1.2.1 - MobileIron - Disable JavaScript | MobileIron - CIS Apple iOS 8 v1.0.0 L2 | MDM | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
1.2.1 - MobileIron - Disable JavaScript | MobileIron - CIS Apple iOS 9 v1.0.0 L2 | MDM | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
1.2.2 - MobileIron - Enable Fraudulent Website Warning | MobileIron - CIS Apple iOS 8 v1.0.0 L1 | MDM | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
1.2.3 - MobileIron - Disable Auto Fill for Contact Information | MobileIron - CIS Apple iOS 9 v1.0.0 L2 | MDM | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
1.2.3 - MobileIron - Disable Auto Fill for Contact Information | MobileIron - CIS Apple iOS 8 v1.0.0 L2 | MDM | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
1.2.4 - MobileIron - Disable Auto Fill for Names and Passwords | MobileIron - CIS Apple iOS 8 v1.0.0 L2 | MDM | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
1.2.5 - MobileIron - Disable Auto Fill for Credit Card Information | MobileIron - CIS Apple iOS 8 v1.0.0 L2 | MDM | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
1.2.5 - MobileIron - Disable Auto Fill for Credit Card Information | MobileIron - CIS Apple iOS 9 v1.0.0 L2 | MDM | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
1.2.6 - MobileIron - Delete Saved Password Information | MobileIron - CIS Apple iOS 8 v1.0.0 L2 | MDM | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
1.2.7 - MobileIron - Delete Saved Credit Card Information | MobileIron - CIS Apple iOS 9 v1.0.0 L2 | MDM | ACCESS CONTROL |
2.3.2 Secure screen saver corners - bottom left corner | CIS Apple OSX 10.10 Yosemite L2 v1.2.0 | Unix | ACCESS CONTROL |
2.3.2 Secure screen saver corners - bottom right corner | CIS Apple OSX 10.10 Yosemite L2 v1.2.0 | Unix | ACCESS CONTROL |
2.3.2 Secure screen saver corners - bottom right corner | CIS Apple OSX 10.11 El Capitan L2 v1.1.0 | Unix | ACCESS CONTROL |
2.3.2 Secure screen saver corners - top left corner | CIS Apple OSX 10.10 Yosemite L2 v1.2.0 | Unix | ACCESS CONTROL |
2.3.2 Secure screen saver corners - top left corner | CIS Apple OSX 10.11 El Capitan L2 v1.1.0 | Unix | ACCESS CONTROL |
2.3.2 Secure screen saver corners - top right corner | CIS Apple OSX 10.10 Yosemite L2 v1.2.0 | Unix | ACCESS CONTROL |
2.5.1 Disable 'Wake for network access' | CIS Apple OSX 10.10 Yosemite L2 v1.2.0 | Unix | ACCESS CONTROL |
2.5.2 Disable sleeping the computer when connected to power | CIS Apple OSX 10.10 Yosemite L2 v1.2.0 | Unix | ACCESS CONTROL |
2.6.6 Enable Location Services | CIS Apple OSX 10.10 Yosemite L2 v1.2.0 | Unix | CONFIGURATION MANAGEMENT |
2.7.1 iCloud configuration | CIS Apple OSX 10.10 Yosemite L2 v1.2.0 | Unix | |
2.7.2 iCloud keychain | CIS Apple OSX 10.11 El Capitan L2 v1.1.0 | Unix | |
2.8.1 Time Machine Auto-Backup | CIS Apple OSX 10.10 Yosemite L2 v1.2.0 | Unix | CONTINGENCY PLANNING |
2.8.1 Time Machine Auto-Backup | CIS Apple OSX 10.11 El Capitan L2 v1.1.0 | Unix | CONTINGENCY PLANNING |
2.12 Configure Secure Empty Trash | CIS Apple OSX 10.10 Yosemite L2 v1.2.0 | Unix | CONFIGURATION MANAGEMENT |
3.3 Configure Security Auditing Flags - 'audit successful/failed administrative events' | CIS Apple OSX 10.11 El Capitan L2 v1.1.0 | Unix | AUDIT AND ACCOUNTABILITY |
3.4 Enable remote logging for Desktops on trusted networks | CIS Apple OSX 10.10 Yosemite L2 v1.2.0 | Unix | AUDIT AND ACCOUNTABILITY |
4.1 Disable Bonjour advertising service | CIS Apple OSX 10.10 Yosemite L2 v1.2.0 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
