1.1.4.1 exec accounting | CIS Cisco IOS XR 7.x v1.0.0 L1 | Cisco | ACCESS CONTROL, AUDIT AND ACCOUNTABILITY |
1.1.4.2 command accounting | CIS Cisco IOS XR 7.x v1.0.0 L1 | Cisco | ACCESS CONTROL, AUDIT AND ACCOUNTABILITY |
1.1.4.3 network accounting | CIS Cisco IOS XR 7.x v1.0.0 L1 | Cisco | ACCESS CONTROL, AUDIT AND ACCOUNTABILITY |
1.1.4.4 system accounting | CIS Cisco IOS XR 7.x v1.0.0 L1 | Cisco | ACCESS CONTROL, AUDIT AND ACCOUNTABILITY |
2.2.5 Ensure that A Multi-factor Authentication Policy Exists for All Users | CIS Microsoft Azure Foundations v3.0.0 L2 | microsoft_azure | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION |
2.2.6 Ensure Multi-factor Authentication is Required for Risky Sign-ins | CIS Microsoft Azure Foundations v3.0.0 L2 | microsoft_azure | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION |
2.7 Ensure that a unique Certificate Authority is used for etcd | CIS Kubernetes v1.20 Benchmark v1.0.1 L2 Master | Unix | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION |
2.7 Ensure that a unique Certificate Authority is used for etcd | CIS Kubernetes v1.10.0 L2 Master | Unix | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION |
2.7 Ensure that a unique Certificate Authority is used for etcd | CIS Kubernetes v1.23 Benchmark v1.0.1 L2 Master | Unix | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION |
2.7 Ensure that a unique Certificate Authority is used for etcd | CIS Kubernetes v1.24 Benchmark v1.0.0 L2 Master | Unix | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION |
2.8 Ensure that a Custom Bad Password List is set to 'Enforce' for your Organization | CIS Microsoft Azure Foundations v3.0.0 L1 | microsoft_azure | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION |
2.11 Ensure That 'Notify all admins when other admins reset their password?' is set to 'Yes' | CIS Microsoft Azure Foundations v3.0.0 L1 | microsoft_azure | ACCESS CONTROL |
3.1 Ensure 'FAILED_LOGIN_ATTEMPTS' Is Less than or Equal to '5' | CIS Oracle Server 19c DB Unified Auditing v1.2.0 | OracleDB | ACCESS CONTROL |
3.2 Ensure 'PASSWORD_LOCK_TIME' Is Greater than or Equal to '1' | CIS Oracle Server 19c DB Unified Auditing v1.2.0 | OracleDB | ACCESS CONTROL |
3.3.2 Ensure that the Expiration Date is set for all Keys in Non-RBAC Key Vaults. | CIS Microsoft Azure Foundations v3.0.0 L1 | microsoft_azure | ACCESS CONTROL, AUDIT AND ACCOUNTABILITY, SYSTEM AND INFORMATION INTEGRITY |
3.3.8 Ensure Automatic Key Rotation is Enabled Within Azure Key Vault for the Supported Services | CIS Microsoft Azure Foundations v3.0.0 L2 | microsoft_azure | ACCESS CONTROL, AUDIT AND ACCOUNTABILITY, SYSTEM AND INFORMATION INTEGRITY |
3.8 Ensure 'SESSIONS_PER_USER' Is Less than or Equal to '10' | CIS Oracle Server 19c DB Traditional Auditing v1.2.0 | OracleDB | ACCESS CONTROL |
4.4.2.1.2 Ensure password failed attempts lockout is configured | CIS CentOS Linux 7 v4.0.0 L1 Server | Unix | ACCESS CONTROL |
4.4.2.1.4 Ensure password failed attempts lockout includes root account | CIS Red Hat Enterprise Linux 7 v4.0.0 L2 Workstation | Unix | ACCESS CONTROL |
4.4.3.1.1 Ensure password failed attempts lockout is configured | CIS Red Hat EL8 Server L1 v3.0.0 | Unix | ACCESS CONTROL |
4.4.3.1.1 Ensure password failed attempts lockout is configured | CIS Rocky Linux 8 Server L1 v2.0.0 | Unix | ACCESS CONTROL |
4.4.3.1.2 Ensure password unlock time is configured | CIS Red Hat EL8 Server L1 v3.0.0 | Unix | ACCESS CONTROL |
4.4.3.1.3 Ensure password failed attempts lockout includes root account | CIS Oracle Linux 8 Server L2 v3.0.0 | Unix | ACCESS CONTROL |
