1.4.1 Ensure permissions on bootloader config are not overridden - chmod | CIS Ubuntu Linux 16.04 LTS Workstation L1 v2.0.0 | Unix | ACCESS CONTROL |
1.4.1 Ensure permissions on bootloader config are not overridden - if line | CIS Ubuntu Linux 16.04 LTS Workstation L1 v2.0.0 | Unix | ACCESS CONTROL |
1.6.1.1 Ensure SELinux is enabled in the bootloader configuration - security=selinux | CIS Debian 9 Workstation L2 v1.0.1 | Unix | ACCESS CONTROL |
1.6.1.2 Ensure the SELinux state is enforcing - /etc/selinux/config | CIS Aliyun Linux 2 L2 v1.0.0 | Unix | ACCESS CONTROL |
1.6.1.3 Ensure SELinux policy is configured | CIS Debian 9 Server L2 v1.0.1 | Unix | ACCESS CONTROL |
1.6.1.3 Ensure SELinux policy is configured | CIS CentOS 6 Workstation L1 v3.0.0 | Unix | ACCESS CONTROL |
1.6.1.3 Ensure SELinux policy is configured - /etc/selinux/config | CIS Aliyun Linux 2 L2 v1.0.0 | Unix | ACCESS CONTROL |
1.6.1.4 Ensure no unconfined daemons exist | CIS Debian 9 Server L2 v1.0.1 | Unix | ACCESS CONTROL |
1.6.1.4 Ensure no unconfined daemons exist | CIS Debian 9 Workstation L2 v1.0.1 | Unix | ACCESS CONTROL |
1.6.2.2 Ensure all AppArmor Profiles are enforcing - complain mode | CIS Debian 9 Workstation L2 v1.0.1 | Unix | ACCESS CONTROL |
1.6.2.2 Ensure all AppArmor Profiles are enforcing - profiles loaded | CIS Debian 9 Workstation L2 v1.0.1 | Unix | ACCESS CONTROL |
1.7.1.2 Ensure AppArmor is enabled in the bootloader configuration - apparmor=1 | CIS Debian Family Server L1 v1.0.0 | Unix | ACCESS CONTROL |
1.7.1.3 Ensure all AppArmor Profiles are in enforce or complain mode - 0 processes are unconfined | CIS Debian Family Workstation L1 v1.0.0 | Unix | ACCESS CONTROL |
1.7.1.3 Ensure all AppArmor Profiles are in enforce or complain mode - profiles loaded | CIS Debian Family Server L1 v1.0.0 | Unix | ACCESS CONTROL |
1.7.1.4 Ensure all AppArmor Profiles are enforcing - complain mode | CIS Debian Family Workstation L2 v1.0.0 | Unix | ACCESS CONTROL |
1.7.1.4 Ensure all AppArmor Profiles are enforcing - profiles loaded | CIS Debian Family Server L2 v1.0.0 | Unix | ACCESS CONTROL |
1.7.1.4 Ensure all AppArmor Profiles are enforcing - profiles loaded | CIS Debian Family Workstation L2 v1.0.0 | Unix | ACCESS CONTROL |
1.7.1.4 Ensure the SELinux mode is enforcing or permissive - getenforce | CIS Fedora 19 Family Linux Workstation L1 v1.0.0 | Unix | ACCESS CONTROL |
1.7.1.5 Ensure the SELinux mode is enforcing - /etc/selinux/config | CIS Fedora 19 Family Linux Workstation L2 v1.0.0 | Unix | ACCESS CONTROL |
1.8.1.5 Ensure permissions on /etc/issue are configured | CIS Fedora 19 Family Linux Server L1 v1.0.0 | Unix | ACCESS CONTROL |
2.3 Set umask value for DB2 admin user .profile file | CIS IBM DB2 v10 v1.1.0 Linux OS Level 1 | Unix | ACCESS CONTROL |
4.4 Ensure logrotate assigns appropriate permissions | CIS Debian Family Workstation L1 v1.0.0 | Unix | ACCESS CONTROL |
5.1 Use secure Realms | CIS Apache Tomcat 8 L2 v1.1.0 | Unix | ACCESS CONTROL |
5.1.2 Ensure permissions on /etc/crontab are configured | CIS Fedora 19 Family Linux Server L1 v1.0.0 | Unix | ACCESS CONTROL |
5.1.2 Ensure permissions on /etc/crontab are configured | CIS Fedora 19 Family Linux Workstation L1 v1.0.0 | Unix | ACCESS CONTROL |
