Item Search

NameAudit NamePluginCategory
1.1.2 Ensure /tmp is configuredCIS CentOS 6 Server L2 v3.0.0Unix

CONFIGURATION MANAGEMENT

1.1.7 Ensure separate partition exists for /varCIS Amazon Linux 2 STIG v1.0.0 L2Unix

CONFIGURATION MANAGEMENT

1.1.11 Ensure separate partition exists for /var/tmpCIS Fedora 19 Family Linux Server L2 v1.0.0Unix

CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

1.1.11 Ensure separate partition exists for /var/tmpCIS Fedora 19 Family Linux Workstation L2 v1.0.0Unix

CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

1.1.13 Ensure separate partition exists for /var/log/auditCIS Amazon Linux 2 STIG v1.0.0 L2Unix

AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT

1.3.2 Ensure 'Idle session timeout' is set to '3 hours (or less)' for unmanaged devicesCIS Microsoft 365 Foundations E3 L1 v3.1.0microsoft_azure

ACCESS CONTROL

2.1.1.3 Ensure iCloud Drive Document and Desktop Sync Is DisabledCIS Apple macOS 13.0 Ventura v3.0.0 L2Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

2.1.1.3 Ensure iCloud Drive Document and Desktop Sync Is DisabledCIS Apple macOS 15.0 Sequoia v1.0.0 L2Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

2.1.1.3 Ensure iCloud Drive Document and Desktop Sync Is DisabledCIS Apple macOS 14.0 Sonoma v2.0.0 L2Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

2.2.6 Ensure Multi-factor Authentication is Required for Risky Sign-insCIS Microsoft Azure Foundations v3.0.0 L2microsoft_azure

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

2.6.1.3 Ensure iCloud Drive Document and Desktop Sync Is DisabledCIS Apple macOS 12.0 Monterey v3.1.0 L2Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

2.6.4 iCloud Drive Document and Desktop sync - desktopCIS Apple macOS 10.13 L2 v1.1.0Unix

CONFIGURATION MANAGEMENT

3.1.12 Ensure That 'All users with the following roles' is set to 'Owner'CIS Microsoft Azure Foundations v3.0.0 L1microsoft_azure

INCIDENT RESPONSE

3.3.1 Ensure ip forwarding is disabledCIS AlmaLinux OS 8 Workstation L1 v3.0.0Unix

CONFIGURATION MANAGEMENT

3.3.1 Ensure ip forwarding is disabledCIS Oracle Linux 8 Server L1 v3.0.0Unix

CONFIGURATION MANAGEMENT

3.3.1 Ensure ip forwarding is disabledCIS Red Hat EL8 Workstation L1 v3.0.0Unix

CONFIGURATION MANAGEMENT

3.3.1 Ensure ip forwarding is disabledCIS Rocky Linux 8 Server L1 v2.0.0Unix

CONFIGURATION MANAGEMENT

3.3.1 Ensure ip forwarding is disabledCIS Red Hat EL8 Server L1 v3.0.0Unix

CONFIGURATION MANAGEMENT

4.14 Ensure Storage Logging is Enabled for Table Service for 'Read', 'Write', and 'Delete' RequestsCIS Microsoft Azure Foundations v3.0.0 L2microsoft_azure

AUDIT AND ACCOUNTABILITY

5.1.1 Ensure Home Folders Are SecureCIS Apple macOS 10.15 Catalina v3.0.0 L1Unix

ACCESS CONTROL, MEDIA PROTECTION

5.1.1 Ensure Home Folders Are SecureCIS Apple macOS 10.14 v2.0.0 L1Unix

ACCESS CONTROL, MEDIA PROTECTION

5.1.1 Ensure Home Folders Are SecureCIS Apple macOS 11.0 Big Sur v4.0.0 L1Unix

ACCESS CONTROL, MEDIA PROTECTION

5.1.1 Secure Home FoldersCIS Apple macOS 10.12 L1 v1.2.0Unix

CONFIGURATION MANAGEMENT

5.1.1 Secure Home FoldersCIS Apple macOS 10.13 L1 v1.1.0Unix

CONFIGURATION MANAGEMENT

5.2.2.8 Ensure admin center access is limited to administrative rolesCIS Microsoft 365 Foundations E3 L1 v3.1.0microsoft_azure

