Item Search

NameAudit NamePluginCategory
1.1.2.2.2 Ensure nodev option set on /dev/shm partitionCIS AlmaLinux OS 8 Server L1 v3.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

1.1.2.3.1 Ensure separate partition exists for /homeCIS Debian Linux 11 v2.0.0 L2 WorkstationUnix

ACCESS CONTROL, MEDIA PROTECTION

1.1.2.4.2 Ensure nodev option set on /var partitionCIS Debian Linux 12 v1.1.0 L1 ServerUnix

ACCESS CONTROL, MEDIA PROTECTION

1.1.2.4.3 Ensure nosuid option set on /var partitionCIS AlmaLinux OS 8 Server L1 v3.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

1.1.2.5.1 Ensure separate partition exists for /var/tmpCIS Debian Linux 11 v2.0.0 L2 WorkstationUnix

ACCESS CONTROL, MEDIA PROTECTION

1.1.2.5.2 Ensure nodev option set on /var/tmp partitionCIS AlmaLinux OS 8 Server L1 v3.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

1.1.2.5.3 Ensure nosuid option set on /var/tmp partitionCIS Debian Linux 12 v1.1.0 L1 WorkstationUnix

ACCESS CONTROL, MEDIA PROTECTION

1.1.2.6.4 Ensure noexec option set on /var/log partitionCIS AlmaLinux OS 8 Server L1 v3.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

1.3.1 Ensure bootloader password is setCIS AlmaLinux OS 8 Server L1 v3.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

1.3.1.1 Ensure AppArmor is installedCIS Debian Linux 12 v1.1.0 L1 ServerUnix

ACCESS CONTROL, MEDIA PROTECTION

1.3.1.1 Ensure AppArmor is installedCIS Debian Linux 12 v1.1.0 L1 WorkstationUnix

ACCESS CONTROL, MEDIA PROTECTION

1.3.1.4 Ensure all AppArmor Profiles are enforcingCIS Debian Linux 11 v2.0.0 L2 WorkstationUnix

ACCESS CONTROL, MEDIA PROTECTION

1.5.1.1 Ensure SELinux is installedCIS AlmaLinux OS 8 Server L1 v3.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

1.5.1.2 Ensure SELinux is not disabled in bootloader configurationCIS AlmaLinux OS 8 Server L1 v3.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

1.5.1.3 Ensure SELinux policy is configuredCIS AlmaLinux OS 8 Server L1 v3.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

1.6.4 Ensure access to /etc/motd is configuredCIS Debian Linux 12 v1.1.0 L1 WorkstationUnix

ACCESS CONTROL, MEDIA PROTECTION

1.6.5 Ensure access to /etc/issue is configuredCIS Debian Linux 12 v1.1.0 L1 ServerUnix

ACCESS CONTROL, MEDIA PROTECTION

1.6.5 Ensure access to /etc/issue is configuredCIS Debian Linux 12 v1.1.0 L1 WorkstationUnix

ACCESS CONTROL, MEDIA PROTECTION

1.6.6 Ensure access to /etc/issue.net is configuredCIS Debian Linux 12 v1.1.0 L1 ServerUnix

ACCESS CONTROL, MEDIA PROTECTION

1.7.4 Ensure access to /etc/motd is configuredCIS AlmaLinux OS 8 Server L1 v3.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

1.7.5 Ensure access to /etc/issue is configuredCIS AlmaLinux OS 8 Server L1 v3.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

1.7.6 Ensure access to /etc/issue.net is configuredCIS AlmaLinux OS 8 Server L1 v3.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

2.2.1.9 Ensure 'Allow documents from unmanaged sources in managed destinations' is set to 'Disabled'MobileIron - CIS Apple iPadOS 17 v1.1.0 End User Owned L1MDM

ACCESS CONTROL, MEDIA PROTECTION

2.2.1.10 Ensure 'Treat AirDrop as unmanaged destination' is set to 'Enabled'AirWatch - CIS Apple iPadOS 17 v1.1.0 End User Owned L1MDM

ACCESS CONTROL, MEDIA PROTECTION

2.2.1.11 Ensure 'Allow Handoff' is set to 'Disabled'MobileIron - CIS Apple iPadOS 17 v1.1.0 End User Owned L2MDM

ACCESS CONTROL, MEDIA PROTECTION

3.2.1.22 Ensure 'Allow documents from unmanaged sources in managed destinations' is set to 'Disabled'AirWatch - CIS Apple iPadOS 17 Institutionally Owned L1MDM

