Item Search

NameAudit NamePluginCategory
1.1 Remove extraneous files and directories - CATALINA_HOME/webapps/docsCIS Apache Tomcat 9 L2 v1.2.0Unix

CONFIGURATION MANAGEMENT

1.1 Remove extraneous files and directories - CATALINA_HOME/webapps/examplesCIS Apache Tomcat 9 L2 v1.2.0Unix

CONFIGURATION MANAGEMENT

1.2 (L1) Host hardware must enable UEFI Secure BootCIS VMware ESXi 8.0 v1.2.0 L1VMware

SYSTEM AND SERVICES ACQUISITION

1.3 (L1) Host hardware must enable Intel TXT, if availableCIS VMware ESXi 8.0 v1.2.0 L1VMware

CONFIGURATION MANAGEMENT, MAINTENANCE

1.4 (L1) Host hardware must enable and configure a TPM 2.0CIS VMware ESXi 8.0 v1.2.0 L1VMware

CONFIGURATION MANAGEMENT, MAINTENANCE

1.5.3 Configure Netflow on Strategic PortsCIS Cisco NX-OS v1.2.0 L2Cisco

AUDIT AND ACCOUNTABILITY, INCIDENT RESPONSE, SYSTEM AND INFORMATION INTEGRITY

1.6 (L1) Host integrated hardware management controller must enable time synchronizationCIS VMware ESXi 8.0 v1.2.0 L1VMware

CONFIGURATION MANAGEMENT, MAINTENANCE

1.10 Use Dedicated "mgmt" Interface and VRF for Administrative FunctionsCIS Cisco NX-OS v1.2.0 L2Cisco

CONFIGURATION MANAGEMENT, MAINTENANCE

2.1 Ensure Authentication is configuredCIS MongoDB 6 v1.2.0 L1 MongoDBWindows

IDENTIFICATION AND AUTHENTICATION

2.1.2 Ensure 'ADMIN_RESTRICTIONS_' Is Set to 'ON'CIS Oracle Server 19c Linux v1.2.0Unix

ACCESS CONTROL

2.2 (L1) Host must have all software updates installedCIS VMware ESXi 8.0 v1.2.0 L1VMware

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

2.2 Ensure that MongoDB does not bypass authentication via the localhost exceptionCIS MongoDB 6 v1.2.0 L1 MongoDBUnix

IDENTIFICATION AND AUTHENTICATION

2.3 (L1) Host must enable Secure Boot enforcementCIS VMware ESXi 8.0 v1.2.0 L1VMware

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

2.3 Ensure authentication is enabled in the sharded clusterCIS MongoDB 6 v1.2.0 L2 MongoDBUnix

CONFIGURATION MANAGEMENT

2.3.1 Ensure 'ENCRYPTION_SERVER' Is Set to 'REQUIRED'CIS Oracle Server 19c Linux v1.2.0Unix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

2.5.10.11 Ensure 'Internet and network paths into hyperlinks' is set to 'Disabled'CIS Microsoft Office Enterprise v1.2.0 L2Windows

CONFIGURATION MANAGEMENT

2.7 (L1) Host must have time synchronization services enabled and runningCIS VMware ESXi 8.0 v1.2.0 L1VMware

AUDIT AND ACCOUNTABILITY

2.7 Ensure Sever Header is Modified To Prevent Information DisclosureCIS Apache Tomcat 9 L2 v1.2.0Unix

CONFIGURATION MANAGEMENT

3.1.1.1 Configure EIGRP Authentication on all EIGRP Routing DevicesCIS Cisco NX-OS v1.2.0 L2Cisco

ACCESS CONTROL, CONFIGURATION MANAGEMENT

3.2 Ensure that role-based access control is enabled and configured appropriatelyCIS MongoDB 6 v1.2.0 L1 MongoDBMongoDB

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

3.2 Ensure that role-based access control is enabled and configured appropriately - rolesCIS MongoDB 5 L1 DB v1.2.0MongoDB

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

3.4 Ensure that each role for each MongoDB database is needed and grants only the necessary privilegesCIS MongoDB 5 L1 DB v1.2.0MongoDB