ACCESS CONTROL

5.4.1 Ensure the GKE Metadata Server is EnabledCIS Google Kubernetes Engine (GKE) v1.6.1 L2GCP

CONFIGURATION MANAGEMENT

5.5.2 Ensure Node Auto-Repair is enabled for GKE nodesCIS Google Kubernetes Engine (GKE) v1.6.1 L2GCP

RISK ASSESSMENT

5.5.4 When creating New Clusters - Automate GKE version management using Release ChannelsCIS Google Kubernetes Engine (GKE) v1.6.1 L1GCP

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

5.5.5 Ensure Shielded GKE Nodes are EnabledCIS Google Kubernetes Engine (GKE) v1.6.1 L1GCP

CONFIGURATION MANAGEMENT

5.5.6 Ensure Integrity Monitoring for Shielded GKE Nodes is EnabledCIS Google Kubernetes Engine (GKE) v1.6.1 L1GCP

RISK ASSESSMENT

5.5.7 Ensure Secure Boot for Shielded GKE Nodes is EnabledCIS Google Kubernetes Engine (GKE) v1.6.1 L2GCP

RISK ASSESSMENT

5.6.3 Ensure Control Plane Authorized Networks is EnabledCIS Google Kubernetes Engine (GKE) v1.6.1 L2GCP

ACCESS CONTROL, MEDIA PROTECTION

5.10.2 Ensure that Alpha clusters are not used for production workloadsCIS Google Kubernetes Engine (GKE) v1.6.1 L1GCP

SYSTEM AND COMMUNICATIONS PROTECTION

6.1 Ensure Root Domain Alias Record Points to ELBCIS Amazon Web Services Three-tier Web Architecture L2 1.0.0amazon_aws

SYSTEM AND COMMUNICATIONS PROTECTION

6.3 Use CloudFront Content Distribution NetworkCIS Amazon Web Services Three-tier Web Architecture L1 1.0.0amazon_aws
6.4 Ensure DNS sinkholing is configured on all anti-spyware profiles in useCIS Palo Alto Firewall 9 v1.1.0 L1Palo_Alto

SYSTEM AND INFORMATION INTEGRITY

6.24 Create the Data tier Security Group and ensure it allows inbound connections from App tier Security Group for explicit portsCIS Amazon Web Services Three-tier Web Architecture L1 1.0.0amazon_aws

SYSTEM AND COMMUNICATIONS PROTECTION

7.3.2 Ensure OneDrive sync is restricted for unmanaged devicesCIS Microsoft 365 Foundations E3 L2 v3.1.0microsoft_azure

CONFIGURATION MANAGEMENT

7.4 Software Inventory ConsiderationsCIS Apple OSX 10.9 L2 v1.3.0Unix
7.4 Software Inventory ConsiderationsCIS Apple OSX 10.11 El Capitan L2 v1.1.0Unix
7.4 Software Inventory ConsiderationsCIS Apple macOS 10.12 L2 v1.2.0Unix

CONFIGURATION MANAGEMENT

18.10.16.1 (L1) Ensure 'Download Mode' is NOT set to 'Enabled: Internet'CIS Microsoft Windows 10 Stand-alone v3.0.0 L1Windows

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

18.10.16.1 (L1) Ensure 'Download Mode' is NOT set to 'Enabled: Internet'CIS Microsoft Windows 10 Stand-alone v3.0.0 L1 NGWindows

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

18.10.16.1 (L1) Ensure 'Download Mode' is NOT set to 'Enabled: Internet'CIS Microsoft Windows 10 EMS Gateway v3.0.0 L1Windows

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

18.10.16.1 (L1) Ensure 'Download Mode' is NOT set to 'Enabled: Internet'CIS Microsoft Windows 11 Stand-alone v3.0.0 L1Windows

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

18.10.16.1 (L1) Ensure 'Download Mode' is NOT set to 'Enabled: Internet'CIS Microsoft Windows 11 Enterprise v3.0.0 L1Windows

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

18.10.16.1 (L1) Ensure 'Download Mode' is NOT set to 'Enabled: Internet'CIS Microsoft Windows 10 Enterprise v3.0.0 L1 + NGWindows

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

18.10.16.1 Ensure 'Download Mode' is set to 'Enabled' (STIG only)CIS Microsoft Windows Server 2019 STIG v2.0.0 STIG DCWindows

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

18.10.16.1 Ensure 'Download Mode' is set to 'Enabled' (STIG only)CIS Microsoft Windows Server 2022 STIG v1.0.0 STIG DCWindows

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

WPAW-00-002200 - The Windows PAW must be configured so that all outbound connections to the Internet from a PAW are blocked.DISA MS Windows Privileged Access Workstation v3r1Windows

CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION