Item Search

NameAudit NamePluginCategory
1.1 Verify all Apple provided software is currentCIS Apple macOS 10.12 L1 v1.2.0Unix

SYSTEM AND INFORMATION INTEGRITY

1.5 Ensure Install Security Responses and System Files Is EnabledCIS Apple macOS 15.0 Sequoia v1.1.0 L1Unix

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

1.6 Ensure Install Security Responses and System Files Is EnabledCIS Apple macOS 15.0 Sequoia Cloud-tailored v1.0.0 L1Unix

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

1.6 Ensure Install Security Responses and System Files Is EnabledCIS Apple macOS 13.0 Ventura v3.1.0 L1Unix

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

1.6 Ensure Install Security Responses and System Files Is EnabledCIS Apple macOS 14.0 Sonoma Cloud-tailored v1.1.0 L1Unix

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

2.2.2.2 Ensure Content Caching Is DisabledCIS Apple macOS 15.0 Sequoia Cloud-tailored v1.0.0 L2Unix

CONFIGURATION MANAGEMENT

2.4.2 Ensure 'Require alphanumeric value' is set to 'Enabled'AirWatch - CIS Apple iOS 18 v1.0.0 L2 Institution OwnedMDM

IDENTIFICATION AND AUTHENTICATION

2.5.1.1 Ensure External Intelligence Extensions Is DisabledCIS Apple macOS 15.0 Sequoia v1.1.0 L1Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

3.2.1.1 Ensure 'Allow screenshots and screen recording' is set to 'Disabled'AirWatch - CIS Apple iOS 11 v1.0.0 Institution Owned L2MDM

CONFIGURATION MANAGEMENT

3.2.1.8 Ensure 'Allow USB drive access in Files app' is set to 'Disabled'MobileIron - CIS Apple iOS 18 v1.0.0 L2 Institution OwnedMDM

CONFIGURATION MANAGEMENT

3.2.1.8 Ensure 'Allow USB drive access in Files app' is set to 'Disabled'AirWatch - CIS Apple iPadOS 18 v1.0.0 L2 Institutionally OwnedMDM

CONFIGURATION MANAGEMENT

3.2.1.8 Ensure 'Allow USB drive access in Files app' is set to 'Disabled'MobileIron - CIS Apple iPadOS 18 v1.0.0 L2 Institutionally OwnedMDM

CONFIGURATION MANAGEMENT

3.2.1.9 Ensure 'Allow network drive access in Files app' is set to 'Disabled'MobileIron - CIS Apple iOS 18 v1.0.0 L2 Institution OwnedMDM

CONFIGURATION MANAGEMENT

3.2.1.9 Ensure 'Allow network drive access in Files app' is set to 'Disabled'AirWatch - CIS Apple iPadOS 18 v1.0.0 L2 Institutionally OwnedMDM

CONFIGURATION MANAGEMENT

3.2.1.9 Ensure 'Allow network drive access in Files app' is set to 'Disabled'MobileIron - CIS Apple iPadOS 18 v1.0.0 L2 Institutionally OwnedMDM

CONFIGURATION MANAGEMENT

3.2.1.10 Ensure 'Allow users to accept untrusted TLS certificates' is set to 'Disabled'MobileIron - CIS Apple iOS 11 v1.0.0 Institution Owned L2MDM

SYSTEM AND COMMUNICATIONS PROTECTION

3.2.1.10 Ensure 'Allow users to accept untrusted TLS certificates' is set to 'Disabled'AirWatch - CIS Apple iOS 12 v1.0.0 Institution Owned L2MDM

SYSTEM AND COMMUNICATIONS PROTECTION

3.2.1.13 Ensure 'Allow users to accept untrusted TLS certificates' is set to 'Disabled'MobileIron - CIS Apple iPadOS 18 v1.0.0 L2 Institutionally OwnedMDM

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

3.2.1.18 Ensure 'Allow modifying cellular data app settings' is set to 'Disabled'MobileIron - CIS Apple iPadOS 18 v1.0.0 L2 Institutionally OwnedMDM

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

3.2.1.20 Ensure 'Allow pairing with non-Configurator hosts' is set to 'Disabled'AirWatch - CIS Apple iPadOS 18 v1.0.0 L2 Institutionally OwnedMDM

CONFIGURATION MANAGEMENT

3.2.1.20 Ensure 'Allow pairing with non-Configurator hosts' is set to 'Disabled'MobileIron - CIS Apple iPadOS 18 v1.0.0 L2 Institutionally OwnedMDM

CONFIGURATION MANAGEMENT

3.3.2 Include TSIG key in named.conf 'TSIG key 1 permissions'CIS ISC BIND 9.0/9.5 v2.0.0Unix
3.3.2 Include TSIG key in named.conf 'TSIG key 2 permissions'CIS ISC BIND 9.0/9.5 v2.0.0Unix
3.4.2 Ensure 'Require alphanumeric value' is set to 'Enabled'MobileIron - CIS Apple iOS 18 v1.0.0 L2 Institution OwnedMDM