5.1.5 Check Library folder for world writable files | CIS Apple OSX 10.10 Yosemite L2 v1.2.0 | Unix | ACCESS CONTROL |
5.4 Automatically lock the login keychain for inactivity | CIS Apple OSX 10.10 Yosemite L2 v1.2.0 | Unix | IDENTIFICATION AND AUTHENTICATION |
5.5 Ensure login keychain is locked when the computer sleeps | CIS Apple OSX 10.10 Yosemite L2 v1.2.0 | Unix | IDENTIFICATION AND AUTHENTICATION |
5.6 Enable OCSP and CRL certificate checking - CRLStyle | CIS Apple OSX 10.10 Yosemite L2 v1.2.0 | Unix | IDENTIFICATION AND AUTHENTICATION |
5.6 Enable OCSP and CRL certificate checking - CRLStyle | CIS Apple OSX 10.11 El Capitan L2 v1.1.0 | Unix | IDENTIFICATION AND AUTHENTICATION |
5.6 Enable OCSP and CRL certificate checking - OCSPStyle | CIS Apple OSX 10.10 Yosemite L2 v1.2.0 | Unix | IDENTIFICATION AND AUTHENTICATION |
5.13 Create a Login window banner | CIS Apple OSX 10.10 Yosemite L2 v1.2.0 | Unix | ACCESS CONTROL |
5.15 Disable Fast User Switching | CIS Apple OSX 10.10 Yosemite L2 v1.2.0 | Unix | ACCESS CONTROL |
5.15 Disable Fast User Switching | CIS Apple OSX 10.11 El Capitan L2 v1.1.0 | Unix | ACCESS CONTROL |
5.16 Secure individual keychain and items | CIS Apple OSX 10.10 Yosemite L2 v1.2.0 | Unix | |
5.17 Create specialized keychains for different purposes | CIS Apple OSX 10.10 Yosemite L2 v1.2.0 | Unix | |
6.4 Safari disable Internet Plugins for global use | CIS Apple OSX 10.10 Yosemite L2 v1.2.0 | Unix | CONFIGURATION MANAGEMENT |
6.5 Use parental controls for systems that are not centrally managed | CIS Apple OSX 10.10 Yosemite L2 v1.2.0 | Unix | |
CIS_Apple_macOS_13.0_Ventura_Cloud-tailored_v1.1.0_L1.audit from CIS Apple macOS 13.0 Ventura Cloud-tailored Benchmark v1.1.0 | CIS Apple macOS 13.0 Ventura Cloud-tailored v1.1.0 L1 | Unix | |
CIS_Apple_macOS_13.0_Ventura_Cloud-tailored_v1.1.0_L2.audit from CIS Apple macOS 13.0 Ventura Cloud-tailored Benchmark v1.1.0 | CIS Apple macOS 13.0 Ventura Cloud-tailored v1.1.0 L2 | Unix | |
DKER-EE-001800 - The insecure registry capability in the Docker Engine - Enterprise component of Docker Enterprise must be disabled. | DISA STIG Docker Enterprise 2.x Linux/Unix v2r2 | Unix | CONFIGURATION MANAGEMENT |
DKER-EE-001840 - Experimental features in the Docker Engine - Enterprise component of Docker Enterprise must be disabled. | DISA STIG Docker Enterprise 2.x Linux/Unix v2r2 | Unix | CONFIGURATION MANAGEMENT |
DKER-EE-001870 - The Docker Enterprise self-signed certificates in Universal Control Plane (UCP) must be replaced with DoD trusted, signed certificates. | DISA STIG Docker Enterprise 2.x Linux/Unix UCP v2r2 | Unix | CONFIGURATION MANAGEMENT |
DKER-EE-001880 - The Docker Enterprise self-signed certificates in Docker Trusted Registry (DTR) must be replaced with DoD trusted, signed certificates. | DISA STIG Docker Enterprise 2.x Linux/Unix DTR v2r2 | Unix | CONFIGURATION MANAGEMENT |
DKER-EE-001900 - The Create repository on push option in Docker Trusted Registry (DTR) must be disabled in Docker Enterprise. | DISA STIG Docker Enterprise 2.x Linux/Unix DTR v2r2 | Unix | CONFIGURATION MANAGEMENT |
DKER-EE-001920 - Periodic data usage and analytics reporting in Docker Trusted Registry (DTR) must be disabled in Docker Enterprise. | DISA STIG Docker Enterprise 2.x Linux/Unix DTR v2r2 | Unix | CONFIGURATION MANAGEMENT |
Mac OSX 10.11 El Capitan is installed | CIS Apple OSX 10.11 El Capitan L1 v1.1.0 | Unix | |
Mac OSX 10.11 El Capitan is installed | CIS Apple OSX 10.11 El Capitan L2 v1.1.0 | Unix | |