1.4.2.1 Ensure 'TACACS+/RADIUS' is configured correctly - protocol | CIS Cisco Firewall ASA 9 L1 v4.0.0 | Cisco | ACCESS CONTROL, AUDIT AND ACCOUNTABILITY, IDENTIFICATION AND AUTHENTICATION |
1.6.1.1 Ensure SELinux is not disabled in bootloader configuration - enforcing=0 | CIS Red Hat 6 Workstation L2 v2.1.0 | Unix | ACCESS CONTROL, SYSTEM AND INFORMATION INTEGRITY |
1.6.1.1 Ensure SELinux is not disabled in bootloader configuration - enforcing=0 | CIS Oracle Linux 6 Workstation L2 v1.1.0 | Unix | ACCESS CONTROL, SYSTEM AND INFORMATION INTEGRITY |
1.6.1.1 Ensure SELinux is not disabled in bootloader configuration - enforcing=0 | CIS CentOS 6 Workstation L2 v2.1.0 | Unix | ACCESS CONTROL, SYSTEM AND INFORMATION INTEGRITY |
1.6.1.1 Ensure SELinux is not disabled in bootloader configuration - enforcing=0 | CIS Red Hat 6 Server L2 v2.1.0 | Unix | ACCESS CONTROL, SYSTEM AND INFORMATION INTEGRITY |
1.6.1.1 Ensure SELinux is not disabled in bootloader configuration - selinux = 0 | CIS Ubuntu Linux 16.04 LTS Server L2 v1.1.0 | Unix | ACCESS CONTROL, SYSTEM AND INFORMATION INTEGRITY |
1.6.1.1 Ensure SELinux is not disabled in bootloader configuration - selinux = 0 | CIS Ubuntu Linux 16.04 LTS Workstation L2 v1.1.0 | Unix | ACCESS CONTROL, SYSTEM AND INFORMATION INTEGRITY |
1.6.1.1 Ensure SELinux is not disabled in bootloader configuration - selinux=0 | CIS Red Hat 6 Workstation L2 v2.1.0 | Unix | ACCESS CONTROL, SYSTEM AND INFORMATION INTEGRITY |
1.6.1.1 Ensure SELinux is not disabled in bootloader configuration - selinux=0 | CIS CentOS 6 Server L2 v2.1.0 | Unix | ACCESS CONTROL, SYSTEM AND INFORMATION INTEGRITY |
1.6.1.1 Ensure SELinux is not disabled in bootloader configuration - selinux=0 | CIS Red Hat 6 Server L2 v2.1.0 | Unix | ACCESS CONTROL, SYSTEM AND INFORMATION INTEGRITY |
1.7.1.2 Ensure SELinux is not disabled in bootloader configuration | CIS Red Hat EL7 Workstation L1 v3.0.1 | Unix | ACCESS CONTROL, SYSTEM AND INFORMATION INTEGRITY |
1.7.1.2 Ensure SELinux is not disabled in bootloader configuration - enforcing = 0 | CIS Oracle Linux 7 Workstation L1 v3.0.0 | Unix | ACCESS CONTROL, SYSTEM AND INFORMATION INTEGRITY |
1.7.1.2 Ensure SELinux is not disabled in bootloader configuration - enforcing = 0 | CIS Oracle Linux 8 Workstation L2 v1.0.0 | Unix | ACCESS CONTROL, SYSTEM AND INFORMATION INTEGRITY |
1.7.1.2 Ensure SELinux is not disabled in bootloader configuration - enforcing = 0 | CIS Oracle Linux 7 Server L1 v3.0.0 | Unix | ACCESS CONTROL, SYSTEM AND INFORMATION INTEGRITY |
1.7.1.2 Ensure SELinux is not disabled in bootloader configuration - selinux = 0 | CIS Oracle Linux 7 Workstation L1 v3.0.0 | Unix | ACCESS CONTROL, SYSTEM AND INFORMATION INTEGRITY |
1.7.1.2 Ensure SELinux is not disabled in bootloader configuration - selinux = 0 | CIS Oracle Linux 8 Workstation L2 v1.0.0 | Unix | ACCESS CONTROL, SYSTEM AND INFORMATION INTEGRITY |
1.7.1.2 Ensure SELinux is not disabled in bootloader configuration - selinux = 0 | CIS Oracle Linux 8 Server L2 v1.0.0 | Unix | ACCESS CONTROL, SYSTEM AND INFORMATION INTEGRITY |
1.15 Ensure IAM Users Receive Permissions Only Through Groups | CIS Amazon Web Services Foundations L1 1.3.0 | amazon_aws | ACCESS CONTROL |
2.2.1.3. Fortezza Certificate Policies: Not Configured | CIS MS Office 2007 v1.1.0 L2 | Windows | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
4.5 Use pg_permission extension to audit object permissions | CIS PostgreSQL 10 DB v1.0.0 | PostgreSQLDB | ACCESS CONTROL, AUDIT AND ACCOUNTABILITY |
4.6 Ensure Row Level Security (RLS) is configured correctly | CIS PostgreSQL 10 DB v1.0.0 | PostgreSQLDB | ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION |
