1.6.1.1 Ensure SELinux is not disabled in bootloader configuration - enforcing = 0 | CIS Amazon Linux v2.0.0 L2 | Unix | ACCESS CONTROL, SYSTEM AND INFORMATION INTEGRITY |
1.6.1.1 Ensure SELinux or AppArmor are installed | CIS Distribution Independent Linux Workstation L2 v2.0.0 | Unix | ACCESS CONTROL |
1.6.1.2 Ensure SELinux is not disabled in bootloader configuration - enforcing=0 | CIS CentOS 6 Server L1 v3.0.0 | Unix | ACCESS CONTROL |
1.6.1.2 Ensure SELinux is not disabled in bootloader configuration - selinux=0 | CIS CentOS 6 Workstation L1 v3.0.0 | Unix | ACCESS CONTROL |
1.6.2.3 Ensure SELinux policy is configured | CIS Distribution Independent Linux Server L2 v2.0.0 | Unix | ACCESS CONTROL |
1.6.3.2 Ensure all AppArmor Profiles are enforcing - 0 processes are unconfirmed | CIS Distribution Independent Linux Server L2 v2.0.0 | Unix | ACCESS CONTROL |
1.6.3.2 Ensure all AppArmor Profiles are enforcing - profiles are loaded | CIS Distribution Independent Linux Workstation L2 v2.0.0 | Unix | ACCESS CONTROL |
1.7.4 Ensure permissions on /etc/motd are configured | CIS CentOS 6 Workstation L1 v3.0.0 | Unix | ACCESS CONTROL |
1.7.6 Ensure permissions on /etc/issue.net are configured | CIS CentOS 6 Server L1 v3.0.0 | Unix | ACCESS CONTROL |
2.6 Set Group named or root for BIND Directories and Files | CIS BIND DNS v1.0.0 L1 Authoritative Name Server | Unix | ACCESS CONTROL |
2.6 Set Group named or root for BIND Directories and Files | CIS BIND DNS v1.0.0 L1 Caching Only Name Server | Unix | ACCESS CONTROL |
2.8 Set Other Permissions Read-Only for All BIND Directories and Files - files | CIS BIND DNS v1.0.0 L1 Caching Only Name Server | Unix | ACCESS CONTROL |
2.9 Isolate BIND with chroot'ed Subdirectory | CIS BIND DNS v1.0.0 L2 Caching Only Name Server | Unix | ACCESS CONTROL |
3.1 Ensure the Apache Web Server Runs As a Non-Root User - 'apache account is configured' | CIS Apache HTTP Server 2.2 L1 v3.6.0 Middleware | Unix | ACCESS CONTROL |
3.2.1.21 Ensure 'Treat AirDrop as unmanaged destination' is set to 'Enabled' | AirWatch - CIS Apple iOS 14 and iPadOS 14 Institution Owned L1 | MDM | ACCESS CONTROL |
3.2.1.23 Ensure 'Require Touch ID / Face ID authentication before AutoFill' is set to 'Enabled' | AirWatch - CIS Apple iOS 14 and iPadOS 14 Institution Owned L1 | MDM | ACCESS CONTROL |
3.2.1.24 Ensure 'Force Apple Watch wrist detection' is set to 'Enabled' | AirWatch - CIS Apple iOS 14 and iPadOS 14 Institution Owned L1 | MDM | ACCESS CONTROL |
3.5 Ensure the Group Is Set Correctly on Apache Directories and Files | CIS Apache HTTP Server 2.2 L2 v3.6.0 | Unix | ACCESS CONTROL |
3.6.2 Ensure 'Allow Mail Drop' is set to 'Disabled' | MobileIron - CIS Apple iOS 14 and iPadOS 14 Institution Owned L2 | MDM | ACCESS CONTROL |
3.13 Ensure Access to Special Purpose Application Writable Directories is Properly Restricted | CIS Apache HTTP Server 2.2 L1 v3.6.0 | Unix | ACCESS CONTROL |
3.13 Ensure Access to Special Purpose Application Writable Directories is Properly Restricted | CIS Apache HTTP Server 2.2 L1 v3.6.0 Middleware | Unix | ACCESS CONTROL |
4.1 Ensure Access to OS Root Directory Is Denied By Default - 'httpd.conf no Allow directives exist' | CIS Apache HTTP Server 2.2 L1 v3.6.0 | Unix | ACCESS CONTROL |
4.1 Ensure Access to OS Root Directory Is Denied By Default - 'httpd.conf no Allow directives exist' | CIS Apache HTTP Server 2.2 L1 v3.6.0 Middleware | Unix | ACCESS CONTROL |
