1.1.3.1 Configure Authorization | CIS Cisco IOS XR 7.x v1.0.0 L2 | Cisco | ACCESS CONTROL |
1.2.1 Configure Global Authorization Rule to Restrict Access - add roles='administrators' | CIS IIS 7.5 L1 v1.7.1 | Windows | ACCESS CONTROL |
1.5.2 Ensure bootloader password is set | CIS Red Hat EL8 Server L1 v1.0.0 | Unix | ACCESS CONTROL |
1.6.1.2 Ensure the SELinux state is enforcing | CIS Amazon Linux v2.0.0 L2 | Unix | ACCESS CONTROL |
1.6.1.6 Ensure no unconfined daemons exist | CIS Amazon Linux v2.0.0 L2 | Unix | ACCESS CONTROL |
1.6.2.2 Ensure all AppArmor Profiles are enforcing - processes unconfined | CIS SUSE Linux Enterprise Workstation 11 L2 v2.0.0 | Unix | ACCESS CONTROL |
1.6.2.2 Ensure all AppArmor Profiles are enforcing - profile are loaded | CIS Distribution Independent Linux Workstation L2 v1.1.0 | Unix | ACCESS CONTROL |
1.13 Oracle software owner host account - 'Lock account' | CIS v1.1.0 Oracle 11g OS L2 | Unix | ACCESS CONTROL |
2.1 Ensure 'global authorization rule' is set to restrict access | CIS IIS 7 L1 v1.8.0 | Windows | ACCESS CONTROL |
2.2.14 Ensure 'SEC_PROTOCOL_ERROR_FURTHER_ACTION' Is Set to 'DELAY,3' or 'DROP,3' | CIS Oracle Server 11g R2 DB v2.2.0 | OracleDB | ACCESS CONTROL |
2.2.26 Ensure 'Deny log on as a batch job' to include 'Guests, Enterprise Admins Group, and Domain Admins Group' (STIG MS only) | CIS Microsoft Windows Server 2019 STIG v2.0.0 STIG MS | Windows | ACCESS CONTROL |
2.3 Set umask value for DB2 admin user .profile file | CIS v1.1.0 IBM DB2 v10 Linux OS Level 1 | Unix | ACCESS CONTROL |
2.17.1 Ensure 'Prevent Users From Changing Permissions on Rights Managed Content' is set to Disabled | CIS Microsoft Office 2013 v1.1.0 | Windows | ACCESS CONTROL |
2.17.1 Ensure 'Prevent Users From Changing Permissions on Rights Managed Content' is set to Disabled | CIS Microsoft Office 2016 v1.1.0 | Windows | ACCESS CONTROL |
2.17.5 Ensure 'Allow Users With Earlier Versions of Office to Read with Browsers....' is set to Disabled | CIS Microsoft Office 2013 v1.1.0 | Windows | ACCESS CONTROL |
3.1.10 Authenticate federated users at the instance level | CIS IBM DB2 v10 v1.1.0 Windows OS Level 2 | Windows | ACCESS CONTROL |
3.1.11 Authenticate federated users at the instance level | CIS v1.1.0 IBM DB2 v10 Windows OS Level 2 | Windows | ACCESS CONTROL |
4.2 Set 'Prevent users from changing permissions on rights managed content' to 'Disabled' | CIS MS Office Outlook 2010 v1.0.0 | Windows | ACCESS CONTROL |
4.5.1.9 CDE - /etc/dt/config/Xconfig permissions and ownership | CIS IBM AIX 7.2 L1 v1.1.0 | Unix | ACCESS CONTROL |
4.5.4.5 /var/spool/clientmqueue - access control | CIS IBM AIX 7.2 L1 v1.1.0 | Unix | ACCESS CONTROL |
5.1 Set daemon umask - Check if CMASK is set to 022 in /etc/default/init. | CIS Solaris 10 v5.2 | Unix | ACCESS CONTROL |
5.2 Reduce the sudo timeout period | CIS Apple OSX 10.9 Mavericks L1 v1.0.0 | Unix | ACCESS CONTROL |
5.4.4 Ensure default user umask is 027 or more restrictive - /etc/bashrc | CIS Amazon Linux v2.0.0 L1 | Unix | ACCESS CONTROL |
5.4.4 Ensure default user umask is 027 or more restrictive - /etc/profile | CIS Amazon Linux v2.0.0 L1 | Unix | ACCESS CONTROL |
