Item Search

NameAudit NamePluginCategory
1.2.1 Set 'privilege 1' for local users - 'No users with privileges 2-15'CIS Cisco IOS 12 L1 v4.0.0Cisco

ACCESS CONTROL

1.4.3 Ensure authentication required for single user modeCIS SUSE Linux Enterprise Server 11 L1 v2.1.1Unix

ACCESS CONTROL

1.5.1 Ensure core dumps are restricted - fs.suid_dumpableCIS SUSE Linux Enterprise Workstation 11 L1 v2.1.1Unix

ACCESS CONTROL

1.5.2 Ensure core dumps are restrictedCIS Ubuntu Linux 18.04 LTS v2.2.0 L1 ServerUnix

ACCESS CONTROL

1.118 WN19-CC-000250CIS Microsoft Windows Server 2019 STIG v4.0.0 DC CAT IIWindows

ACCESS CONTROL

1.123 WN19-CC-000300CIS Microsoft Windows Server 2019 STIG v4.0.0 DC CAT IIWindows

ACCESS CONTROL

1.146 WN19-CC-000530CIS Microsoft Windows Server 2019 STIG v4.0.0 DC CAT IIWindows

ACCESS CONTROL

1.248 WN19-SO-000410CIS Microsoft Windows Server 2019 STIG v4.0.0 MS CAT IIWindows

ACCESS CONTROL

1.251 WN19-SO-000440CIS Microsoft Windows Server 2019 STIG v4.0.0 MS CAT IIWindows

ACCESS CONTROL

2.3.10.5 (L1) Ensure 'Network access: Let Everyone permissions apply to anonymous users' is set to 'Disabled'CIS Microsoft Windows Server 2016 v4.0.0 L1 MSWindows

ACCESS CONTROL

2.3.13.1 (L1) Ensure 'Shutdown: Allow system to be shut down without having to log on' is set to 'Disabled'CIS Microsoft Windows Server 2016 v4.0.0 L1 DCWindows

ACCESS CONTROL

2.3.17.2 (L1) Ensure 'User Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode' is set to 'Prompt for consent on the secure desktop' or higherCIS Microsoft Windows Server 2016 v4.0.0 L1 DCWindows

ACCESS CONTROL

2.3.17.4 (L1) Ensure 'User Account Control: Detect application installations and prompt for elevation' is set to 'Enabled'CIS Microsoft Windows Server 2016 v4.0.0 L1 MSWindows

