Item Search

NameAudit NamePluginCategory
1.2.2 - MobileIron - Enable Fraudulent Website WarningMobileIron - CIS Apple iOS 9 v1.0.0 L1MDM

ACCESS CONTROL, CONFIGURATION MANAGEMENT

1.2.4 - MobileIron - Disable Auto Fill for Names and PasswordsMobileIron - CIS Apple iOS 9 v1.0.0 L2MDM

ACCESS CONTROL, CONFIGURATION MANAGEMENT

1.2.6 - MobileIron - Delete Saved Password InformationMobileIron - CIS Apple iOS 9 v1.0.0 L2MDM

ACCESS CONTROL

1.2.7 - MobileIron - Delete Saved Credit Card InformationMobileIron - CIS Apple iOS 8 v1.0.0 L2MDM

ACCESS CONTROL, CONFIGURATION MANAGEMENT

1.7 Ensure MariaDB is Run Under a Sandbox EnvironmentCIS MariaDB 10.6 Database L2 v1.1.0MySQLDB

SYSTEM AND COMMUNICATIONS PROTECTION

2.3.2 Secure screen saver corners - bottom right cornerCIS Apple OSX 10.11 El Capitan L2 v1.1.0Unix

ACCESS CONTROL

2.3.2 Secure screen saver corners - top left cornerCIS Apple OSX 10.11 El Capitan L2 v1.1.0Unix

ACCESS CONTROL

2.3.2 Secure screen saver corners - top right cornerCIS Apple OSX 10.11 El Capitan L2 v1.1.0Unix

ACCESS CONTROL

2.5.1 Disable 'Wake for network access'CIS Apple OSX 10.11 El Capitan L2 v1.1.0Unix

ACCESS CONTROL

2.6.6 Enable Location ServicesCIS Apple OSX 10.11 El Capitan L2 v1.1.0Unix

CONFIGURATION MANAGEMENT

2.6.7 Monitor Location Services AccessCIS Apple OSX 10.11 El Capitan L2 v1.1.0Unix

CONFIGURATION MANAGEMENT

2.7 Lock Out Accounts if Not Currently in UseCIS MariaDB 10.6 Database L2 v1.1.0MySQLDB

ACCESS CONTROL

2.7.1 iCloud configurationCIS Apple OSX 10.11 El Capitan L2 v1.1.0Unix
2.7.2 iCloud keychainCIS Apple OSX 10.11 El Capitan L2 v1.1.0Unix
2.7.3 iCloud DriveCIS Apple OSX 10.11 El Capitan L2 v1.1.0Unix
2.8.1 Time Machine Auto-BackupCIS Apple OSX 10.11 El Capitan L2 v1.1.0Unix

CONTINGENCY PLANNING

2.10 Limit Accepted Transport Layer Security (TLS) VersionsCIS MariaDB 10.6 Database L2 v1.1.0MySQLDB

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND SERVICES ACQUISITION, SYSTEM AND COMMUNICATIONS PROTECTION

2.11 Java 6 is not the default Java runtimeCIS Apple OSX 10.11 El Capitan L2 v1.1.0Unix

CONFIGURATION MANAGEMENT

2.12 Ensure Only Approved Ciphers are UsedCIS MariaDB 10.6 Database L2 v1.1.0MySQLDB

SYSTEM AND SERVICES ACQUISITION

3.3 Configure Security Auditing Flags - 'audit all failed events across all audit classes'CIS Apple OSX 10.11 El Capitan L2 v1.1.0Unix

AUDIT AND ACCOUNTABILITY

3.3 Configure Security Auditing Flags - 'audit successful/failed administrative events'CIS Apple OSX 10.11 El Capitan L2 v1.1.0Unix

AUDIT AND ACCOUNTABILITY

3.3 Configure Security Auditing Flags - 'audit successful/failed file attribute modification events'CIS Apple OSX 10.11 El Capitan L2 v1.1.0Unix

AUDIT AND ACCOUNTABILITY

3.3 Configure Security Auditing Flags - 'audit successful/failed login/logout events'CIS Apple OSX 10.11 El Capitan L2 v1.1.0Unix