4.5 Ensure that Shared Access Signature Tokens Expire Within an Hour | CIS Microsoft Azure Foundations v3.0.0 L1 | microsoft_azure | ACCESS CONTROL |
5.2.1 Ensure Password Account Lockout Threshold Is Configured | CIS Apple macOS 11.0 Big Sur v4.0.0 L1 | Unix | ACCESS CONTROL |
5.2.1 Ensure Password Account Lockout Threshold Is Configured | CIS Apple macOS 12.0 Monterey Cloud-tailored v1.0.0 L1 | Unix | ACCESS CONTROL |
5.2.1 Ensure Password Account Lockout Threshold Is Configured | CIS Apple macOS 12.0 Monterey v4.0.0 L1 | Unix | ACCESS CONTROL |
5.3.2.1.1 Ensure password failed attempts lockout is configured | CIS SUSE Linux Enterprise 15 v2.0.0 L1 Workstation | Unix | ACCESS CONTROL |
5.3.2.2 Ensure pam_faillock module is enabled | CIS Debian Linux 12 v1.1.0 L1 Server | Unix | ACCESS CONTROL |
5.3.2.2 Ensure pam_faillock module is enabled | CIS Ubuntu Linux 22.04 LTS v2.0.0 L1 Server | Unix | ACCESS CONTROL |
5.3.2.2 Ensure pam_faillock module is enabled | CIS Debian Linux 11 v2.0.0 L1 Server | Unix | ACCESS CONTROL |
5.3.2.2 Ensure pam_faillock module is enabled | CIS Debian Linux 11 v2.0.0 L1 Workstation | Unix | ACCESS CONTROL |
5.3.3.1.1 Ensure password failed attempts lockout is configured | CIS AlmaLinux OS 9 v2.0.0 L1 Server | Unix | ACCESS CONTROL |
5.3.3.1.1 Ensure password failed attempts lockout is configured | CIS Ubuntu Linux 24.04 LTS v1.0.0 L1 Server | Unix | ACCESS CONTROL |
5.3.3.1.1 Ensure password failed attempts lockout is configured | CIS Ubuntu Linux 24.04 LTS v1.0.0 L1 Workstation | Unix | ACCESS CONTROL |
5.3.3.1.1 Ensure password failed attempts lockout is configured | CIS Debian Linux 11 v2.0.0 L1 Server | Unix | ACCESS CONTROL |
5.3.3.1.1 Ensure password failed attempts lockout is configured | CIS Oracle Linux 9 v2.0.0 L1 Workstation | Unix | ACCESS CONTROL |
5.3.3.1.1 Ensure password failed attempts lockout is configured | CIS Rocky Linux 9 v2.0.0 L1 Server | Unix | ACCESS CONTROL |
5.3.3.1.1 Ensure password failed attempts lockout is configured | CIS AlmaLinux OS 9 v2.0.0 L1 Workstation | Unix | ACCESS CONTROL |
5.3.3.1.1 Ensure password failed attempts lockout is configured | CIS Debian Linux 11 v2.0.0 L1 Workstation | Unix | ACCESS CONTROL |
5.3.3.1.2 Ensure password unlock time is configured | CIS AlmaLinux OS 9 v2.0.0 L1 Workstation | Unix | ACCESS CONTROL |
5.3.3.1.2 Ensure password unlock time is configured | CIS Ubuntu Linux 22.04 LTS v2.0.0 L1 Server | Unix | ACCESS CONTROL |
5.3.3.1.2 Ensure password unlock time is configured | CIS Debian Linux 11 v2.0.0 L1 Server | Unix | ACCESS CONTROL |
5.3.3.1.2 Ensure password unlock time is configured | CIS Debian Linux 11 v2.0.0 L1 Workstation | Unix | ACCESS CONTROL |
5.3.3.1.3 Ensure password failed attempts lockout includes root account | CIS Red Hat Enterprise Linux 9 v2.0.0 L2 Server | Unix | ACCESS CONTROL |
5.3.3.1.3 Ensure password failed attempts lockout includes root account | CIS Oracle Linux 9 v2.0.0 L2 Workstation | Unix | ACCESS CONTROL |
5.3.3.1.3 Ensure password failed attempts lockout includes root account | CIS Rocky Linux 9 v2.0.0 L2 Server | Unix | ACCESS CONTROL |
5.5.2 Ensure lockout for failed password attempts is configured | CIS CentOS Linux 8 Workstation L1 v2.0.0 | Unix | ACCESS CONTROL |
6.2.15 Ensure all groups in /etc/passwd exist in /etc/group | CIS Debian 8 Server L1 v2.0.2 | Unix | ACCESS CONTROL |
CNTR-K8-000220 - The Kubernetes Controller Manager must create unique service accounts for each work payload. | DISA STIG Kubernetes v2r2 | Unix | ACCESS CONTROL |