ACCESS CONTROL

3.1 Restrict Core Dumps to Protected Directory - global core dumps = enabledCIS Solaris 11.1 L1 v1.0.0Unix

ACCESS CONTROL

3.1 Restrict Core Dumps to Protected Directory - global core file patternCIS Solaris 11.2 L1 v1.1.0Unix

ACCESS CONTROL

3.1 Restrict Core Dumps to Protected Directory - global setid core dumps = enabledCIS Solaris 11.2 L1 v1.1.0Unix

ACCESS CONTROL

3.1 Restrict Core Dumps to Protected Directory - init core file patternCIS Solaris 11.1 L1 v1.0.0Unix

ACCESS CONTROL

3.1 Restrict Core Dumps to Protected Directory - per-process core dumps = disabledCIS Solaris 11.2 L1 v1.1.0Unix

ACCESS CONTROL

3.1 Restrict Core Dumps to Protected Directory - per-process setid core dumps = disabledCIS Solaris 11.2 L1 v1.1.0Unix

ACCESS CONTROL

3.2 Restrict Core Dumps to Protected Directory - Check if COREADM_PROC_ENABLED is set to noCIS Solaris 10 L1 v5.2Unix

ACCESS CONTROL

3.5 Review Superuser/Admin RolesCIS MongoDB 6 v1.2.0 L2 MongoDBMongoDB

ACCESS CONTROL

3.5 Review Superuser/Admin RolesCIS MongoDB 7 v1.2.0 L2 MongoDBMongoDB

ACCESS CONTROL

3.5 Review Superuser/Admin Roles - userAdminAnyDatabaseCIS MongoDB 5 L2 DB v1.2.0MongoDB

ACCESS CONTROL

3.6 Review Superuser/Admin Roles - dbAdminAnyDatabaseCIS MongoDB 3.6 Database Audit L1 v1.1.0MongoDB

ACCESS CONTROL

3.6 Review Superuser/Admin Roles - userAdminCIS MongoDB 3.6 Database Audit L1 v1.1.0MongoDB

ACCESS CONTROL

4.1 Restrict Core Dumps - 'fs.suid.dumpable = 0'CIS Ubuntu 12.04 LTS Benchmark L1 v1.1.0Unix

ACCESS CONTROL

4.1 Restrict Core Dumps - fs.suid_dumpableCIS Debian Linux 7 L1 v1.0.0Unix

ACCESS CONTROL

4.3 Review Users, Groups, and Roles - Users listCIS IBM DB2 v10 v1.1.0 Linux OS Level 1Unix

ACCESS CONTROL

4.3 Review Users, Groups, and Roles - Users listCIS IBM DB2 v10 v1.1.0 Linux OS Level 2Unix

ACCESS CONTROL

4.6 Ensure only authorized users and groups belong to the esxAdminsGroup groupCIS VMware ESXi 6.7 v1.3.0 Level 1VMware

ACCESS CONTROL

5.1 Ensure Only Administrative Users Have Full Database AccessCIS MariaDB 10.6 on Linux L1 v1.1.0Unix

ACCESS CONTROL

5.1 Ensure Only Administrative Users Have Full Database AccessCIS Oracle MySQL Community Server 8.4 v1.0.0 L1 DatabaseMySQLDB

ACCESS CONTROL

5.2.18 Ensure SSH access is limitedCIS Debian 8 Workstation L1 v2.0.2Unix

ACCESS CONTROL

5.4 Do not use privileged containersCIS Docker 1.11.0 v1.0.0 L1 DockerUnix

ACCESS CONTROL

6.1.1 Display login window as name and passwordCIS Apple macOS 10.12 L1 v1.2.0Unix

ACCESS CONTROL

6.12 Set EEPROM Security Mode and Log Failed Access - SPARC only. Should *not* be 'security-mode=none'.CIS Solaris 10 L1 v5.2Unix

ACCESS CONTROL

6.13 Restrict at/cron to Authorized Users - /etc/cron.d/cron.allowCIS Solaris 11.1 L1 v1.0.0Unix

ACCESS CONTROL

6.13 Restrict at/cron to Authorized Users - /etc/cron.d/cron.allowCIS Solaris 11 L1 v1.1.0Unix

ACCESS CONTROL

6.14 Restrict root Login to System Console - CONSOLE = /dev/consoleCIS Solaris 11.1 L1 v1.0.0Unix

ACCESS CONTROL

9.1 Check for Remote Consoles using 'consadm' command line utilityCIS Solaris 10 L1 v5.2Unix

ACCESS CONTROL

9.4 Restrict root Login to System ConsoleCIS Debian Linux 7 L1 v1.0.0Unix

ACCESS CONTROL

9.22 Find SUID/SGID System ExecutablesCIS Solaris 11.2 L1 v1.1.0Unix

ACCESS CONTROL

9.23 Find SUID/SGID System ExecutablesCIS Solaris 11.1 L1 v1.0.0Unix

ACCESS CONTROL

10.1 SN.1 Restrict access to suspend featureCIS Solaris 11.1 L2 v1.0.0Unix

ACCESS CONTROL

10.2 Restrict access to the web administrationCIS Apache Tomcat 7 L2 v1.1.0Unix

ACCESS CONTROL

10.3 Restrict access to power management functions - CPRCHANGEPERMCIS Solaris 10 L2 v5.2Unix

ACCESS CONTROL

12.10 Find SUID System ExecutablesCIS Ubuntu 12.04 LTS Benchmark L1 v1.1.0Unix

ACCESS CONTROL

12.11 Find SGID System ExecutablesCIS Ubuntu 12.04 LTS Benchmark L1 v1.1.0Unix

ACCESS CONTROL

18.9.28.3 (L1) Ensure 'Do not enumerate connected users on domain-joined computers' is set to 'Enabled'CIS Microsoft Windows Server 2016 v4.0.0 L1 DCWindows

ACCESS CONTROL

18.9.28.4 (L1) Ensure 'Enumerate local users on domain-joined computers' is set to 'Disabled' (MS only)CIS Microsoft Windows Server 2016 v4.0.0 L1 MSWindows

ACCESS CONTROL