1.1.21 Ensure sticky bit is set on all world-writable directories | CIS SUSE Linux Enterprise Workstation 12 L1 v2.1.0 | Unix | ACCESS CONTROL |
1.3.2 Ensure sudo commands use pty | CIS Ubuntu Linux 18.04 LTS Workstation L1 v2.0.1 | Unix | ACCESS CONTROL |
1.6.1.3 Ensure SELinux policy is configured | CIS Oracle Linux 6 Server L2 v1.1.0 | Unix | ACCESS CONTROL |
1.6.1.3 Ensure SELinux policy is configured | CIS SUSE Linux Enterprise Workstation 12 L2 v2.1.0 | Unix | ACCESS CONTROL |
1.6.1.3 Ensure SELinux policy is configured | CIS Ubuntu Linux 14.04 LTS Server L2 v2.1.0 | Unix | ACCESS CONTROL |
1.6.1.3 Ensure SELinux policy is configured - 'SELINUXTYPE' | CIS Ubuntu Linux 14.04 LTS Workstation L2 v2.1.0 | Unix | ACCESS CONTROL |
1.6.2.1 Ensure SELinux is not disabled in bootloader configuration - enforcing=0 | CIS Distribution Independent Linux Server L2 v2.0.0 | Unix | ACCESS CONTROL |
1.6.2.1 Ensure SELinux is not disabled in bootloader configuration - selinux=0 | CIS Distribution Independent Linux Workstation L2 v2.0.0 | Unix | ACCESS CONTROL |
1.6.2.2 Ensure all AppArmor Profiles are enforcing - complain mode | CIS SUSE Linux Enterprise Server 12 L2 v2.1.0 | Unix | ACCESS CONTROL |
1.6.2.2 Ensure all AppArmor Profiles are enforcing - complain mode | CIS SUSE Linux Enterprise Workstation 12 L2 v2.1.0 | Unix | ACCESS CONTROL |
1.6.2.2 Ensure all AppArmor Profiles are enforcing - profiles loaded | CIS SUSE Linux Enterprise Server 12 L2 v2.1.0 | Unix | ACCESS CONTROL |
2.2.6 Reduce the Sudo Timeout Period | CIS Apple OSX 10.5 Leopard L2 v1.0.0 | Unix | ACCESS CONTROL |
2.13.2 - PCM - enhanced RBAC (AIX 6.1 only) - 'Enhanced RBAC is enabled' | CIS AIX 5.3/6.1 L2 v1.1.0 | Unix | ACCESS CONTROL |
2.13.2 - PCM - enhanced RBAC (AIX 6.1 only) - 'lskst -t dev info' | CIS AIX 5.3/6.1 L2 v1.1.0 | Unix | ACCESS CONTROL |
4.5 Activate AppArmor - '0 processes unconfined' | CIS Ubuntu 12.04 LTS Benchmark L2 v1.1.0 | Unix | ACCESS CONTROL |
4.5 Activate AppArmor - GRUB_CMDLINE_LINUX - 0 processes are unconfirmed | CIS Debian Linux 7 L2 v1.0.0 | Unix | ACCESS CONTROL |
4.5 Activate AppArmor - GRUB_CMDLINE_LINUX - 0 profiles are in complain mode | CIS Debian Linux 7 L2 v1.0.0 | Unix | ACCESS CONTROL |
4.16 init.ora - 'o7_dictionary_accessibility = FALSE' | CIS v1.1.0 Oracle 11g OS L2 | Unix | ACCESS CONTROL |
4.16 init.ora - 'o7_dictionary_accessibility = FALSE' | CIS v1.1.0 Oracle 11g OS Windows Level 2 | Windows | ACCESS CONTROL |
5. OpenStack Compute - Policy.json - 'os_compute_api:os-migrate-server:migrate_live' | TNS OpenStack Nova/Compute Security Guide | Unix | ACCESS CONTROL |
5.1 Do not disable AppArmor Profile | CIS Docker 1.13.0 v1.0.0 L1 Docker | Unix | ACCESS CONTROL |
5.2 Verify SELinux security options, if applicable | CIS Docker 1.11.0 v1.0.0 L2 Docker | Unix | ACCESS CONTROL |
5.2 Verify SELinux security options, if applicable | CIS Docker 1.13.0 v1.0.0 L2 Docker | Unix | ACCESS CONTROL |
5.3 Reduce the sudo timeout period | CIS Apple OSX 10.9 L1 v1.3.0 | Unix | ACCESS CONTROL |
5.3 Reduce the sudo timeout period | CIS Apple macOS 10.13 L1 v1.1.0 | Unix | ACCESS CONTROL |
5.4 Use a separate timestamp for each user/tty combo | CIS Apple macOS 10.13 L1 v1.0.0 | Unix | ACCESS CONTROL |
20.46 Ensure 'Permissions for program file directories must conform to minimum requirements' | CIS Microsoft Windows Server 2016 STIG v2.0.0 STIG MS | Windows | ACCESS CONTROL |
