Item Search

NameAudit NamePluginCategory
1.1 Verify all application software is currentCIS Apple OSX 10.10 Yosemite L1 v1.2.0Unix

SYSTEM AND INFORMATION INTEGRITY

1.1.3 Ensure 'Enable Log on High DP Load' is enabledCIS Palo Alto Firewall 10 v1.2.0 L1Palo_Alto

AUDIT AND ACCOUNTABILITY

1.2 Enable Auto UpdateCIS Apple OSX 10.10 Yosemite L1 v1.2.0Unix

SYSTEM AND INFORMATION INTEGRITY

1.2.1 Ensure 'Permitted IP Addresses' is set to those necessary for device managementCIS Palo Alto Firewall 10 v1.2.0 L1Palo_Alto

ACCESS CONTROL

1.2.3 Ensure HTTP and Telnet options are disabled for the management interfaceCIS Palo Alto Firewall 10 v1.2.0 L1Palo_Alto

CONFIGURATION MANAGEMENT

1.2.5 Ensure valid certificate is set for browser-based administrator interfaceCIS Palo Alto Firewall 10 v1.2.0 L2Palo_Alto

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

1.3.7 Ensure 'Required Password Change Period' is less than or equal to 90 daysCIS Palo Alto Firewall 10 v1.2.0 L1Palo_Alto

ACCESS CONTROL

1.4 Enable system data files and security update installs - 'CriticalUpdateInstall'CIS Apple OSX 10.10 Yosemite L1 v1.2.0Unix

SYSTEM AND INFORMATION INTEGRITY

1.6.3 Ensure that the Certificate Securing Remote Access VPNs is ValidCIS Palo Alto Firewall 10 v1.2.0 L1Palo_Alto

CONFIGURATION MANAGEMENT

2.1.3 Show Bluetooth status in menu barCIS Apple OSX 10.10 Yosemite L1 v1.2.0Unix

CONFIGURATION MANAGEMENT

2.3.1 Set an inactivity interval of 20 minutes or less for the screen saverCIS Apple OSX 10.10 Yosemite L1 v1.2.0Unix

ACCESS CONTROL

2.4.3 Disable Screen SharingCIS Apple OSX 10.10 Yosemite L1 v1.2.0Unix

CONFIGURATION MANAGEMENT

2.6.1 Enable FileVault - Encryption TypeCIS Apple OSX 10.10 Yosemite L1 v1.2.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION

2.6.2 Enable GatekeeperCIS Apple OSX 10.10 Yosemite L1 v1.2.0Unix

CONFIGURATION MANAGEMENT

2.6.4 Enable Firewall Stealth ModeCIS Apple OSX 10.10 Yosemite L1 v1.2.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION

2.6.6 Enable Location ServicesCIS Apple OSX 10.10 Yosemite L2 v1.2.0Unix

CONFIGURATION MANAGEMENT

2.7 Ensure remote access capabilities for the User-ID service account are forbidden.CIS Palo Alto Firewall 10 v1.2.0 L1Palo_Alto

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

2.9 Pair the remote control infrared receiver if enabled - 'DeviceEnabled = 0'CIS Apple OSX 10.10 Yosemite L1 v1.2.0Unix

CONFIGURATION MANAGEMENT

3.1 Ensure a fully-synchronized High Availability peer is configuredCIS Palo Alto Firewall 10 v1.2.0 L1Palo_Alto

SYSTEM AND INFORMATION INTEGRITY

3.1.1 Retain system.log for 90 or more daysCIS Apple OSX 10.10 Yosemite L1 v1.2.0Unix

AUDIT AND ACCOUNTABILITY

3.1.2 Retain appfirewall.log for 90 or more daysCIS Apple OSX 10.10 Yosemite L1 v1.2.0Unix

AUDIT AND ACCOUNTABILITY

3.4 Enable remote logging for Desktops on trusted networksCIS Apple OSX 10.10 Yosemite L2 v1.2.0Unix

AUDIT AND ACCOUNTABILITY

4.4 Ensure http server is not runningCIS Apple OSX 10.10 Yosemite L1 v1.2.0Unix

CONFIGURATION MANAGEMENT

4.5 Ensure Encryption of Data at Rest - enableEncryptionCIS MongoDB 5 L2 OS Linux v1.2.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION

5.1 Ensure that system activity is auditedCIS MongoDB 5 L1 OS Linux v1.2.0Unix

AUDIT AND ACCOUNTABILITY

5.2 Ensure that audit filters are configured properlyCIS MongoDB 5 L2 OS Linux v1.2.0Unix

AUDIT AND ACCOUNTABILITY

5.2.3 Complex passwords must contain an Alphabetic Character - 'RequiresAlpha'CIS Apple OSX 10.10 Yosemite L1 v1.2.0Unix
5.2.7 Password AgeCIS Apple OSX 10.10 Yosemite L1 v1.2.0Unix

