0 L2 | Cisco | |
CIS_Cisco_IOS_XE_17.x_v2.1.0_L1.audit from CIS Cisco IOS XE 17.x Benchmark v2.1.0 | CIS Cisco IOS XE 17.x v2.1.0 L1 | Cisco | |
CIS_Cisco_IOS_XE_17.x_v2.1.0_L2.audit from CIS Cisco IOS XE 17.x Benchmark v2.1.0 | CIS Cisco IOS XE 17.x v2.1.0 L2 | Cisco | |
CIS_Microsoft_Intune_for_Windows_10_v3.0.1_L1.audit from CIS Microsoft Intune for Windows 10 Benchmark v3.0.1 | CIS Microsoft Intune for Windows 10 v3.0.1 L1 | Windows | |
CIS_Microsoft_Windows_10_Stand-alone_v3.0.0_BL.audit from CIS Microsoft Windows 10 Stand-alone Benchmark v3.0.0 | CIS Microsoft Windows 10 Stand-alone v3.0.0 BL | Windows | |
CIS_Microsoft_Windows_10_Stand-alone_v3.0.0_L1.audit from CIS Microsoft Windows 10 Stand-alone Benchmark v3.0.0 | CIS Microsoft Windows 10 Stand-alone v3.0.0 L1 | Windows | |
CIS_Microsoft_Windows_10_Stand-alone_v3.0.0_L2.audit from CIS Microsoft Windows 10 Stand-alone Benchmark v3.0.0 | CIS Microsoft Windows 10 Stand-alone v3.0.0 L2 | Windows | |
CIS_Microsoft_Windows_11_Stand-alone_v3.0.0_BL.audit from CIS Microsoft Windows 11 Stand-alone Benchmark v3.0.0 | CIS Microsoft Windows 11 Stand-alone v3.0.0 BL | Windows | |
CIS_Microsoft_Windows_11_Stand-alone_v3.0.0_L1.audit from CIS Microsoft Windows 11 Stand-alone Benchmark v3.0.0 | CIS Microsoft Windows 11 Stand-alone v3.0.0 L1 | Windows | |
CIS_Microsoft_Windows_11_Stand-alone_v3.0.0_L2.audit from CIS Microsoft Windows 11 Stand-alone Benchmark v3.0.0 | CIS Microsoft Windows 11 Stand-alone v3.0.0 L2 | Windows | |
CIS_Microsoft_Windows_Server_2019_Stand-alone_v2.0.0_L1_MS.audit from CIS Microsoft Windows Server 2019 Stand-alone v2.0.0 | CIS Microsoft Windows Server 2019 Stand-alone v2.0.0 L1 MS | Windows | |
CIS_Oracle_Server_11g_R2_Unix_v2.2.0.audit from CIS Oracle Database Server 11g R2 benchmark v2.2.0 | CIS Oracle Server 11g R2 Unix v2.2.0 | Unix | |
CIS_Oracle_Server_11g_R2_Windows_v2.2.0.audit from CIS Oracle Database Server 11g R2 benchmark v2.2.0 | CIS Oracle Server 11g R2 Windows v2.2.0 | Windows | |
CIS_Red_Hat_EL8_Workstation_L1_v3.0.0.audit from CIS Red Hat Enterprise Linux 8 Benchmark v3.0.0 | CIS Red Hat EL8 Workstation L1 v3.0.0 | Unix | |
CIS_v4.1.0_Cisco_Firewall_ASA_9_Level_1.audit for Cisco ASA 9 from CIS Cisco Firewall Benchmark v4.1.0 | CIS Cisco Firewall ASA 9 L1 v4.1.0 | Cisco | |
DKER-EE-003560 - Docker Enterprise network ports on all running containers must be limited to what is needed. | DISA STIG Docker Enterprise 2.x Linux/Unix v2r2 | Unix | CONFIGURATION MANAGEMENT |