ACCESS CONTROL

3.5 Review Superuser/Admin Roles - dbAdminAnyDatabaseCIS MongoDB 5 L2 DB v1.2.0MongoDB

ACCESS CONTROL

4.2 Ensure Weak Protocols are DisabledCIS MongoDB 6 v1.2.0 L1 MongoDBWindows

SYSTEM AND COMMUNICATIONS PROTECTION

4.2 Ensure Weak Protocols are DisabledCIS MongoDB 6 v1.2.0 L1 MongoDBUnix

SYSTEM AND COMMUNICATIONS PROTECTION

4.3 Configure Alerts on all Configuration ChangesCIS Cisco NX-OS v1.2.0 L2Cisco

CONFIGURATION MANAGEMENT

4.5 Ensure Encryption of Data at RestCIS MongoDB 6 v1.2.0 L2 MongoDBUnix

SYSTEM AND COMMUNICATIONS PROTECTION

4.7 Restrict access to Tomcat web application directoryCIS Apache Tomcat 9 L1 v1.2.0Unix

ACCESS CONTROL, MEDIA PROTECTION

5.1 Ensure that system activity is auditedCIS MongoDB 6 v1.2.0 L1 MongoDBWindows

AUDIT AND ACCOUNTABILITY

5.2 Ensure that audit filters are configured properlyCIS MongoDB 6 v1.2.0 L2 MongoDBUnix

AUDIT AND ACCOUNTABILITY

5.2.5 Complex passwords must contain a Special CharacterCIS Apple macOS 10.12 L2 v1.2.0Unix
5.2.6 Complex passwords must uppercase and lowercase lettersCIS Apple macOS 10.12 L2 v1.2.0Unix
5.3 Ensure that logging captures as much information as possibleCIS MongoDB 6 v1.2.0 L2 MongoDBUnix

AUDIT AND ACCOUNTABILITY

5.7 Enable OCSP and CRL certificate checking - CRLStyleCIS Apple macOS 10.12 L2 v1.2.0Unix

IDENTIFICATION AND AUTHENTICATION

6.1 Ensure that MongoDB uses a non-default portCIS MongoDB 6 v1.2.0 L1 MongoDBUnix

CONFIGURATION MANAGEMENT

6.2 Ensure that operating system resource limits are set for MongoDBCIS MongoDB 6 v1.2.0 L2 MongoDBUnix

SYSTEM AND COMMUNICATIONS PROTECTION

6.4.1 (L1) Host SNMP services, if enabled, must limit accessCIS VMware ESXi 8.0 v1.2.0 L1Unix

CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

6.5.4 (L1) Host SSH daemon, if enabled, must not allow host-based authenticationCIS VMware ESXi 8.0 v1.2.0 L1Unix

CONFIGURATION MANAGEMENT, MAINTENANCE

6.5.5 (L1) Host SSH daemon, if enabled, must set a timeout count on idle sessionsCIS VMware ESXi 8.0 v1.2.0 L1Unix

CONFIGURATION MANAGEMENT, MAINTENANCE

6.5.7 (L1) Host SSH daemon, if enabled, must display the system login banner before granting accessCIS VMware ESXi 8.0 v1.2.0 L1Unix

CONFIGURATION MANAGEMENT, MAINTENANCE

6.5.11 (L1) Host SSH daemon, if enabled, must not permit tunnelsCIS VMware ESXi 8.0 v1.2.0 L1Unix

CONFIGURATION MANAGEMENT, MAINTENANCE

7.1 Ensure appropriate key file permissions are setCIS MongoDB 6 v1.2.0 L1 MongoDBUnix

IDENTIFICATION AND AUTHENTICATION

7.2 Specify file handler in logging.properties files - check if java.util.logging.ConsoleHandler exists in web applicationCIS Apache Tomcat 9 L1 v1.2.0Unix

AUDIT AND ACCOUNTABILITY

7.2 Specify file handler in logging.properties files - check if org.apache.juli.FileHandler logging is enabled in defaultCIS Apache Tomcat 9 L1 v1.2.0Unix

AUDIT AND ACCOUNTABILITY

7.3 Computer Name ConsiderationsCIS Apple macOS 10.12 L2 v1.2.0Unix

CONFIGURATION MANAGEMENT

7.4 Ensure directory in context.xml is a secure location - permissionsCIS Apache Tomcat 9 L1 v1.2.0Unix

ACCESS CONTROL, MEDIA PROTECTION

7.5 Ensure pattern in context.xml is correctCIS Apache Tomcat 9 L1 v1.2.0Unix

AUDIT AND ACCOUNTABILITY

10.6 Enable strict servlet ComplianceCIS Apache Tomcat 9 L2 v1.2.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION

10.8 Do not allow additional path delimiters - ALLOW_ENCODED_SLASHCIS Apache Tomcat 9 L2 v1.2.0Unix

CONFIGURATION MANAGEMENT

10.17 Setting Security Lifecycle Listener - check for umask uncommented in startupCIS Apache Tomcat 9 L1 v1.2.0Unix

ACCESS CONTROL