IDENTIFICATION AND AUTHENTICATION

5.3 Ensure that logging captures as much information as possibleCIS MongoDB 5 L2 OS Linux v1.2.0Unix

AUDIT AND ACCOUNTABILITY

5.5 Ensure alerts are enabled for malicious files detected by WildFireCIS Palo Alto Firewall 10 v1.2.0 L1Palo_Alto

SYSTEM AND INFORMATION INTEGRITY

5.5 Ensure login keychain is locked when the computer sleepsCIS Apple OSX 10.10 Yosemite L2 v1.2.0Unix

IDENTIFICATION AND AUTHENTICATION

5.6 Enable OCSP and CRL certificate checking - OCSPStyleCIS Apple OSX 10.10 Yosemite L2 v1.2.0Unix

IDENTIFICATION AND AUTHENTICATION

5.8 Disable automatic loginCIS Apple OSX 10.10 Yosemite L1 v1.2.0Unix

ACCESS CONTROL

5.11 Disable ability to login to another user's active and locked sessionCIS Apple OSX 10.10 Yosemite L1 v1.2.0Unix

ACCESS CONTROL

5.12 Create a custom message for the Login ScreenCIS Apple OSX 10.10 Yosemite L1 v1.2.0Unix

ACCESS CONTROL

5.15 Disable Fast User SwitchingCIS Apple OSX 10.10 Yosemite L2 v1.2.0Unix

ACCESS CONTROL

6.1.3 Disable guest account loginCIS Apple OSX 10.10 Yosemite L1 v1.2.0Unix

ACCESS CONTROL

6.2 Ensure a secure antivirus profile is applied to all relevant security policiesCIS Palo Alto Firewall 10 v1.2.0 L1Palo_Alto

SYSTEM AND INFORMATION INTEGRITY

6.3 Ensure an anti-spyware profile is configured to block on all spyware severity levels, categories, and threatsCIS Palo Alto Firewall 10 v1.2.0 L1Palo_Alto

SYSTEM AND INFORMATION INTEGRITY

6.4 Ensure DNS sinkholing is configured on all anti-spyware profiles in useCIS Palo Alto Firewall 10 v1.2.0 L1Palo_Alto

SYSTEM AND INFORMATION INTEGRITY

6.13 Ensure alerting after a threshold of credit card or Social Security numbers is detected is enabledCIS Palo Alto Firewall 10 v1.2.0 L1Palo_Alto

AUDIT AND ACCOUNTABILITY

6.21 Ensure that 'Wildfire Inline ML' on antivirus profiles are set to enable for all file typesCIS Palo Alto Firewall 10 v1.2.0 L1Palo_Alto

SYSTEM AND INFORMATION INTEGRITY

6.24 Ensure that 'Inline Cloud Analysis' on Anti-Spyware profiles are enabled if 'Advanced Threat Prevention' is availableCIS Palo Alto Firewall 10 v1.2.0 L1Palo_Alto

SYSTEM AND INFORMATION INTEGRITY

6.25 Ensure that 'DNS Policies' is configured on Anti-Spyware profiles if 'DNS Security' license is availableCIS Palo Alto Firewall 10 v1.2.0 L1Palo_Alto

AUDIT AND ACCOUNTABILITY, SYSTEM AND INFORMATION INTEGRITY

7.1 Ensure appropriate key file permissions are set - keyFileCIS MongoDB 5 L1 OS Linux v1.2.0Unix

IDENTIFICATION AND AUTHENTICATION

7.2 Ensure 'Service setting of ANY' in a security policy allowing traffic does not existCIS Palo Alto Firewall 10 v1.2.0 L1Palo_Alto

ACCESS CONTROL, MEDIA PROTECTION

10.12 Do not allow symbolic linkingCIS Apache Tomcat 9 L1 v1.2.0 MiddlewareUnix

CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY

10.17 Setting Security Lifecycle Listener - check for umask present in startupCIS Apache Tomcat 9 L1 v1.2.0 MiddlewareUnix

ACCESS CONTROL

18.10.10.2.13 (BL) Ensure 'Require additional authentication at startup' is set to 'Enabled'CIS Microsoft Windows 10 Enterprise v4.0.0 L1 BLWindows

ACCESS CONTROL

18.10.10.2.14 (BL) Ensure 'Require additional authentication at startup: Allow BitLocker without a compatible TPM' is set to 'Enabled: False'CIS Microsoft Windows 11 Enterprise v4.0.0 L1 BitLockerWindows

ACCESS CONTROL