Item Search

NameAudit NamePluginCategory
1.1.2.1.4 Ensure noexec option set on /tmp partitionCIS Red Hat Enterprise Linux 9 v2.0.0 L1 WorkstationUnix

ACCESS CONTROL, MEDIA PROTECTION

1.1.2.2.3 Ensure nosuid option set on /dev/shm partitionCIS Red Hat Enterprise Linux 9 v2.0.0 L1 WorkstationUnix

ACCESS CONTROL, MEDIA PROTECTION

1.1.2.2.4 Ensure noexec option set on /dev/shm partitionCIS Red Hat Enterprise Linux 9 v2.0.0 L1 WorkstationUnix

ACCESS CONTROL, MEDIA PROTECTION

1.1.2.3.1 Ensure separate partition exists for /homeCIS Red Hat Enterprise Linux 9 v2.0.0 L2 WorkstationUnix

ACCESS CONTROL, MEDIA PROTECTION

1.1.2.3.1 Ensure separate partition exists for /homeCIS Rocky Linux 8 Workstation L2 v2.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

1.1.2.4.1 Ensure separate partition exists for /varCIS Red Hat Enterprise Linux 9 v2.0.0 L2 ServerUnix

ACCESS CONTROL, MEDIA PROTECTION

1.1.2.4.1 Ensure separate partition exists for /varCIS Red Hat Enterprise Linux 9 v2.0.0 L2 WorkstationUnix

ACCESS CONTROL, MEDIA PROTECTION

1.1.2.5.1 Ensure separate partition exists for /var/tmpCIS Rocky Linux 8 Server L2 v2.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

1.1.2.5.1 Ensure separate partition exists for /var/tmpCIS Rocky Linux 8 Workstation L2 v2.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

1.1.2.6.2 Ensure nodev option set on /var/log partitionCIS Red Hat Enterprise Linux 9 v2.0.0 L1 WorkstationUnix

ACCESS CONTROL, MEDIA PROTECTION

1.3.1.5 Ensure the SELinux mode is enforcingCIS Red Hat Enterprise Linux 9 v2.0.0 L2 ServerUnix

ACCESS CONTROL, MEDIA PROTECTION

1.3.1.5 Ensure the SELinux mode is enforcingCIS Red Hat Enterprise Linux 9 v2.0.0 L2 WorkstationUnix

ACCESS CONTROL, MEDIA PROTECTION

1.3.1.6 Ensure no unconfined services existCIS Red Hat Enterprise Linux 9 v2.0.0 L2 WorkstationUnix

ACCESS CONTROL, MEDIA PROTECTION

2.4.1.6 Ensure permissions on /etc/cron.monthly are configuredCIS Red Hat Enterprise Linux 9 v2.0.0 L1 WorkstationUnix

ACCESS CONTROL, MEDIA PROTECTION

2.4.1.8 Ensure crontab is restricted to authorized usersCIS Red Hat Enterprise Linux 9 v2.0.0 L1 WorkstationUnix

ACCESS CONTROL, MEDIA PROTECTION

3.2 Ensure 'log_bin_basename' Files Have Appropriate PermissionsCIS MySQL 5.7 Community Database L1 v2.0.0MySQLDB

ACCESS CONTROL, MEDIA PROTECTION

3.2 Ensure 'log_bin_basename' Files Have Appropriate PermissionsCIS MySQL 5.7 Community Windows OS L1 v2.0.0Windows

ACCESS CONTROL, MEDIA PROTECTION

3.2 Ensure 'log_bin_basename' Files Have Appropriate PermissionsCIS MySQL 5.7 Community Linux OS L1 v2.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

3.3 Ensure 'log_error' Has Appropriate PermissionsCIS MySQL 5.6 Community Windows OS L1 v2.0.0Windows

ACCESS CONTROL, MEDIA PROTECTION

3.3 Ensure 'log_error' Has Appropriate PermissionsCIS MySQL 5.7 Community Linux OS L1 v2.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

3.4 Ensure 'slow_query_log' Has Appropriate PermissionsCIS MySQL 5.6 Enterprise Windows OS L1 v2.0.0Windows

ACCESS CONTROL, MEDIA PROTECTION

3.5 Ensure 'relay_log_basename' Files Have Appropriate PermissionsCIS MySQL 5.6 Enterprise Windows OS L1 v2.0.0Windows

ACCESS CONTROL, MEDIA PROTECTION

3.6 Ensure 'general_log_file' Has Appropriate PermissionsCIS MySQL 5.6 Community Linux OS L1 v2.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

3.6 Ensure 'general_log_file' Has Appropriate PermissionsCIS MySQL 5.7 Community Linux OS L1 v2.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

3.7 Ensure SSL Key Files Have Appropriate PermissionsCIS MySQL 5.6 Enterprise Windows OS L1 v2.0.0Windows

ACCESS CONTROL, MEDIA PROTECTION

3.8 Ensure Plugin Directory Has Appropriate PermissionsCIS MySQL 5.6 Community Linux OS L1 v2.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

