1.1.3 Ensure nodev option set on /tmp partition | CIS SUSE Linux Enterprise Workstation 11 L1 v2.1.1 | Unix | ACCESS CONTROL |
1.1.13 Ensure nodev option set on /home partition | CIS Ubuntu Linux 14.04 LTS Workstation L1 v2.1.0 | Unix | ACCESS CONTROL |
1.1.14 Ensure nodev option set on /run/shm partition | CIS Ubuntu Linux 14.04 LTS Workstation L1 v2.1.0 | Unix | ACCESS CONTROL |
1.5.2 Ensure core dumps are restricted | CIS Ubuntu Linux 18.04 LTS v2.2.0 L1 Server | Unix | ACCESS CONTROL |
1.5.3 Ensure core dumps are restricted | CIS Ubuntu Linux 22.04 LTS v2.0.0 L1 Workstation | Unix | ACCESS CONTROL |
2.3.5.1 (L1) Ensure 'Domain controller: Allow server operators to schedule tasks' is set to 'Disabled' (DC only) | CIS Microsoft Windows Server 2019 v3.0.1 L1 DC | Windows | ACCESS CONTROL |
2.3.10.5 (L1) Ensure 'Network access: Let Everyone permissions apply to anonymous users' is set to 'Disabled' | CIS Microsoft Windows Server 2019 Stand-alone v2.0.0 L1 MS | Windows | ACCESS CONTROL |
2.3.10.5 Ensure 'Network access: Do not allow anonymous enumeration of SAM accounts and shares' is set to 'Enabled' (STIG DC & MS only) | CIS Microsoft Windows Server 2019 STIG v2.0.0 STIG DC | Windows | ACCESS CONTROL |
2.3.10.5 Ensure 'Network access: Do not allow anonymous enumeration of SAM accounts and shares' is set to 'Enabled' (STIG DC & MS only) | CIS Microsoft Windows Server 2019 STIG v2.0.0 STIG MS | Windows | ACCESS CONTROL |
2.3.10.9 (L1) Ensure 'Network access: Restrict anonymous access to Named Pipes and Shares' is set to 'Enabled' | CIS Microsoft Windows Server 2019 Stand-alone v2.0.0 L1 MS | Windows | ACCESS CONTROL |
2.3.10.10 (L1) Ensure 'Network access: Restrict clients allowed to make remote calls to SAM' is set to 'Administrators: Remote Access: Allow' | CIS Microsoft Windows Server 2019 Stand-alone v2.0.0 L1 MS | Windows | ACCESS CONTROL |
2.3.11.2 (L1) Ensure 'Network security: Allow LocalSystem NULL session fallback' is set to 'Disabled' | CIS Microsoft Windows Server 2019 v3.0.1 L1 DC | Windows | ACCESS CONTROL |
2.3.17.2 (L1) Ensure 'User Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode' is set to 'Prompt for consent on the secure desktop' or higher | CIS Microsoft Windows Server 2019 Stand-alone v2.0.0 L1 MS | Windows | ACCESS CONTROL |
2.3.17.2 Ensure 'User Account Control: Allow UIAccess applications to prompt for elevation without using the secure desktop' is set to 'Disabled' | CIS Microsoft Windows Server 2019 STIG v2.0.0 STIG MS | Windows | ACCESS CONTROL |
2.3.17.3 (L1) Ensure 'User Account Control: Behavior of the elevation prompt for standard users' is set to 'Automatically deny elevation requests' | CIS Microsoft Windows Server 2019 Stand-alone v2.0.0 L1 MS | Windows | ACCESS CONTROL |
2.3.17.3 (L1) Ensure 'User Account Control: Behavior of the elevation prompt for standard users' is set to 'Automatically deny elevation requests' | CIS Microsoft Windows Server 2019 v3.0.1 L1 DC | Windows | ACCESS CONTROL |
2.3.17.5 (L1) Ensure 'User Account Control: Behavior of the elevation prompt for standard users' is set to 'Automatically deny elevation requests' | CIS Microsoft Windows Server 2019 STIG v2.0.0 STIG DC | Windows | ACCESS CONTROL |
2.3.17.7 (L1) Ensure 'User Account Control: Only elevate UIAccess applications that are installed in secure locations' is set to 'Enabled' | CIS Microsoft Windows Server 2019 STIG v2.0.0 STIG MS | Windows | ACCESS CONTROL |
2.3.17.7 (L1) Ensure 'User Account Control: Switch to the secure desktop when prompting for elevation' is set to 'Enabled' | CIS Microsoft Windows Server 2022 v3.0.0 L1 Member Server | Windows | ACCESS CONTROL |
3.2 Restrict Core Dumps to Protected Directory - Check if COREADM_PROC_SETID_ENABLED is set to no | CIS Solaris 10 L1 v5.2 | Unix | ACCESS CONTROL |
3.5 Review User-Defined Roles | CIS MongoDB Database Audit L2 v1.0.0 | MongoDB | ACCESS CONTROL |
3.6 Review Superuser/Admin Roles - userAdmin | CIS MongoDB Database Audit L2 v1.0.0 | MongoDB | ACCESS CONTROL |
