1.1.4.4 Ensure nodev option set on /var/tmp partition | CIS Fedora 28 Family Linux Server L1 v2.0.0 | Unix | ACCESS CONTROL, MEDIA PROTECTION |
1.1.5.3 Ensure noexec option set on /var/log partition | CIS Fedora 28 Family Linux Server L1 v2.0.0 | Unix | ACCESS CONTROL, MEDIA PROTECTION |
1.1.6.4 Ensure nosuid option set on /var/log/audit partition | CIS Fedora 28 Family Linux Server L1 v2.0.0 | Unix | ACCESS CONTROL, MEDIA PROTECTION |
1.1.7.2 Ensure nodev option set on /home partition | CIS Fedora 28 Family Linux Workstation L1 v2.0.0 | Unix | ACCESS CONTROL, MEDIA PROTECTION |
1.1.8.2 Ensure noexec option set on /dev/shm partition | CIS Fedora 28 Family Linux Workstation L1 v2.0.0 | Unix | ACCESS CONTROL, MEDIA PROTECTION |
1.6.1.1 Ensure SELinux is installed | CIS Fedora 28 Family Linux Server L1 v2.0.0 | Unix | ACCESS CONTROL, MEDIA PROTECTION |
1.6.1.4 Ensure the SELinux mode is not disabled | CIS Fedora 28 Family Linux Server L1 v2.0.0 | Unix | ACCESS CONTROL, MEDIA PROTECTION |
1.6.1.6 Ensure no unconfined services exist | CIS Fedora 28 Family Linux Workstation L1 v2.0.0 | Unix | ACCESS CONTROL, MEDIA PROTECTION |
1.7.6 Ensure permissions on /etc/issue.net are configured | CIS Fedora 28 Family Linux Workstation L1 v2.0.0 | Unix | ACCESS CONTROL, MEDIA PROTECTION |
2.4.1.2 Ensure permissions on /etc/crontab are configured | CIS Debian Linux 12 v1.0.1 L1 Workstation | Unix | ACCESS CONTROL, MEDIA PROTECTION |
2.4.1.3 Ensure permissions on /etc/cron.hourly are configured | CIS Debian Linux 12 v1.0.1 L1 Workstation | Unix | ACCESS CONTROL, MEDIA PROTECTION |
2.4.1.7 Ensure permissions on /etc/cron.d are configured | CIS Debian Linux 12 v1.0.1 L1 Workstation | Unix | ACCESS CONTROL, MEDIA PROTECTION |
3.1.2 Secure Permissions for Default Database File Path (DFTDBPATH) | CIS IBM DB2 11 v1.1.0 Linux OS Level 1 | Unix | ACCESS CONTROL, MEDIA PROTECTION |
3.1.4 Secure Permissions for All Diagnostic Logs (DIAGPATH) | CIS IBM DB2 11 v1.1.0 Windows OS Level 1 | Windows | ACCESS CONTROL, MEDIA PROTECTION |
3.1.11 Secure the Python Runtime Path (PYTHON_PATH) | CIS IBM DB2 11 v1.1.0 Linux OS Level 1 | Unix | ACCESS CONTROL, MEDIA PROTECTION |
3.2 Ensure that docker.service file permissions are appropriately set | CIS Docker v1.6.0 L2 Docker Linux | Unix | ACCESS CONTROL, MEDIA PROTECTION |
3.3.3 Set umask Value in the Db2 Instance Owner's .profile | CIS IBM DB2 11 v1.1.0 Linux OS Level 1 | Unix | ACCESS CONTROL, MEDIA PROTECTION |
3.6 Ensure that /etc/docker directory permissions are set to 755 or more restrictively | CIS Docker v1.6.0 L1 Docker Linux | Unix | ACCESS CONTROL, MEDIA PROTECTION |
3.6 Ensure that /etc/docker directory permissions are set to 755 or more restrictively | CIS Docker v1.6.0 L2 Docker Linux | Unix | ACCESS CONTROL, MEDIA PROTECTION |
3.16 Ensure that the Docker socket file permissions are set to 660 or more restrictively | CIS Docker v1.6.0 L1 Docker Linux | Unix | ACCESS CONTROL, MEDIA PROTECTION |
3.16 Ensure that the Docker socket file permissions are set to 660 or more restrictively | CIS Docker v1.6.0 L2 Docker Linux | Unix | ACCESS CONTROL, MEDIA PROTECTION |
4.1.1 Creating the Database Without PUBLIC Grants (RESTRICTIVE) | CIS IBM DB2 11 v1.1.0 Database Level 2 | IBM_DB2DB | ACCESS CONTROL, MEDIA PROTECTION |
4.1.8 Secure Permissions for the Log Mirror Location (MIRRORLOGPATH) | CIS IBM DB2 11 v1.1.0 Windows OS Level 1 | Windows | ACCESS CONTROL, MEDIA PROTECTION |
4.2.3 Ensure permissions on all logfiles are configured | CIS Fedora 28 Family Linux Server L1 v2.0.0 | Unix | ACCESS CONTROL, MEDIA PROTECTION |
