Item Search

NameAudit NamePluginCategory
1.5 Enable OS X update installsCIS Apple OSX 10.10 Yosemite L1 v1.2.0Unix

SYSTEM AND INFORMATION INTEGRITY

1.6.1 Ensure 'Verify Update Server Identity' is enabledCIS Palo Alto Firewall 10 v1.2.0 L1Palo_Alto

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

2.1 Configure NTP time synchronizationCIS VMware ESXi 5.5 v1.2.0 Level 1VMware

AUDIT AND ACCOUNTABILITY

2.1 Ensure Authentication is configuredCIS MongoDB 5 L1 OS Linux v1.2.0Unix

IDENTIFICATION AND AUTHENTICATION

2.1.2 Disable Bluetooth 'Discoverable' mode when not pairing devicesCIS Apple OSX 10.10 Yosemite L1 v1.2.0Unix

CONFIGURATION MANAGEMENT

2.3 Disable Managed Object Browser (MOB)CIS VMware ESXi 5.5 v1.2.0 Level 1VMware
2.3 Ensure authentication is enabled in the sharded cluster - clusterAuthModeCIS MongoDB 5 L2 OS Linux v1.2.0Unix

CONFIGURATION MANAGEMENT

2.3.2 Secure screen saver corners - bottom left cornerCIS Apple OSX 10.10 Yosemite L2 v1.2.0Unix

ACCESS CONTROL

2.3.2 Secure screen saver corners - top left cornerCIS Apple OSX 10.10 Yosemite L2 v1.2.0Unix

ACCESS CONTROL

2.4 Ensure that 'Include/Exclude Networks' is used if User-ID is enabledCIS Palo Alto Firewall 10 v1.2.0 L1Palo_Alto

CONFIGURATION MANAGEMENT, CONTINGENCY PLANNING, PLANNING, PROGRAM MANAGEMENT, SYSTEM AND SERVICES ACQUISITION, SYSTEM AND COMMUNICATIONS PROTECTION

2.7.1 iCloud configurationCIS Apple OSX 10.10 Yosemite L2 v1.2.0Unix
2.8 Ensure that security policies restrict User-ID Agent traffic from crossing into untrusted zonesCIS Palo Alto Firewall 10 v1.2.0 L1Palo_Alto

ACCESS CONTROL

2.12 Configure Secure Empty TrashCIS Apple OSX 10.10 Yosemite L2 v1.2.0Unix

CONFIGURATION MANAGEMENT

3.1 Configure a centralized location to collect ESXi host core dumpsCIS VMware ESXi 5.5 v1.2.0 Level 1VMware
4.1 Disable Bonjour advertising serviceCIS Apple OSX 10.10 Yosemite L2 v1.2.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION

4.4 Ensure Federal Information Processing Standard (FIPS) is enabledCIS MongoDB 5 L2 OS Linux v1.2.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION

5.1 Disable DCUI to prevent local administrative controlCIS VMware ESXi 5.5 v1.2.0 Level 2VMware

CONFIGURATION MANAGEMENT

5.1 Ensure that WildFire file size upload limits are maximizedCIS Palo Alto Firewall 10 v1.2.0 L1Palo_Alto

SYSTEM AND INFORMATION INTEGRITY

5.1.5 Check Library folder for world writable filesCIS Apple OSX 10.10 Yosemite L2 v1.2.0Unix

ACCESS CONTROL

5.4 Automatically lock the login keychain for inactivityCIS Apple OSX 10.10 Yosemite L2 v1.2.0Unix

IDENTIFICATION AND AUTHENTICATION

5.4 Limit CIM AccessCIS VMware ESXi 5.5 v1.2.0 Level 1VMware
5.5 Enable lockdown mode to restrict remote accessCIS VMware ESXi 5.5 v1.2.0 Level 1VMware
5.6 Enable OCSP and CRL certificate checking - CRLStyleCIS Apple OSX 10.10 Yosemite L2 v1.2.0Unix

IDENTIFICATION AND AUTHENTICATION

5.8 Ensure that 'Inline Cloud Analysis' on Wildfire profiles is enabledCIS Palo Alto Firewall 10 v1.2.0 L1Palo_Alto

SYSTEM AND INFORMATION INTEGRITY

5.13 Create a Login window bannerCIS Apple OSX 10.10 Yosemite L2 v1.2.0Unix

ACCESS CONTROL

5.16 Secure individual keychain and itemsCIS Apple OSX 10.10 Yosemite L2 v1.2.0Unix
6.1 Ensure that MongoDB uses a non-default portCIS MongoDB 5 L1 OS Linux v1.2.0Unix