5.2 Restrict Set-UID on User Mounted Devices - Check if nosuid option is set in /etc/rmmount.conf. | CIS Solaris 10 L1 v5.2 | Unix | ACCESS CONTROL |
5.4.2.1 Ensure root is the only UID 0 account | CIS Ubuntu Linux 22.04 LTS v2.0.0 L1 Server | Unix | ACCESS CONTROL |
5.4.2.1 Ensure root is the only UID 0 account | CIS Ubuntu Linux 24.04 LTS v1.0.0 L1 Workstation | Unix | ACCESS CONTROL |
8.2.6 Prevent unauthorized removal and modification of devices. | CIS VMware ESXi 5.5 v1.2.0 Level 1 | VMware | ACCESS CONTROL |
8.2.6 Prevent unauthorized removal, connection, and modification of devices | CIS VMware ESXi 5.1 v1.0.1 Level 1 | VMware | ACCESS CONTROL |
10.3 Restrict access to power management functions - PMCHANGEPERM | CIS Solaris 10 L2 v5.2 | Unix | ACCESS CONTROL |
10.4 Restrict access to sys-suspend feature | CIS Solaris 10 L2 v5.2 | Unix | ACCESS CONTROL |
18.7.10 (L1) Ensure 'Point and Print Restrictions: When installing drivers for a new connection' is set to 'Enabled: Show warning and elevation prompt' | CIS Microsoft Windows Server 2019 Stand-alone v2.0.0 L1 MS | Windows | ACCESS CONTROL |
18.9.27.2 (L1) Ensure 'Do not display network selection UI' is set to 'Enabled' | CIS Microsoft Windows Server 2019 STIG v2.0.0 STIG DC | Windows | ACCESS CONTROL |
18.10.14.2 (L1) Ensure 'Enumerate administrator accounts on elevation' is set to 'Disabled' | CIS Microsoft Windows Server 2019 STIG v2.0.0 STIG MS | Windows | ACCESS CONTROL |
18.10.80.1 (L1) Ensure 'Allow user control over installs' is set to 'Disabled' | CIS Microsoft Windows Server 2019 Stand-alone v2.0.0 L1 MS | Windows | ACCESS CONTROL |
20.43 Ensure 'Organization created Active Directory Organizational Unit (OU) objects have proper access control permissions' (STIG DC only) | CIS Microsoft Windows Server 2019 STIG v2.0.0 STIG DC | Windows | ACCESS CONTROL |
Access Security - SSH - Deny Root logins | Juniper Hardening JunOS 12 Devices Checklist | Juniper | ACCESS CONTROL |
Allow user control over installs | MSCT Windows 10 v21H1 v1.0.0 | Windows | ACCESS CONTROL |
Always install with elevated privileges | MSCT Windows 10 v22H2 v1.0.0 | Windows | ACCESS CONTROL |
Apply UAC restrictions to local accounts on network logons | MSCT Windows 10 v22H2 v1.0.0 | Windows | ACCESS CONTROL |
Configure Windows Defender SmartScreen - ShellSmartScreenLevel | MSCT Windows 10 v20H2 v1.0.0 | Windows | ACCESS CONTROL |
Do not show AutoRepublish warning alert | MSCT Microsoft 365 Apps for Enterprise 2206 v1.0.0 | Windows | ACCESS CONTROL |
IBM i : Allow Restoring of Security-Sensitive Objects (QALWOBJRST) - '*NONE' | IBM System i Security Reference for V7R2 | AS/400 | ACCESS CONTROL |
IBM i : Allow Restoring of Security-Sensitive Objects (QALWOBJRST) - '*NONE' | IBM System i Security Reference for V7R3 | AS/400 | ACCESS CONTROL |
Network access: Restrict clients allowed to make remote calls to SAM | MSCT Windows 10 v21H1 v1.0.0 | Windows | ACCESS CONTROL |
Network access: Restrict clients allowed to make remote calls to SAM | MSCT Windows 10 v21H2 v1.0.0 | Windows | ACCESS CONTROL |
Physical Security - Console Port - Configure the insecure feature | Juniper Hardening JunOS 12 Devices Checklist | Juniper | ACCESS CONTROL |
Turn on PowerShell Script Block Logging - EnableScriptBlockInvocationLogging | MSCT Windows 10 v21H1 v1.0.0 | Windows | ACCESS CONTROL |
User Account Control: Only elevate UIAccess applications that are installed in secure locations | MSCT Windows 10 v21H1 v1.0.0 | Windows | ACCESS CONTROL |
User Account Control: Run all administrators in Admin Approval Mode | MSCT Windows 10 v21H1 v1.0.0 | Windows | ACCESS CONTROL |
User Authentication Security - Limit access to ## SECRET-DATA | Juniper Hardening JunOS 12 Devices Checklist | Juniper | ACCESS CONTROL |
User Authentication Security - Local Authentication - Limit local accounts to required users | Juniper Hardening JunOS 12 Devices Checklist | Juniper | ACCESS CONTROL |