ACCESS CONTROL, MEDIA PROTECTION

3.2.1.22 Ensure 'Allow documents from unmanaged sources in managed destinations' is set to 'Disabled'MobileIron - CIS Apple iPadOS 17 Institutionally Owned L1MDM

ACCESS CONTROL, MEDIA PROTECTION

3.7.1 Ensure 'Allow user to move messages from this account' is set to 'Disabled'AirWatch - CIS Apple iPadOS 17 Institutionally Owned L1MDM

ACCESS CONTROL, MEDIA PROTECTION

3.7.2 Ensure 'Allow Mail Drop' is set to 'Disabled'MobileIron - CIS Apple iPadOS 17 Institutionally Owned L2MDM

ACCESS CONTROL, MEDIA PROTECTION

4.1.1.5 Ensure permissions on /etc/cron.weekly are configuredCIS AlmaLinux OS 8 Server L1 v3.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

5.1.1 Ensure Home Folders Are SecureCIS Apple macOS 11.0 Big Sur v4.0.0 L1Unix

ACCESS CONTROL, MEDIA PROTECTION

5.1.4 Ensure all logfiles have appropriate access configuredCIS AlmaLinux OS 8 Server L1 v3.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

5.1.6 Ensure No World Writable Files Exist in the Library FolderCIS Apple macOS 10.15 Catalina v3.0.0 L2Unix

ACCESS CONTROL, MEDIA PROTECTION

5.2.4.4 Ensure only authorized groups are assigned ownership of audit log filesCIS Amazon Linux 2 v3.0.0 L2Unix

ACCESS CONTROL, MEDIA PROTECTION

5.2.4.10 Ensure audit tools belong to group rootCIS Amazon Linux 2 v3.0.0 L2Unix

ACCESS CONTROL, MEDIA PROTECTION

5.4.2.3 Ensure group root is the only GID 0 groupCIS Debian Linux 12 v1.1.0 L1 ServerUnix

ACCESS CONTROL, MEDIA PROTECTION

6.1.4.1 Ensure access to all logfiles has been configuredCIS Debian Linux 12 v1.1.0 L1 ServerUnix

ACCESS CONTROL, MEDIA PROTECTION

6.1.6 Ensure permissions on /etc/shadow are configuredCIS AlmaLinux OS 8 Server L1 v3.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

6.1.9 Ensure permissions on /etc/gshadow- are configuredCIS AlmaLinux OS 8 Server L1 v3.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

6.1.11 Ensure world writable files and directories are securedCIS AlmaLinux OS 8 Server L1 v3.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

6.4.4.1 Ensure audit log files mode is configuredCIS Debian Linux 11 v2.0.0 L2 ServerUnix

ACCESS CONTROL, MEDIA PROTECTION

6.4.4.3 Ensure audit log files group owner is configuredCIS Debian Linux 11 v2.0.0 L2 WorkstationUnix

ACCESS CONTROL, MEDIA PROTECTION

6.4.4.6 Ensure audit configuration files owner is configuredCIS Debian Linux 11 v2.0.0 L2 ServerUnix

ACCESS CONTROL, MEDIA PROTECTION

6.4.4.8 Ensure audit tools mode is configuredCIS Debian Linux 11 v2.0.0 L2 ServerUnix

ACCESS CONTROL, MEDIA PROTECTION

6.4.4.8 Ensure audit tools mode is configuredCIS Debian Linux 11 v2.0.0 L2 WorkstationUnix

ACCESS CONTROL, MEDIA PROTECTION

7.1.1 Ensure permissions on /etc/passwd are configuredCIS Debian Linux 12 v1.1.0 L1 ServerUnix

ACCESS CONTROL, MEDIA PROTECTION

7.1.5 Ensure permissions on /etc/shadow are configuredCIS Debian Linux 12 v1.1.0 L1 ServerUnix

ACCESS CONTROL, MEDIA PROTECTION

7.1.6 Ensure permissions on /etc/shadow- are configuredCIS Debian Linux 12 v1.1.0 L1 ServerUnix

ACCESS CONTROL, MEDIA PROTECTION

7.1.7 Ensure permissions on /etc/gshadow are configuredCIS Debian Linux 12 v1.1.0 L1 ServerUnix

ACCESS CONTROL, MEDIA PROTECTION

7.2.4 Ensure shadow group is emptyCIS Debian Linux 12 v1.1.0 L1 ServerUnix

ACCESS CONTROL, MEDIA PROTECTION