4.4.4 Restrict Access to SYSPROC.AUTH_LIST_AUTHORITIES_FOR_AUTHID | CIS IBM DB2 11 v1.1.0 Database Level 1 | IBM_DB2DB | ACCESS CONTROL, MEDIA PROTECTION |
5.1.3 Ensure permissions on SSH public host key files are configured | CIS Debian Linux 12 v1.0.1 L1 Workstation | Unix | ACCESS CONTROL, MEDIA PROTECTION |
5.1.6 Ensure permissions on /etc/cron.monthly are configured | CIS Fedora 28 Family Linux Server L1 v2.0.0 | Unix | ACCESS CONTROL, MEDIA PROTECTION |
5.1.9 Ensure at is restricted to authorized users | CIS Fedora 28 Family Linux Server L1 v2.0.0 | Unix | ACCESS CONTROL, MEDIA PROTECTION |
5.2.1 Ensure permissions on /etc/ssh/sshd_config are configured | CIS Fedora 28 Family Linux Server L1 v2.0.0 | Unix | ACCESS CONTROL, MEDIA PROTECTION |
5.2.7 Ensure access to the su command is restricted | CIS Debian Linux 12 v1.0.1 L1 Workstation | Unix | ACCESS CONTROL, MEDIA PROTECTION |
5.4.2.2 Ensure root is the only GID 0 account | CIS Debian Linux 12 v1.0.1 L1 Workstation | Unix | ACCESS CONTROL, MEDIA PROTECTION |
5.4.2.4 Ensure root password is set | CIS Debian Linux 12 v1.0.1 L1 Workstation | Unix | ACCESS CONTROL, MEDIA PROTECTION |
5.6.2 Ensure system accounts are secured | CIS Fedora 28 Family Linux Server L1 v2.0.0 | Unix | ACCESS CONTROL, MEDIA PROTECTION |
5.6.5 Ensure default user umask is 027 or more restrictive | CIS Fedora 28 Family Linux Workstation L1 v2.0.0 | Unix | ACCESS CONTROL, MEDIA PROTECTION |
5.8 DB2_GRP_LOOKUP Registry Variable (Windows only) | CIS IBM DB2 11 v1.1.0 Windows OS Level 1 | Windows | ACCESS CONTROL, MEDIA PROTECTION |
6.1.1 Secure SYSADM Authority | CIS IBM DB2 11 v1.1.0 Windows OS Level 1 | Windows | ACCESS CONTROL, MEDIA PROTECTION |
6.1.2 Secure SYSCTRL Authority | CIS IBM DB2 11 v1.1.0 Linux OS Level 1 | Unix | ACCESS CONTROL, MEDIA PROTECTION |
6.1.2 Secure SYSCTRL Authority | CIS IBM DB2 11 v1.1.0 Windows OS Level 1 | Windows | ACCESS CONTROL, MEDIA PROTECTION |
6.1.3 Secure SYSMAINT Authority | CIS IBM DB2 11 v1.1.0 Windows OS Level 1 | Windows | ACCESS CONTROL, MEDIA PROTECTION |
6.1.5 Ensure permissions on /etc/group are configured | CIS Fedora 28 Family Linux Workstation L1 v2.0.0 | Unix | ACCESS CONTROL, MEDIA PROTECTION |
6.1.6 Secure DBADM Authority | CIS IBM DB2 11 v1.1.0 Database Level 1 | IBM_DB2DB | ACCESS CONTROL, MEDIA PROTECTION |
6.1.7 Ensure permissions on /etc/passwd- are configured | CIS Fedora 28 Family Linux Server L1 v2.0.0 | Unix | ACCESS CONTROL, MEDIA PROTECTION |
6.1.7 Secure SQLADM Authority | CIS IBM DB2 11 v1.1.0 Database Level 1 | IBM_DB2DB | ACCESS CONTROL, MEDIA PROTECTION |
6.1.8 Ensure permissions on /etc/shadow- are configured | CIS Fedora 28 Family Linux Workstation L1 v2.0.0 | Unix | ACCESS CONTROL, MEDIA PROTECTION |
6.1.11 Secure CREATAB Authority | CIS IBM DB2 11 v1.1.0 Database Level 1 | IBM_DB2DB | ACCESS CONTROL, MEDIA PROTECTION |
6.1.13 Secure CONNECT Authority | CIS IBM DB2 11 v1.1.0 Database Level 1 | IBM_DB2DB | ACCESS CONTROL, MEDIA PROTECTION |
6.1.14 Audit SUID executables | CIS Fedora 28 Family Linux Workstation L1 v2.0.0 | Unix | ACCESS CONTROL, MEDIA PROTECTION |
6.1.15 Secure EXTERNALROUTINE Authority | CIS IBM DB2 11 v1.1.0 Database Level 1 | IBM_DB2DB | ACCESS CONTROL, MEDIA PROTECTION |
6.2.1 Review Users, Groups, and Roles | CIS IBM DB2 11 v1.1.0 Database Level 1 | IBM_DB2DB | ACCESS CONTROL, MEDIA PROTECTION |
6.2.6 Review Role Grantees with WITH ADMIN OPTION | CIS IBM DB2 11 v1.1.0 Database Level 1 | IBM_DB2DB | ACCESS CONTROL, MEDIA PROTECTION |