5.1.5 Ensure permissions on /etc/cron.weekly are configured | CIS Fedora 19 Family Linux Workstation L1 v1.0.0 | Unix | ACCESS CONTROL |
5.1.6 Ensure permissions on /etc/cron.monthly are configured | CIS Fedora 19 Family Linux Workstation L1 v1.0.0 | Unix | ACCESS CONTROL |
5.1.7 Ensure permissions on /etc/cron.d are configured | CIS Fedora 19 Family Linux Server L1 v1.0.0 | Unix | ACCESS CONTROL |
5.1.7 Ensure permissions on /etc/cron.d are configured | CIS Fedora 19 Family Linux Workstation L1 v1.0.0 | Unix | ACCESS CONTROL |
5.1.9 Ensure at is restricted to authorized users - '/etc/at.allow' | CIS Ubuntu Linux 16.04 LTS Workstation L1 v2.0.0 | Unix | ACCESS CONTROL |
5.2.1 Ensure permissions on /etc/ssh/sshd_config are configured | CIS Fedora 19 Family Linux Server L1 v1.0.0 | Unix | ACCESS CONTROL |
5.2.3 Ensure permissions on SSH public host key files are configured | CIS Fedora 19 Family Linux Workstation L1 v1.0.0 | Unix | ACCESS CONTROL |
5.3.2 Ensure permissions on SSH private host key files are configured | CIS CentOS 6 Server L1 v3.0.0 | Unix | ACCESS CONTROL |
5.3.2 Ensure permissions on SSH private host key files are configured | CIS CentOS 6 Workstation L1 v3.0.0 | Unix | ACCESS CONTROL |
6.1.1 Audit system file permissions | CIS Fedora 19 Family Linux Workstation L2 v1.0.0 | Unix | ACCESS CONTROL |
6.1.1 Audit system file permissions | CIS Debian 9 Workstation L2 v1.0.1 | Unix | ACCESS CONTROL |
6.1.1 Audit system file permissions | CIS Aliyun Linux 2 L2 v1.0.0 | Unix | ACCESS CONTROL |
6.1.2 Ensure permissions on /etc/passwd are configured | CIS Fedora 19 Family Linux Server L1 v1.0.0 | Unix | ACCESS CONTROL |
6.1.2 Ensure permissions on /etc/passwd are configured | CIS Fedora 19 Family Linux Workstation L1 v1.0.0 | Unix | ACCESS CONTROL |
6.1.8 Ensure permissions on /etc/group- are configured | CIS Fedora 19 Family Linux Server L1 v1.0.0 | Unix | ACCESS CONTROL |
6.1.8 Ensure permissions on /etc/group- are configured | CIS Fedora 19 Family Linux Workstation L1 v1.0.0 | Unix | ACCESS CONTROL |
6.1.10 Ensure no world writable files exist | CIS Debian Family Server L1 v1.0.0 | Unix | ACCESS CONTROL |
6.2.9 Ensure users own their home directories | CIS Aliyun Linux 2 L1 v1.0.0 | Unix | ACCESS CONTROL |
6.2.17 Ensure shadow group is empty | CIS Debian Family Server L1 v1.0.0 | Unix | ACCESS CONTROL |
7.3 Set Default umask for users - UMASK = 027 | CIS Solaris 11 L1 v1.1.0 | Unix | ACCESS CONTROL |
7.4 Set Default File Creation Mask for FTP Users | CIS Solaris 11.1 L1 v1.0.0 | Unix | ACCESS CONTROL |
7.6 Ensure directory in logging.properties is a secure location - check application log directory is secure | CIS Apache Tomcat 9 L1 v1.2.0 Middleware | Unix | ACCESS CONTROL |
8.2 Create Warning Banner for CDE Users - Check if file permissions for files under /etc/dt/config/*/Xresources are OK. | CIS Solaris 10 L1 v5.2 | Unix | ACCESS CONTROL |
10.3 Ensure the named_t Process Type is Not in Permissive Mode | CIS BIND DNS v1.0.0 L2 Caching Only Name Server | Unix | ACCESS CONTROL |
10.4 Set Default umask for Users- '/etc/login.defs' | CIS Ubuntu 12.04 LTS Benchmark L1 v1.1.0 | Unix | ACCESS CONTROL |