20.46 Ensure 'Permissions for program file directories must conform to minimum requirements' | CIS Microsoft Windows Server 2022 STIG v1.0.0 STIG DC | Windows | ACCESS CONTROL |
20.46 Ensure 'Permissions for program file directories must conform to minimum requirements' | CIS Microsoft Windows Server 2022 STIG v1.0.0 STIG MS | Windows | ACCESS CONTROL |
20.51 Ensure 'Permissions for the Windows installation directory conform to minimum requirements' | CIS Microsoft Windows Server 2016 STIG v2.0.0 STIG DC | Windows | ACCESS CONTROL |
20.51 Ensure 'Permissions for the Windows installation directory conform to minimum requirements' | CIS Microsoft Windows Server 2022 STIG v1.0.0 STIG DC | Windows | ACCESS CONTROL |
34. OpenStack Compute - Policy.json - 'compute_extension:instance_usage_audit_log' | TNS OpenStack Nova/Compute Security Guide | Unix | ACCESS CONTROL |
40. OpenStack Compute - Policy.json - 'compute_extension:aggregates' | TNS OpenStack Nova/Compute Security Guide | Unix | ACCESS CONTROL |
55. OpenStack Compute - Policy.json - 'compute_extension:flavormanage' | TNS OpenStack Nova/Compute Security Guide | Unix | ACCESS CONTROL |
58. OpenStack Compute - Policy.json - 'compute_extension:fping:all_tenants' | TNS OpenStack Nova/Compute Security Guide | Unix | ACCESS CONTROL |
59. OpenStack Compute - Policy.json - 'compute_extension:os-assisted-volume-snapshots:delete' | TNS OpenStack Nova/Compute Security Guide | Unix | ACCESS CONTROL |
62. OpenStack Compute - Policy.json - 'os_compute_api:os-migrations:index' | TNS OpenStack Nova/Compute Security Guide | Unix | ACCESS CONTROL |
63. OpenStack Compute - Policy.json - 'os_compute_api:os-pause-server:unpause' | TNS OpenStack Nova/Compute Security Guide | Unix | ACCESS CONTROL |
104. OpenStack Compute - Policy.json - 'compute_extension:evacuate' | TNS OpenStack Nova/Compute Security Guide | Unix | ACCESS CONTROL |
110. OpenStack Compute - Policy.json - 'os_compute_api:os-aggregates:show' | TNS OpenStack Nova/Compute Security Guide | Unix | ACCESS CONTROL |
112. OpenStack Compute - Policy.json - 'os_compute_api:server-metadata:update' | TNS OpenStack Nova/Compute Security Guide | Unix | ACCESS CONTROL |
126. OpenStack Compute - Policy.json - 'os_compute_api:os-server-diagnostics' | TNS OpenStack Nova/Compute Security Guide | Unix | ACCESS CONTROL |
130. OpenStack Compute - Policy.json - 'compute_extension:os-server-external-events:create' | TNS OpenStack Nova/Compute Security Guide | Unix | ACCESS CONTROL |
133. OpenStack Compute - Policy.json - 'os_compute_api:os-flavor-access:remove_tenant_access' | TNS OpenStack Nova/Compute Security Guide | Unix | ACCESS CONTROL |
138. OpenStack Compute - Policy.json - 'compute_extension:cells:create' | TNS OpenStack Nova/Compute Security Guide | Unix | ACCESS CONTROL |
140. OpenStack Compute - Policy.json - 'compute_extension:extended_server_attributes' | TNS OpenStack Nova/Compute Security Guide | Unix | ACCESS CONTROL |
146. OpenStack Compute - Policy.json - 'compute:start' | TNS OpenStack Nova/Compute Security Guide | Unix | ACCESS CONTROL |
147. OpenStack Compute - Policy.json - 'compute_extension:flavor_access:addTenantAccess' | TNS OpenStack Nova/Compute Security Guide | Unix | ACCESS CONTROL |
IBM i : Use Adopted Authority (QUSEADPAUT) - AUTH_LIST_NAME | IBM System i Security Reference for V7R2 | AS/400 | ACCESS CONTROL |
IBM i : Use Adopted Authority (QUSEADPAUT) - AUTH_LIST_NAME | IBM System i Security Reference for V7R3 | AS/400 | ACCESS CONTROL |