4.1 Ensure Access to OS Root Directory Is Denied By Default - 'httpd.conf Order = Deny,Allow | CIS Apache HTTP Server 2.2 L1 v3.6.0 | Unix | ACCESS CONTROL |
4.2 Ensure Appropriate Access to Web Content Is Allowed - 'httpd.conf Order Deny,Allow' | CIS Apache HTTP Server 2.2 L1 v3.6.0 | Unix | ACCESS CONTROL |
4.2 Restrict access to $CATALINA_BASE | CIS Apache Tomcat 8 L1 v1.1.0 Middleware | Unix | ACCESS CONTROL |
4.3 Ensure OverRide Is Disabled for the OS Root Directory | CIS Apache HTTP Server 2.2 L1 v3.6.0 | Unix | ACCESS CONTROL |
4.3 Ensure OverRide Is Disabled for the OS Root Directory | CIS Apache HTTP Server 2.2 L2 v3.6.0 | Unix | ACCESS CONTROL |
4.3 Restrict access to Tomcat configuration directory | CIS Apache Tomcat 8 L1 v1.1.0 | Unix | ACCESS CONTROL |
4.10 Restrict access to Tomcat context.xml | CIS Apache Tomcat 8 L1 v1.1.0 | Unix | ACCESS CONTROL |
4.10 Restrict access to Tomcat context.xml | CIS Apache Tomcat 8 L1 v1.1.0 Middleware | Unix | ACCESS CONTROL |
5.1.5 Ensure permissions on /etc/cron.weekly are configured | CIS CentOS 6 Workstation L1 v3.0.0 | Unix | ACCESS CONTROL |
5.1.6 Ensure permissions on /etc/cron.monthly are configured | CIS CentOS 6 Server L1 v3.0.0 | Unix | ACCESS CONTROL |
5.1.6 Ensure permissions on /etc/cron.monthly are configured | CIS CentOS 6 Workstation L1 v3.0.0 | Unix | ACCESS CONTROL |
5.1.6 Ensure permissions on /etc/cron.monthly are configured | CIS Debian Family Server L1 v1.0.0 | Unix | ACCESS CONTROL |
5.1.7 Ensure permissions on /etc/cron.d are configured | CIS Debian Family Server L1 v1.0.0 | Unix | ACCESS CONTROL |
5.1.9 Ensure at is restricted to authorized users - at.deny | CIS Debian Family Server L1 v1.0.0 | Unix | ACCESS CONTROL |
5.3.1 Ensure permissions on /etc/ssh/sshd_config are configured | CIS CentOS 6 Server L1 v3.0.0 | Unix | ACCESS CONTROL |
5.6 Ensure access to the su command is restricted - /etc/group | CIS Debian 8 Workstation L1 v2.0.1 | Unix | ACCESS CONTROL |
6.1.10 Ensure no world writable files exist | CIS CentOS 6 Workstation L1 v3.0.0 | Unix | ACCESS CONTROL |
6.1.12 Ensure no ungrouped files or directories exist | CIS CentOS 6 Server L1 v3.0.0 | Unix | ACCESS CONTROL |
6.1.13 Audit SUID executables | CIS CentOS 6 Workstation L1 v3.0.0 | Unix | ACCESS CONTROL |
6.2.6 Ensure root is the only UID 0 account | CIS CentOS 6 Server L1 v3.0.0 | Unix | ACCESS CONTROL |
6.2.8 Ensure users' home directories permissions are 750 or more restrictive | CIS Distribution Independent Linux Server L1 v2.0.0 | Unix | ACCESS CONTROL |
6.2.10 Ensure users' home directories permissions are 750 or more restrictive | CIS CentOS 6 Workstation L1 v3.0.0 | Unix | ACCESS CONTROL |
6.2.13 Ensure users' .netrc Files are not group or world accessible | CIS Distribution Independent Linux Server L1 v2.0.0 | Unix | ACCESS CONTROL |
7.6 Ensure directory in logging.properties is a secure location - check application log directory is secure | CIS Apache Tomcat 8 L1 v1.1.0 Middleware | Unix | ACCESS CONTROL |
8.1 Ensure ServerTokens is Set to 'Prod' or 'ProductOnly' | CIS Apache HTTP Server 2.2 L1 v3.6.0 | Unix | ACCESS CONTROL |
10.2 Ensure BIND Processes Run in the named_t Confined Context Type | CIS BIND DNS v1.0.0 L2 Authoritative Name Server | Unix | ACCESS CONTROL |
11.3 Ensure the httpd_t Type Is Not in Permissive Mode | CIS Apache HTTP Server 2.2 L2 v3.6.0 Middleware | Unix | ACCESS CONTROL |