IDENTIFICATION AND AUTHENTICATION

3.6.2 Ensure 'Allow Mail Drop' is set to 'Disabled'AirWatch - CIS Apple iOS 12 v1.0.0 Institution Owned L2MDM

CONFIGURATION MANAGEMENT

3.6.2 Ensure 'Allow Mail Drop' is set to 'Disabled'MobileIron - CIS Apple iOS 12 v1.0.0 Institution Owned L2MDM

CONFIGURATION MANAGEMENT

3.7.2 Ensure 'Allow Mail Drop' is set to 'Disabled'MobileIron - CIS Apple iOS 18 v1.0.0 L2 Institution OwnedMDM

ACCESS CONTROL, MEDIA PROTECTION

3.7.2 Ensure 'Allow Mail Drop' is set to 'Disabled'MobileIron - CIS Apple iPadOS 18 v1.0.0 L2 Institutionally OwnedMDM

ACCESS CONTROL, MEDIA PROTECTION

3.7.2 Ensure 'Allow Mail Drop' is set to 'Disabled'AirWatch - CIS Apple iOS 18 v1.0.0 L2 Institution OwnedMDM

ACCESS CONTROL, MEDIA PROTECTION

3.7.2 Ensure 'Allow Mail Drop' is set to 'Disabled'AirWatch - CIS Apple iPadOS 18 v1.0.0 L2 Institutionally OwnedMDM

ACCESS CONTROL, MEDIA PROTECTION

4.1 Ensure Bonjour Advertising Services Is DisabledCIS Apple macOS 15.0 Sequoia Cloud-tailored v1.0.0 L2Unix

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

4.1.2 Review Emergency ResetAirWatch - CIS Apple iPadOS 18 v1.0.0 L2 Institutionally OwnedMDM

CONFIGURATION MANAGEMENT

4.1.3 Review Lockdown ModeMobileIron - CIS Apple iPadOS 18 v1.0.0 L2 Institutionally OwnedMDM

CONFIGURATION MANAGEMENT

4.1.5 Review AirprintAirWatch - CIS Apple iOS 18 v1.0.0 L2 Institution OwnedMDM

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

5.2.3 Ensure Complex Password Must Contain Alphabetic Characters Is ConfiguredCIS Apple macOS 15.0 Sequoia Cloud-tailored v1.0.0 L2Unix

IDENTIFICATION AND AUTHENTICATION

5.2.4 Ensure Complex Password Must Contain Numeric Character Is ConfiguredCIS Apple macOS 15.0 Sequoia Cloud-tailored v1.0.0 L2Unix

IDENTIFICATION AND AUTHENTICATION

5.9 Ensure XProtect Is Running and UpdatedCIS Apple macOS 13.0 Ventura Cloud-tailored v1.1.0 L1Unix

SYSTEM AND INFORMATION INTEGRITY

7.14 Apple File System (APFS)CIS Apple macOS 10.12 L1 v1.2.0Unix

CONFIGURATION MANAGEMENT

AIOS-12-004400 - Apple iOS must not allow backup to remote systems (My Photo Stream).AirWatch - DISA Apple iOS 12 v2r1MDM

CONFIGURATION MANAGEMENT

AIOS-18-018100 - Apple iOS/iPadOS 18 must implement the management setting: disable Camera.MobileIron - DISA Apple iOS/iPadOS 18 v1r4MDM

CONFIGURATION MANAGEMENT

AIOS-18-018100 - Apple iOS/iPadOS 18 must implement the management setting: disable Camera.AirWatch - DISA Apple iOS/iPadOS 18 v1r4MDM

CONFIGURATION MANAGEMENT

APPL-11-002060 - The macOS system must allow only applications that have a valid digital signature to run - AllowIdentifiedDevelopersDISA STIG Apple macOS 11 v1r5Unix

CONFIGURATION MANAGEMENT

APPL-11-002060 - The macOS system must allow only applications that have a valid digital signature to run - AllowIdentifiedDevelopersDISA STIG Apple macOS 11 v1r8Unix

CONFIGURATION MANAGEMENT

APPL-11-002060 - The macOS system must allow only applications that have a valid digital signature to run - EnableAssessmentDISA STIG Apple macOS 11 v1r8Unix

CONFIGURATION MANAGEMENT

APPL-11-002060 - The macOS system must allow only applications that have a valid digital signature to run - EnableAssessmentDISA STIG Apple macOS 11 v1r5Unix

CONFIGURATION MANAGEMENT

APPL-11-002060 - The macOS system must allow only applications that have a valid digital signature to run - Unsigned ApplicationsDISA STIG Apple macOS 11 v1r8Unix

CONFIGURATION MANAGEMENT

APPL-11-002060 - The macOS system must allow only applications that have a valid digital signature to run - Unsigned ApplicationsDISA STIG Apple macOS 11 v1r5Unix

CONFIGURATION MANAGEMENT

APPL-14-002230 The macOS system must disable dictation.DISA Apple macOS 14 (Sonoma) STIG v2r3Unix

CONFIGURATION MANAGEMENT

APPL-15-002230 - The macOS system must disable Dictation.DISA Apple macOS 15 (Sequoia) STIG v1r4Unix

CONFIGURATION MANAGEMENT

CIS_Palo_Alto_Firewall_10_Benchmark_v1.2.0_L2.audit from CIS Palo Alto Firewall 10 Benchmark v1.2.0CIS Palo Alto Firewall 10 v1.2.0 L2Palo_Alto