1.1.1.2.1.6 Set 'System objects: Default owner for objects created by members of the Administrators group' to 'Object creator' | CIS Windows 2003 DC v3.1.0 | Windows | ACCESS CONTROL |
1.1.1.2.1.28 Configure 'DCOM: Machine Access Restrictions in Security Descriptor Definition Language (SDDL) syntax' | CIS Windows 2003 DC v3.1.0 | Windows | ACCESS CONTROL |
1.1.20 Ensure sticky bit is set on all world-writable directories | CIS Debian 8 Server L1 v2.0.1 | Unix | ACCESS CONTROL |
1.1.20 Ensure sticky bit is set on all world-writable directories | CIS Debian 8 Workstation L1 v2.0.1 | Unix | ACCESS CONTROL |
1.1.22 Ensure sticky bit is set on all world-writable directories | CIS Oracle Linux 7 Workstation L1 v3.0.0 | Unix | ACCESS CONTROL |
1.1.22 Ensure sticky bit is set on all world-writable directories | CIS Red Hat EL7 Workstation L1 v3.0.1 | Unix | ACCESS CONTROL |
1.1.22 Ensure sticky bit is set on all world-writable directories | CIS Oracle Linux 7 Server L1 v3.0.0 | Unix | ACCESS CONTROL |
1.4.2 Set the SELinux State 'SELINUX=enforcing' | CIS Red Hat Enterprise Linux 5 L2 v2.2 | Unix | ACCESS CONTROL |
1.4.6 Check for Unconfined Daemons | CIS Red Hat Enterprise Linux 5 L2 v2.2 | Unix | ACCESS CONTROL |
1.6.1.2 Ensure the SELinux state is enforcing - sestatus | CIS Debian 8 Workstation L2 v2.0.1 | Unix | ACCESS CONTROL |
1.6.1.3 Ensure SELinux policy is configured | CIS Debian 8 Workstation L2 v2.0.1 | Unix | ACCESS CONTROL |
1.6.2.2 Ensure all AppArmor Profiles are enforcing - 0 processes are unconfined | CIS Debian 8 Workstation L2 v2.0.1 | Unix | ACCESS CONTROL |
1.6.2.2 Ensure all AppArmor Profiles are enforcing - 0 processes are unconfined | CIS Debian 8 Server L2 v2.0.1 | Unix | ACCESS CONTROL |
1.6.2.2 Ensure all AppArmor Profiles are enforcing - complain mode | CIS Debian 8 Server L2 v2.0.1 | Unix | ACCESS CONTROL |
1.6.2.2 Ensure all AppArmor Profiles are enforcing - complain mode | CIS Debian 8 Workstation L2 v2.0.1 | Unix | ACCESS CONTROL |
1.7.1.3 Ensure all AppArmor Profiles are in enforce or complain mode - unconfined | CIS Ubuntu Linux 20.04 LTS Workstation L1 v1.0.0 | Unix | ACCESS CONTROL |
1.7.1.4 Ensure all AppArmor Profiles are enforcing - complain | CIS Ubuntu Linux 20.04 LTS Workstation L2 v1.0.0 | Unix | ACCESS CONTROL |
1.7.1.4 Ensure all AppArmor Profiles are enforcing - complain | CIS Ubuntu Linux 18.04 LTS Workstation L2 v2.0.1 | Unix | ACCESS CONTROL |
1.7.1.4 Ensure all AppArmor Profiles are enforcing - complain | CIS Ubuntu Linux 20.04 LTS Server L2 v1.0.0 | Unix | ACCESS CONTROL |
1.7.1.4 Ensure all AppArmor Profiles are enforcing - loaded | CIS Ubuntu Linux 20.04 LTS Workstation L2 v1.0.0 | Unix | ACCESS CONTROL |
1.7.1.4 Ensure all AppArmor Profiles are enforcing - loaded | CIS Ubuntu Linux 20.04 LTS Server L2 v1.0.0 | Unix | ACCESS CONTROL |
1.7.1.4 Ensure all AppArmor Profiles are enforcing - unconfined | CIS Ubuntu Linux 18.04 LTS Workstation L2 v2.0.1 | Unix | ACCESS CONTROL |
1.7.1.4 Ensure all AppArmor Profiles are enforcing - unconfined | CIS Ubuntu Linux 20.04 LTS Workstation L2 v1.0.0 | Unix | ACCESS CONTROL |
1.18 Ensure IAM instance roles are used for AWS resource access from instances | CIS Amazon Web Services Foundations L2 1.3.0 | amazon_aws | ACCESS CONTROL |
5.1 Ensure that, if applicable, an AppArmor Profile is enabled | CIS Docker v1.2.0 L1 Docker Linux | Unix | ACCESS CONTROL |