6.6.2 Ensure Login Class is set for all Users Accounts | CIS Juniper OS Benchmark v2.1.0 L1 | Juniper | ACCESS CONTROL |
17.6.1 (L1) Ensure 'Audit Detailed File Share' is set to include 'Failure' | CIS Microsoft Windows 8.1 v2.4.1 L1 Bitlocker | Windows | ACCESS CONTROL, AUDIT AND ACCOUNTABILITY |
Big Sur - Allow Information Transfer with Other Operating Systems | NIST macOS Big Sur v1.4.0 - All Profiles | Unix | ACCESS CONTROL |
Big Sur - Disable Media Sharing | NIST macOS Big Sur v1.4.0 - 800-53r5 Low | Unix | ACCESS CONTROL |
Big Sur - Disable Media Sharing | NIST macOS Big Sur v1.4.0 - 800-171 | Unix | ACCESS CONTROL |
Big Sur - Disable Media Sharing | NIST macOS Big Sur v1.4.0 - 800-53r4 Low | Unix | ACCESS CONTROL |
Big Sur - Disable Media Sharing | NIST macOS Big Sur v1.4.0 - 800-53r4 Moderate | Unix | ACCESS CONTROL |
Big Sur - Disable Media Sharing | NIST macOS Big Sur v1.4.0 - 800-53r4 High | Unix | ACCESS CONTROL |
Catalina - Allow Administrators to Modify Security Settings and System Attributes | NIST macOS Catalina v1.5.0 - All Profiles | Unix | ACCESS CONTROL |
Catalina - Allow Administrators to Promote Other Users to Administrator Status | NIST macOS Catalina v1.5.0 - All Profiles | Unix | ACCESS CONTROL |
Catalina - Allow Information Transfer with Other Operating Systems | NIST macOS Catalina v1.5.0 - All Profiles | Unix | ACCESS CONTROL |
Catalina - Disable Media Sharing - com.apple.amp.mediasharingd | NIST macOS Catalina v1.5.0 - 800-53r4 Moderate | Unix | ACCESS CONTROL |
Catalina - Disable Media Sharing - com.apple.amp.mediasharingd | NIST macOS Catalina v1.5.0 - 800-53r5 High | Unix | ACCESS CONTROL |
Catalina - Disable Media Sharing - com.apple.amp.mediasharingd | NIST macOS Catalina v1.5.0 - 800-53r5 Low | Unix | ACCESS CONTROL |
Catalina - Disable Media Sharing - com.apple.amp.mediasharingd | NIST macOS Catalina v1.5.0 - 800-171 | Unix | ACCESS CONTROL |
Catalina - Disable Media Sharing - com.apple.amp.mediasharingd | NIST macOS Catalina v1.5.0 - All Profiles | Unix | ACCESS CONTROL |
Catalina - Disable Media Sharing - home-sharing-enabled | NIST macOS Catalina v1.5.0 - 800-171 | Unix | ACCESS CONTROL |
Catalina - Disable Media Sharing - home-sharing-enabled | NIST macOS Catalina v1.5.0 - 800-53r4 Low | Unix | ACCESS CONTROL |
Catalina - Disable Media Sharing - home-sharing-enabled | NIST macOS Catalina v1.5.0 - 800-53r4 High | Unix | ACCESS CONTROL |
Catalina - Disable Media Sharing - home-sharing-enabled | NIST macOS Catalina v1.5.0 - 800-53r4 Moderate | Unix | ACCESS CONTROL |
Catalina - Disable Media Sharing - home-sharing-enabled | NIST macOS Catalina v1.5.0 - 800-53r5 Low | Unix | ACCESS CONTROL |
Catalina - Disable Media Sharing - home-sharing-enabled | NIST macOS Catalina v1.5.0 - 800-53r5 High | Unix | ACCESS CONTROL |
Monterey - Disable Media Sharing | NIST macOS Monterey v1.0.0 - All Profiles | Unix | ACCESS CONTROL |
Monterey - Disable Media Sharing | NIST macOS Monterey v1.0.0 - 800-171 | Unix | ACCESS CONTROL |
Monterey - Disable Media Sharing | NIST macOS Monterey v1.0.0 - 800-53r4 High | Unix | ACCESS CONTROL |
Monterey - Disable Media Sharing | NIST macOS Monterey v1.0.0 - 800-53r5 Low | Unix | ACCESS CONTROL |
Monterey - Disable Media Sharing | NIST macOS Monterey v1.0.0 - 800-53r4 Low | Unix | ACCESS CONTROL |
Monterey - Disable Media Sharing | NIST macOS Monterey v1.0.0 - 800-53r4 Moderate | Unix | ACCESS CONTROL |
NET0433 - Device not authenticated by AAA server - 'aaa new-model' | DISA STIG Cisco Perimeter Router v8r8 | Cisco | ACCESS CONTROL, AUDIT AND ACCOUNTABILITY, IDENTIFICATION AND AUTHENTICATION |