Item Search

NameAudit NamePluginCategory
5.1.16 Ensure sshd MaxAuthTries is configuredCIS AlmaLinux OS 10 v1.0.0 L1 ServerUnix

AUDIT AND ACCOUNTABILITY

5.4 Ensure 'SQL Server Audit' is set to capture both 'failed' and 'successful logins'CIS Microsoft SQL Server 2022 v1.2.1 L1 AWS RDSMS_SQLDB

AUDIT AND ACCOUNTABILITY

5.4 Ensure 'SQL Server Audit' is set to capture both 'failed' and 'successful logins'CIS Microsoft SQL Server 2019 v1.5.0 L1 AWS RDSMS_SQLDB

AUDIT AND ACCOUNTABILITY

6.3.3.1 Ensure changes to system administration scope (sudoers) is collectedCIS Red Hat Enterprise Linux 8 v4.0.0 L2 ServerUnix

AUDIT AND ACCOUNTABILITY

6.3.3.1 Ensure modification of the /etc/sudoers file is collectedCIS Rocky Linux 10 v1.0.0 L2 WorkstationUnix

AUDIT AND ACCOUNTABILITY

6.3.3.1 Ensure modification of the /etc/sudoers file is collectedCIS Oracle Linux 10 v1.0.0 L2 WorkstationUnix

AUDIT AND ACCOUNTABILITY

6.3.3.2 Ensure actions as another user are always loggedCIS Oracle Linux 10 v1.0.0 L2 WorkstationUnix

AUDIT AND ACCOUNTABILITY

6.3.3.2 Ensure actions as another user are always loggedCIS AlmaLinux OS 10 v1.0.0 L2 ServerUnix

AUDIT AND ACCOUNTABILITY

6.3.3.3 Ensure events that modify the sudo log file are collectedCIS Rocky Linux 10 v1.0.0 L2 WorkstationUnix

AUDIT AND ACCOUNTABILITY

6.3.3.3 Ensure events that modify the sudo log file are collectedCIS AlmaLinux OS 10 v1.0.0 L2 ServerUnix

AUDIT AND ACCOUNTABILITY

6.3.3.5 Ensure events that modify sethostname and setdomainname are collectedCIS Rocky Linux 10 v1.0.0 L2 ServerUnix

AUDIT AND ACCOUNTABILITY

6.3.3.5 Ensure events that modify sethostname and setdomainname are collectedCIS AlmaLinux OS 10 v1.0.0 L2 WorkstationUnix

AUDIT AND ACCOUNTABILITY

6.3.3.5 Ensure events that modify sethostname and setdomainname are collectedCIS Oracle Linux 10 v1.0.0 L2 WorkstationUnix

AUDIT AND ACCOUNTABILITY

6.3.3.5 Ensure events that modify sethostname and setdomainname are collectedCIS AlmaLinux OS 10 v1.0.0 L2 ServerUnix

AUDIT AND ACCOUNTABILITY

6.3.3.6 Ensure events that modify /etc/issue and /etc/issue.net are collectedCIS Oracle Linux 10 v1.0.0 L2 WorkstationUnix

AUDIT AND ACCOUNTABILITY

6.3.3.6 Ensure events that modify /etc/issue and /etc/issue.net are collectedCIS AlmaLinux OS 10 v1.0.0 L2 ServerUnix

AUDIT AND ACCOUNTABILITY

6.3.3.7 Ensure events that modify /etc/hosts and /etc/hostname are collectedCIS Oracle Linux 10 v1.0.0 L2 WorkstationUnix

AUDIT AND ACCOUNTABILITY

6.3.3.8 Ensure events that modify /etc/sysconfig/network and /etc/NetworkManager/system-connections/ are collectedCIS AlmaLinux OS 10 v1.0.0 L2 ServerUnix

AUDIT AND ACCOUNTABILITY

6.3.3.9 Ensure events that modify /etc/NetworkManager directory are collectedCIS Rocky Linux 10 v1.0.0 L2 WorkstationUnix

AUDIT AND ACCOUNTABILITY

6.3.3.9 Ensure events that modify /etc/NetworkManager directory are collectedCIS Oracle Linux 10 v1.0.0 L2 ServerUnix

AUDIT AND ACCOUNTABILITY

6.3.3.11 Ensure unsuccessful file access attempts are collectedCIS AlmaLinux OS 10 v1.0.0 L2 WorkstationUnix

AUDIT AND ACCOUNTABILITY

6.3.3.12 Ensure events that modify /etc/group information are collectedCIS Rocky Linux 10 v1.0.0 L2 ServerUnix

AUDIT AND ACCOUNTABILITY

6.3.3.13 Ensure events that modify /etc/passwd information are collectedCIS Rocky Linux 10 v1.0.0 L2 ServerUnix

AUDIT AND ACCOUNTABILITY

6.3.3.13 Ensure events that modify /etc/passwd information are collectedCIS AlmaLinux OS 10 v1.0.0 L2 ServerUnix

AUDIT AND ACCOUNTABILITY

6.3.3.13 Ensure file deletion events by users are collectedCIS Rocky Linux 8 v3.0.0 L2 WorkstationUnix

AUDIT AND ACCOUNTABILITY

6.3.3.13 Ensure file deletion events by users are collectedCIS Red Hat Enterprise Linux 8 v4.0.0 L2 WorkstationUnix

AUDIT AND ACCOUNTABILITY

6.3.3.14 Ensure events that modify /etc/shadow and /etc/gshadow are collectedCIS AlmaLinux OS 10 v1.0.0 L2 WorkstationUnix