SYSTEM AND INFORMATION INTEGRITY

6.3 Ensure that server-side scripting is disabled if not neededCIS MongoDB 5 L2 OS Linux v1.2.0Unix

SYSTEM AND INFORMATION INTEGRITY

6.4 Safari disable Internet Plugins for global useCIS Apple OSX 10.10 Yosemite L2 v1.2.0Unix

CONFIGURATION MANAGEMENT

6.5 Use parental controls for systems that are not centrally managedCIS Apple OSX 10.10 Yosemite L2 v1.2.0Unix
6.8 Ensure that PAN-DB URL Filtering is usedCIS Palo Alto Firewall 10 v1.2.0 L1Palo_Alto

SYSTEM AND COMMUNICATIONS PROTECTION

6.9 Ensure that URL Filtering uses the action of 'block' or 'override' on the URL categoriesCIS Palo Alto Firewall 10 v1.2.0 L1Palo_Alto

SYSTEM AND COMMUNICATIONS PROTECTION

6.15 Ensure that a Zone Protection Profile with an enabled SYN Flood Action of SYN Cookies is attached to all untrusted zonesCIS Palo Alto Firewall 10 v1.2.0 L1Palo_Alto

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

6.20 Ensure that 'Wildfire Inline ML Action' on antivirus profiles are set to reset-both on all decoders except 'imap' and 'pop3'CIS Palo Alto Firewall 10 v1.2.0 L1Palo_Alto

SYSTEM AND INFORMATION INTEGRITY

7.1 Ensure appropriate key file permissions are set - PEMKeyFileCIS MongoDB 5 L1 OS Linux v1.2.0Unix

IDENTIFICATION AND AUTHENTICATION

7.1 Ensure that the vSwitch Forged Transmits policy is set to rejectCIS VMware ESXi 5.5 v1.2.0 Level 1VMware

SYSTEM AND COMMUNICATIONS PROTECTION

7.2 Ensure that the vSwitch MAC Address Change policy is set to rejectCIS VMware ESXi 5.5 v1.2.0 Level 1VMware

SYSTEM AND COMMUNICATIONS PROTECTION

7.6 Ensure that port groups are not configured to VLAN 4095 except for Virtual Guest Tagging (VGT)CIS VMware ESXi 5.5 v1.2.0 Level 1VMware

CONFIGURATION MANAGEMENT

8.1.2 Limit sharing of console connectionsCIS VMware ESXi 5.5 v1.2.0 Level 2VMware

ACCESS CONTROL

8.2.4 Disconnect unauthorized devices - Serial DevicesCIS VMware ESXi 5.5 v1.2.0 Level 2VMware

CONFIGURATION MANAGEMENT

8.3 Ensure that the Certificate used for Decryption is TrustedCIS Palo Alto Firewall 10 v1.2.0 L1Palo_Alto

CONFIGURATION MANAGEMENT

8.3.1 Disable unnecessary or superfluous functions inside VMsCIS VMware ESXi 5.5 v1.2.0 Level 1VMware
8.4.1 Control access to VMs through the dvfilter network APIsCIS VMware ESXi 5.5 v1.2.0 Level 1VMware

ACCESS CONTROL

8.4.6 Disable BIOS BBSCIS VMware ESXi 5.5 v1.2.0 Level 2VMware

CONFIGURATION MANAGEMENT

8.4.8 Disable Unity TaskbarCIS VMware ESXi 5.5 v1.2.0 Level 2VMware

CONFIGURATION MANAGEMENT

8.4.12 Disable Drag and Drop Version GetCIS VMware ESXi 5.5 v1.2.0 Level 2VMware

CONFIGURATION MANAGEMENT

8.4.15 Disable Request Disk TopologyCIS VMware ESXi 5.5 v1.2.0 Level 2VMware

CONFIGURATION MANAGEMENT

8.4.19 Disable Unity InterlockCIS VMware ESXi 5.5 v1.2.0 Level 2VMware

CONFIGURATION MANAGEMENT

8.4.29 Disable all but VGA mode on virtual machines.CIS VMware ESXi 5.5 v1.2.0 Level 2VMware

SYSTEM AND COMMUNICATIONS PROTECTION

8.5.1 Prevent virtual machines from taking over resources - CPU Share LevelCIS VMware ESXi 5.5 v1.2.0 Level 2VMware

SYSTEM AND COMMUNICATIONS PROTECTION