| 1.1.2.1.1 Ensure /tmp is tmpfs or a separate partition | CIS Linux Mint 22 v1.0.0 L1 Workstation | Unix | CONFIGURATION MANAGEMENT |
| 1.3.1.4 Ensure the SELinux mode is not disabled | CIS Rocky Linux 10 v1.0.0 L1 Workstation | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
| 1.3.1.4 Ensure the SELinux mode is not disabled | CIS Rocky Linux 8 v3.0.0 L1 Workstation | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
| 1.3.1.5 Ensure the SELinux mode is enforcing | CIS Oracle Linux 10 v1.0.0 L2 Server | Unix | SYSTEM AND INFORMATION INTEGRITY |
| 1.4.1 Ensure permissions on bootloader config are not overridden - if line | CIS Ubuntu Linux 16.04 LTS Server L1 v2.0.0 | Unix | ACCESS CONTROL |
| 1.4.1 Ensure permissions on bootloader config are not overridden - if line | CIS Ubuntu Linux 16.04 LTS Workstation L1 v2.0.0 | Unix | ACCESS CONTROL |
| 1.5.5 Ensure kernel.dmesg_restrict is configured | CIS Red Hat Enterprise Linux 10 v1.0.1 L1 Workstation | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
| 1.5.5 Ensure kernel.dmesg_restrict is configured | CIS Oracle Linux 10 v1.0.0 L1 Server | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
| 1.6.1.1 Ensure SELinux is not disabled in bootloader configuration - enforcing | CIS Aliyun Linux 2 L2 v1.0.0 | Unix | ACCESS CONTROL |
| 1.6.1.2 Ensure the SELinux state is enforcing - sestatus | CIS Aliyun Linux 2 L2 v1.0.0 | Unix | ACCESS CONTROL |
| 1.6.1.3 Ensure all AppArmor Profiles are in enforce or complain mode - loaded | CIS Ubuntu Linux 16.04 LTS Server L1 v2.0.0 | Unix | ACCESS CONTROL |
| 1.6.1.3 Ensure SELinux policy is configured | CIS Red Hat 6 Server L1 v3.0.0 | Unix | ACCESS CONTROL |
| 1.6.1.3 Ensure SELinux policy is configured - sestatus | CIS Aliyun Linux 2 L2 v1.0.0 | Unix | ACCESS CONTROL |
| 1.6.1.4 Ensure all AppArmor Profiles are enforcing - complain | CIS Ubuntu Linux 16.04 LTS Workstation L2 v2.0.0 | Unix | ACCESS CONTROL |
| 1.6.1.4 Ensure all AppArmor Profiles are enforcing - unconfined | CIS Ubuntu Linux 16.04 LTS Server L2 v2.0.0 | Unix | ACCESS CONTROL |
| 1.6.1.5 Ensure the SELinux mode is enforcing - config | CIS Red Hat 6 Workstation L2 v3.0.0 | Unix | ACCESS CONTROL |
| 1.6.1.5 Ensure the SELinux mode is enforcing - getenforce | CIS Red Hat 6 Workstation L2 v3.0.0 | Unix | ACCESS CONTROL |
| 1.7.1.1 Ensure AppArmor is installed | CIS Ubuntu Linux 18.04 LXD Host L1 Server v1.0.0 | Unix | ACCESS CONTROL |
| 2.2.45 (L1) Ensure 'Take ownership of files or other objects' is set to 'Administrators' | CIS Azure Compute Microsoft Windows Server 2019 v1.0.0 L1 MS | Windows | ACCESS CONTROL |
| 2.3.10.11 Ensure 'Network access: Shares that can be accessed anonymously' is set to 'None' | CIS Microsoft Windows 11 Stand-alone v5.0.0 L1 BL | Windows | ACCESS CONTROL |
| 2.3.10.11 Ensure 'Network access: Shares that can be accessed anonymously' is set to 'None' | CIS Microsoft Windows 11 Enterprise v5.0.1 L1 | Windows | ACCESS CONTROL |
| 2.3.10.12 Ensure 'Network access: Shares that can be accessed anonymously' is set to 'None' | CIS Microsoft Windows Server 2022 v5.0.0 L1 DC | Windows | ACCESS CONTROL |
| 4.4 Ensure logrotate assigns appropriate permissions | CIS Ubuntu Linux 16.04 LTS Server L1 v2.0.0 | Unix | ACCESS CONTROL |
| 4.4 Ensure logrotate assigns appropriate permissions | CIS Ubuntu Linux 16.04 LTS Workstation L1 v2.0.0 | Unix | ACCESS CONTROL |
| 5.1.2 Ensure access to SSH private host key files is configured | CIS Red Hat Enterprise Linux 10 v1.0.1 L1 Workstation | Unix | CONFIGURATION MANAGEMENT |