AUDIT AND ACCOUNTABILITY

6.3.3.14 Ensure events that modify /etc/shadow and /etc/gshadow are collectedCIS AlmaLinux OS 10 v1.0.0 L2 ServerUnix

AUDIT AND ACCOUNTABILITY

6.3.3.14 Ensure events that modify the system's Mandatory Access Controls are collectedCIS Red Hat Enterprise Linux 8 v4.0.0 L2 ServerUnix

AUDIT AND ACCOUNTABILITY

6.3.3.14 Ensure events that modify the system's Mandatory Access Controls are collectedCIS Red Hat Enterprise Linux 8 v4.0.0 L2 WorkstationUnix

AUDIT AND ACCOUNTABILITY

6.3.3.15 Ensure events that modify /etc/security/opasswd are collectedCIS Rocky Linux 10 v1.0.0 L2 WorkstationUnix

AUDIT AND ACCOUNTABILITY

6.3.3.15 Ensure events that modify /etc/security/opasswd are collectedCIS Oracle Linux 10 v1.0.0 L2 WorkstationUnix

AUDIT AND ACCOUNTABILITY

6.3.3.16 Ensure events that modify /etc/nsswitch.conf file are collectedCIS Rocky Linux 10 v1.0.0 L2 ServerUnix

AUDIT AND ACCOUNTABILITY

6.3.3.17 Ensure events that modify /etc/pam.conf and /etc/pam.d/ information are collectedCIS Rocky Linux 10 v1.0.0 L2 WorkstationUnix

AUDIT AND ACCOUNTABILITY

6.3.3.17 Ensure events that modify /etc/pam.conf and /etc/pam.d/ information are collectedCIS AlmaLinux OS 10 v1.0.0 L2 WorkstationUnix

AUDIT AND ACCOUNTABILITY

6.3.3.19 Ensure discretionary access control permission modification events chown,fchown,lchown,fchownat are collectedCIS AlmaLinux OS 10 v1.0.0 L2 WorkstationUnix

AUDIT AND ACCOUNTABILITY

6.3.3.19 Ensure kernel module loading unloading and modification is collectedCIS Red Hat Enterprise Linux 8 v4.0.0 L2 ServerUnix

AUDIT AND ACCOUNTABILITY

6.3.3.20 Ensure discretionary access control permission modification events setxattr,lsetxattr,fsetxattr,removexattr,lremovexattr,fremovexattr collectedCIS AlmaLinux OS 10 v1.0.0 L2 ServerUnix

AUDIT AND ACCOUNTABILITY

6.3.3.21 Ensure successful file system mounts are collectedCIS Rocky Linux 10 v1.0.0 L2 WorkstationUnix

AUDIT AND ACCOUNTABILITY

6.3.3.22 Ensure the running and on disk configuration is the sameCIS Rocky Linux 8 v3.0.0 L2 WorkstationUnix

AUDIT AND ACCOUNTABILITY

6.3.3.22 Ensure the running and on disk configuration is the sameCIS Red Hat Enterprise Linux 8 v4.0.0 L2 ServerUnix

AUDIT AND ACCOUNTABILITY

6.3.3.24 Ensure unlink file deletion events by users are collectedCIS AlmaLinux OS 10 v1.0.0 L2 ServerUnix

AUDIT AND ACCOUNTABILITY

6.3.3.26 Ensure events that modify the system's Mandatory Access Controls are collectedCIS Rocky Linux 10 v1.0.0 L2 ServerUnix

AUDIT AND ACCOUNTABILITY

6.3.3.31 Ensure kernel module loading unloading and modification is collectedCIS Oracle Linux 10 v1.0.0 L2 ServerUnix

AUDIT AND ACCOUNTABILITY

6.3.3.33 Ensure kernel "delete_module" loading unloading and modification is collectedCIS AlmaLinux OS 10 v1.0.0 L2 ServerUnix

AUDIT AND ACCOUNTABILITY

6.3.3.34 Ensure kernel query_module loading unloading and modification is collectedCIS Rocky Linux 10 v1.0.0 L2 WorkstationUnix

AUDIT AND ACCOUNTABILITY

6.3.3.34 Ensure kernel query_module loading unloading and modification is collectedCIS AlmaLinux OS 10 v1.0.0 L2 WorkstationUnix

AUDIT AND ACCOUNTABILITY

6.3.3.34 Ensure kernel query_module loading unloading and modification is collectedCIS Oracle Linux 10 v1.0.0 L2 ServerUnix

AUDIT AND ACCOUNTABILITY

6.3.3.37 Ensure the running and on disk configuration is the sameCIS Rocky Linux 10 v1.0.0 L2 WorkstationUnix

AUDIT AND ACCOUNTABILITY

6.3.3.37 Ensure the running and on disk configuration is the sameCIS Oracle Linux 10 v1.0.0 L2 WorkstationUnix

AUDIT AND ACCOUNTABILITY