AUDIT AND ACCOUNTABILITY

3.4 Enable remote logging for Desktops on trusted networksCIS Apple OSX 10.11 El Capitan L2 v1.1.0Unix

AUDIT AND ACCOUNTABILITY

4.1 Disable Bonjour advertising serviceCIS Apple OSX 10.11 El Capitan L2 v1.1.0Unix

CONFIGURATION MANAGEMENT

4.3 Create network specific locationsCIS Apple OSX 10.11 El Capitan L2 v1.1.0Unix
5.4 Automatically lock the login keychain for inactivityCIS Apple OSX 10.11 El Capitan L2 v1.1.0Unix

IDENTIFICATION AND AUTHENTICATION

5.6 Enable OCSP and CRL certificate checking - CRLStyleCIS Apple OSX 10.11 El Capitan L2 v1.1.0Unix

IDENTIFICATION AND AUTHENTICATION

5.6 Enable OCSP and CRL certificate checking - OCSPStyleCIS Apple OSX 10.11 El Capitan L2 v1.1.0Unix

IDENTIFICATION AND AUTHENTICATION

5.13 Create a Login window bannerCIS Apple OSX 10.11 El Capitan L2 v1.1.0Unix

ACCESS CONTROL

5.15 Disable Fast User SwitchingCIS Apple OSX 10.11 El Capitan L2 v1.1.0Unix

ACCESS CONTROL

5.16 Secure individual keychain and itemsCIS Apple OSX 10.11 El Capitan L2 v1.1.0Unix
5.17 Create specialized keychains for different purposesCIS Apple OSX 10.11 El Capitan L2 v1.1.0Unix
5.19 Install an approved tokend for smartcard authenticationCIS Apple OSX 10.11 El Capitan L2 v1.1.0Unix

IDENTIFICATION AND AUTHENTICATION

6.4 Ensure Audit Logging Is EnabledCIS MariaDB 10.6 Database L2 v1.1.0MySQLDB

AUDIT AND ACCOUNTABILITY

6.4 Safari disable Internet Plugins for global useCIS Apple OSX 10.11 El Capitan L2 v1.1.0Unix

CONFIGURATION MANAGEMENT

6.5 Use parental controls for systems that are not centrally managedCIS Apple OSX 10.11 El Capitan L2 v1.1.0Unix
7.1 Wireless technology on OS XCIS Apple OSX 10.11 El Capitan L2 v1.1.0Unix
7.2 iSight Camera Privacy and Confidentiality ConcernsCIS Apple OSX 10.11 El Capitan L2 v1.1.0Unix
7.3 Computer Name ConsiderationsCIS Apple OSX 10.11 El Capitan L2 v1.1.0Unix
7.4 Software Inventory ConsiderationsCIS Apple OSX 10.11 El Capitan L2 v1.1.0Unix
7.7 App Store Automatically download apps purchased on other Macs ConsiderationsCIS Apple OSX 10.11 El Capitan L2 v1.1.0Unix
7.8 Extensible Firmware Interface (EFI) passwordCIS Apple OSX 10.11 El Capitan L2 v1.1.0Unix
7.9 Apple ID password resetCIS Apple OSX 10.11 El Capitan L2 v1.1.0Unix
7.11 App Store Password SettingsCIS Apple OSX 10.11 El Capitan L2 v1.1.0Unix
DKER-EE-001810 - On Linux, a non-AUFS storage driver in the Docker Engine - Enterprise component of Docker Enterprise must be used.DISA STIG Docker Enterprise 2.x Linux/Unix v2r2Unix

CONFIGURATION MANAGEMENT

DKER-EE-001830 - The userland proxy capability in the Docker Engine - Enterprise component of Docker Enterprise must be disabled.DISA STIG Docker Enterprise 2.x Linux/Unix v2r2Unix

CONFIGURATION MANAGEMENT

DKER-EE-001890 - The option in Universal Control Plane (UCP) allowing users and administrators to schedule containers on all nodes, including UCP managers and Docker Trusted Registry (DTR) nodes must be disabled in Docker Enterprise.DISA STIG Docker Enterprise 2.x Linux/Unix UCP v2r2Unix

CONFIGURATION MANAGEMENT

DKER-EE-001910 - Periodic data usage and analytics reporting in Universal Control Plane (UCP) must be disabled in Docker Enterprise.DISA STIG Docker Enterprise 2.x Linux/Unix UCP v2r2Unix

CONFIGURATION MANAGEMENT

JUEX-L2-000050 - The Juniper EX switch must be configured to permit authorized users to select a user session to capture.DISA Juniper EX Series Layer 2 Switch v2r2Juniper

AUDIT AND ACCOUNTABILITY