3.8 Ensure Plugin Directory Has Appropriate PermissionsCIS MySQL 5.6 Enterprise Linux OS L1 v2.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

3.9 Secure MySQL Keyring - keyring_aws_conf_fileCIS MySQL 5.7 Community Linux OS L1 v2.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

3.9 Secure MySQL Keyring - keyring_file_data_pathCIS MySQL 5.7 Community Windows OS L1 v2.0.0Windows

ACCESS CONTROL, MEDIA PROTECTION

4.5 Ensure 'mysqld' is Not Started with '--skip-grant-tables' - --skip-grant-tablesCIS MySQL 5.6 Enterprise Linux OS L1 v2.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

4.5 Ensure 'mysqld' is Not Started with '--skip-grant-tables' - %PROGRAMDATA%\MySQL\MySQL Server 5.7\my.iniCIS MySQL 5.7 Community Windows OS L1 v2.0.0Windows

ACCESS CONTROL, MEDIA PROTECTION

4.5 Ensure 'mysqld' is Not Started with '--skip-grant-tables' - %WINDIR%\my.cnfCIS MySQL 5.6 Community Windows OS L1 v2.0.0Windows

ACCESS CONTROL, MEDIA PROTECTION

4.5 Ensure 'mysqld' is Not Started with '--skip-grant-tables' - %WINDIR%\my.iniCIS MySQL 5.6 Community Windows OS L1 v2.0.0Windows

ACCESS CONTROL, MEDIA PROTECTION

4.5 Ensure 'mysqld' is Not Started with '--skip-grant-tables' - %WINDIR%\my.iniCIS MySQL 5.7 Community Windows OS L1 v2.0.0Windows

ACCESS CONTROL, MEDIA PROTECTION

4.5 Ensure 'mysqld' is Not Started with '--skip-grant-tables' - MYSQL_INSTALL\my.cnfCIS MySQL 5.7 Community Windows OS L1 v2.0.0Windows

ACCESS CONTROL, MEDIA PROTECTION

4.8 Ensure the 'secure_file_priv' is Configured CorrectlyCIS MySQL 5.7 Community Database L1 v2.0.0MySQLDB

ACCESS CONTROL, MEDIA PROTECTION

5.1.1 Ensure permissions on /etc/ssh/sshd_config are configuredCIS Red Hat Enterprise Linux 9 v2.0.0 L1 WorkstationUnix

ACCESS CONTROL, MEDIA PROTECTION

5.2.4.1 Ensure the audit log directory is 0750 or more restrictiveCIS Rocky Linux 8 Server L2 v2.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

5.2.4.8 Ensure audit tools are 755 or more restrictiveCIS Rocky Linux 8 Server L2 v2.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

5.2.4.9 Ensure audit tools are owned by rootCIS Rocky Linux 8 Server L2 v2.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

5.4.2.8 Ensure accounts without a valid login shell are lockedCIS Red Hat Enterprise Linux 9 v2.0.0 L1 WorkstationUnix

ACCESS CONTROL, MEDIA PROTECTION

6.2.1.2 Ensure journald log file access is configuredCIS Red Hat Enterprise Linux 9 v2.0.0 L1 WorkstationUnix

ACCESS CONTROL, MEDIA PROTECTION

6.3.4.2 Ensure audit log files mode is configuredCIS Red Hat Enterprise Linux 9 v2.0.0 L2 ServerUnix

ACCESS CONTROL, MEDIA PROTECTION

6.3.4.5 Ensure audit configuration files mode is configuredCIS Red Hat Enterprise Linux 9 v2.0.0 L2 ServerUnix

ACCESS CONTROL, MEDIA PROTECTION

6.3.4.6 Ensure audit configuration files owner is configuredCIS Red Hat Enterprise Linux 9 v2.0.0 L2 WorkstationUnix

ACCESS CONTROL, MEDIA PROTECTION

6.3.4.7 Ensure audit configuration files group owner is configuredCIS Red Hat Enterprise Linux 9 v2.0.0 L2 WorkstationUnix

ACCESS CONTROL, MEDIA PROTECTION

7.1.4 Ensure permissions on /etc/group- are configuredCIS Red Hat Enterprise Linux 9 v2.0.0 L1 WorkstationUnix

ACCESS CONTROL, MEDIA PROTECTION

7.1.8 Ensure permissions on /etc/gshadow- are configuredCIS Red Hat Enterprise Linux 9 v2.0.0 L1 WorkstationUnix

ACCESS CONTROL, MEDIA PROTECTION

7.1.9 Ensure permissions on /etc/shells are configuredCIS Red Hat Enterprise Linux 9 v2.0.0 L1 WorkstationUnix

ACCESS CONTROL, MEDIA PROTECTION

7.1.13 Ensure SUID and SGID files are reviewedCIS Red Hat Enterprise Linux 9 v2.0.0 L1 WorkstationUnix

ACCESS CONTROL, MEDIA PROTECTION