5.4.4 Ensure default user umask is 027 or more restrictive - /etc/profile.local | CIS SUSE Linux Enterprise Workstation 11 L1 v2.0.0 | Unix | ACCESS CONTROL |
6.1.3 Disable guest account login | CIS Apple OSX 10.11 El Capitan L1 v1.1.0 | Unix | ACCESS CONTROL |
Configure Role-Based Access Control - 'security.authorization = enabled' | TNS MongoDB 2.6 Best Practices Linux OS Audit v1.0 | Unix | ACCESS CONTROL |
Connection settings - 'pg_hba.conf no host entries for 'all' users' | TNS PostgreSQL 9.1 Best Practices Windows OS | Windows | ACCESS CONTROL |
Connection settings - 'pg_hba.conf review entries using 'trust' method' | TNS PostgreSQL 9.1 Best Practices Windows OS | Windows | ACCESS CONTROL |
Connections - Host Based Authentication - no unconditional connect | TNS PostgreSQL 9.6 Best Practices Windows OS | Windows | ACCESS CONTROL |
Ensure Standalone LDAP Registry SSL is Enabled | TNS IBM WebSphere Application Server 9 Linux Best Practices | Unix | ACCESS CONTROL |
Internet Zone - Set 'Logon' Prompt for user name and password | MS Security Advisory 2963983 Mitigation Settings audit | Windows | ACCESS CONTROL |
Logon options - Internet Zone | MSCT Windows Server 1903 MS v1.0.0 | Windows | ACCESS CONTROL |
Logon options - Internet Zone | MSCT Windows 10 v1511 v1.0.0 | Windows | ACCESS CONTROL |
Logon options - Internet Zone | MSCT Windows 10 v1709 v1.0.0 | Windows | ACCESS CONTROL |
Logon options - Restricted Sites Zone | MSCT Windows Server 1903 MS v1.0.0 | Windows | ACCESS CONTROL |
Network access: Allow anonymous SID/Name translation | MSCT Windows Server v2004 MS v1.0.0 | Windows | ACCESS CONTROL |
Network access: Allow anonymous SID/Name translation | MSCT Windows Server 2012 R2 DC v1.0.0 | Windows | ACCESS CONTROL |
Network access: Allow anonymous SID/Name translation | MSCT Windows Server 2016 MS v1.0.0 | Windows | ACCESS CONTROL |
Network access: Allow anonymous SID/Name translation | MSCT Windows Server 2019 DC v1.0.0 | Windows | ACCESS CONTROL |
Network access: Allow anonymous SID/Name translation | MSCT Windows Server 2019 MS v1.0.0 | Windows | ACCESS CONTROL |
Network access: Allow anonymous SID/Name translation | MSCT Windows Server v20H2 MS v1.0.0 | Windows | ACCESS CONTROL |
Network access: Allow anonymous SID/Name translation | MSCT Windows 10 v1511 v1.0.0 | Windows | ACCESS CONTROL |
Network access: Allow anonymous SID/Name translation | MSCT Windows 10 v22H2 v1.0.0 | Windows | ACCESS CONTROL |
Network access: Allow anonymous SID/Name translation | MSCT Windows Server 1903 MS v1.0.0 | Windows | ACCESS CONTROL |
Network access: Allow anonymous SID/Name translation | MSCT Windows Server v1909 MS v1.0.0 | Windows | ACCESS CONTROL |
SalesForce.com : User Permissions - 'Review Active System Administrators' | TNS Salesforce Best Practices Audit v1.1.0 | Salesforce.com | ACCESS CONTROL |
User IDs which disclose the privileges associated with it, should not be created. 'lock' | TNS IBM HTTP Server Best Practice | Unix | ACCESS CONTROL |
VM : verify-network-filter | VMWare vSphere 6.0 Hardening Guide | VMware | ACCESS CONTROL |
VM: verify-network-filter | TNS VMWare vSphere Best Practices | VMware | ACCESS CONTROL |