| 5.1.3 Ensure access to SSH public host key files is configured | CIS Red Hat Enterprise Linux 10 v1.0.1 L1 Workstation | Unix | CONFIGURATION MANAGEMENT |
| 5.1.8 Ensure cron is restricted to authorized users - '/etc/cron.allow' | CIS Ubuntu Linux 16.04 LTS Server L1 v2.0.0 | Unix | ACCESS CONTROL |
| 5.2.2 Ensure permissions on SSH private host key files are configured | CIS Ubuntu Linux 18.04 LXD Container L1 v1.0.0 | Unix | ACCESS CONTROL |
| 5.2.3 Ensure permissions on SSH public host key files are configured | CIS Ubuntu Linux 18.04 LXD Host L1 Workstation v1.0.0 | Unix | ACCESS CONTROL |
| 5.3.3 Ensure permissions on SSH public host key files are configured | CIS Ubuntu Linux 16.04 LTS Workstation L1 v2.0.0 | Unix | ACCESS CONTROL |
| 5.3.3.3 Ensure default user umask is configured | CIS Linux Mint 22 v1.0.0 L1 Workstation | Unix | CONFIGURATION MANAGEMENT |
| 5.4.2.1 Ensure root is the only UID 0 account | CIS SUSE Linux Enterprise 15 v2.0.1 L1 Workstation | Unix | CONFIGURATION MANAGEMENT |
| 5.4.3.3 Ensure default user umask is configured | CIS Rocky Linux 8 v3.0.0 L1 Workstation | Unix | CONFIGURATION MANAGEMENT |
| 5.5.3 Ensure default group for the root account is GID 0 | CIS Ubuntu Linux 16.04 LTS Workstation L1 v2.0.0 | Unix | ACCESS CONTROL |
| 5.5.4 Ensure default user umask is 027 or more restrictive - '/etc/bash.bashrc' | CIS Ubuntu Linux 16.04 LTS Workstation L1 v2.0.0 | Unix | ACCESS CONTROL |
| 6.1.1 Audit system file permissions | CIS Aliyun Linux 2 L2 v1.0.0 | Unix | ACCESS CONTROL |
| 6.2.7 Ensure users' dot files are not group or world writable | CIS Ubuntu Linux 16.04 LTS Workstation L1 v2.0.0 | Unix | ACCESS CONTROL |
| 6.2.13 Ensure users' .netrc Files are not group or world accessible | CIS Aliyun Linux 2 L1 v1.0.0 | Unix | ACCESS CONTROL |
| 6.2.17 Ensure shadow group is empty | CIS Ubuntu Linux 16.04 LTS Workstation L1 v2.0.0 | Unix | ACCESS CONTROL |
| 6.2.20 Ensure shadow group is empty - /etc/passwd | CIS CentOS 6 Server L1 v3.0.0 | Unix | ACCESS CONTROL |
| 6.3.4.3 Ensure audit log files owner is configured | CIS Rocky Linux 8 v3.0.0 L2 Server | Unix | CONFIGURATION MANAGEMENT |
| 7.1.11 Ensure world writable files and directories are secured | CIS Rocky Linux 8 v3.0.0 L1 Server | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
| 7.1.12 Ensure no files or directories without an owner and a group exist | CIS Red Hat Enterprise Linux 8 v4.0.0 L1 Workstation | Unix | CONFIGURATION MANAGEMENT |
| 7.2.8 Ensure local interactive user home directories are configured | CIS Red Hat Enterprise Linux 8 v4.0.0 L1 Workstation | Unix | CONFIGURATION MANAGEMENT |
| 7.2.8 Ensure local interactive user home directories are configured | CIS Rocky Linux 8 v3.0.0 L1 Server | Unix | CONFIGURATION MANAGEMENT |
| 7.6 Ensure directory in logging.properties is a secure location - check log directory location | CIS Apache Tomcat 9 L1 v1.2.0 Middleware | Unix | ACCESS CONTROL |
| 7.6 Ensure directory in logging.properties is a secure location - check prefix application name | CIS Apache Tomcat 9 L1 v1.2.0 Middleware | Unix | ACCESS CONTROL |
| 18.10.4.1 Ensure 'Allow a Windows app to share application data between users' is set to 'Disabled' | CIS Microsoft Windows Server 2022 v5.0.0 L2 DC | Windows | ACCESS CONTROL |
| 19.7.26.1 Ensure 'Prevent users from sharing files within their profile.' is set to 'Enabled' | CIS Microsoft Windows 11 Stand-alone v5.0.0 L1 BL | Windows | ACCESS CONTROL |
| 19.7.26.1 Ensure 'Prevent users from sharing files within their profile.' is set to 'Enabled' | CIS Microsoft Windows Server 2022 v5.0.0 L1 DC | Windows | ACCESS CONTROL |