5.4 Database Manager Configuration Parameter: TRUST_ALLCLNTS | CIS IBM DB2 11 v1.1.0 Windows OS Level 1 | Windows | ACCESS CONTROL |
5.4 Database Manager Configuration Parameter: TRUST_ALLCLNTS | CIS IBM DB2 11 v1.1.0 Linux OS Level 1 | Unix | ACCESS CONTROL |
5.4.4 Ensure default user umask is 027 or more restrictive - /etc/bash.bashrc | CIS Debian 8 Workstation L1 v2.0.1 | Unix | ACCESS CONTROL |
5.4.4 Ensure default user umask is 027 or more restrictive - /etc/bash.bashrc | CIS Debian 8 Server L1 v2.0.1 | Unix | ACCESS CONTROL |
5.4.4 Ensure default user umask is 027 or more restrictive - /etc/profile.d/*.sh | CIS Debian 8 Server L1 v2.0.1 | Unix | ACCESS CONTROL |
5.4.4 Ensure default user umask is 027 or more restrictive - /etc/profile.d/*.sh | CIS Debian 8 Workstation L1 v2.0.1 | Unix | ACCESS CONTROL |
5.4.4 Ensure default user umask is 027 or more restrictive - default | CIS Ubuntu Linux 20.04 LTS Server L1 v1.0.0 | Unix | ACCESS CONTROL |
5.4.4 Ensure default user umask is 027 or more restrictive - default | CIS Ubuntu Linux 20.04 LTS Workstation L1 v1.0.0 | Unix | ACCESS CONTROL |
5.4.4 Ensure default user umask is 027 or more restrictive - override | CIS Ubuntu Linux 20.04 LTS Server L1 v1.0.0 | Unix | ACCESS CONTROL |
5.4.5 Ensure default user umask is configured - profiles | CIS Oracle Linux 7 Server L1 v3.0.0 | Unix | ACCESS CONTROL |
5.4.5 Ensure default user umask is configured - system wide | CIS Oracle Linux 7 Workstation L1 v3.0.0 | Unix | ACCESS CONTROL |
5.4.5 Ensure default user umask is configured - system wide default | CIS Red Hat EL7 Workstation L1 v3.0.1 | Unix | ACCESS CONTROL |
5.4.5 Ensure default user umask is configured - system wide umask | CIS Red Hat EL7 Workstation L1 v3.0.1 | Unix | ACCESS CONTROL |
5.5 Database Manager Configuration Parameter: TRUST_CLNTAUTH | CIS IBM DB2 11 v1.1.0 Linux OS Level 1 | Unix | ACCESS CONTROL |
5.5.5 Ensure default user umask is 027 or more restrictive | CIS CentOS Linux 8 Server L1 v1.0.0 | Unix | ACCESS CONTROL |
5.5.5 Ensure default user umask is 027 or more restrictive | CIS CentOS Linux 8 Workstation L1 v1.0.0 | Unix | ACCESS CONTROL |
5.5.5 Ensure default user umask is 027 or more restrictive - /etc/bashrc | CIS Oracle Linux 8 Server L1 v1.0.0 | Unix | ACCESS CONTROL |
5.5.5 Ensure default user umask is 027 or more restrictive - /etc/profile /etc/profile.d/*.sh | CIS Oracle Linux 8 Server L1 v1.0.0 | Unix | ACCESS CONTROL |
5.5.5 Ensure default user umask is 027 or more restrictive - /etc/profile /etc/profile.d/*.sh | CIS Oracle Linux 8 Workstation L1 v1.0.0 | Unix | ACCESS CONTROL |
7.4 Set Default umask for Users '/etc/bashrc - umask 077' | CIS Red Hat Enterprise Linux 5 L1 v2.2 | Unix | ACCESS CONTROL |
11.1 Ensure SELinux Is Enabled in Enforcing Mode | CIS Apache HTTP Server 2.4 L2 v1.5.0 | Unix | ACCESS CONTROL |
12.1 Ensure the AppArmor Framework Is Enabled | CIS Apache HTTP Server 2.4 L2 v1.5.0 Middleware | Unix | ACCESS CONTROL |
Salesforce.com : Setting Session Security - 'Review Apex Mobile User' | TNS Salesforce Best Practices Audit v1.1.0 | Salesforce.com | ACCESS CONTROL |
Salesforce.com : Setting Session Security - 'Review Salesforce CRM Content User' | TNS Salesforce Best Practices Audit v1.1.0 | Salesforce.com | ACCESS CONTROL |
Salesforce.com : Setting Session Security - 'Review Wireless User' | TNS Salesforce Best Practices Audit v1.1.0 | Salesforce.com | ACCESS CONTROL |