Item Search

NameAudit NamePluginCategory
1.1.21 Ensure sticky bit is set on all world-writable directoriesCIS SUSE Linux Enterprise Workstation 12 L1 v2.1.0Unix

ACCESS CONTROL

1.3.2 Ensure sudo commands use ptyCIS Ubuntu Linux 18.04 LTS Workstation L1 v2.0.1Unix

ACCESS CONTROL

1.6.1.3 Ensure SELinux policy is configuredCIS Oracle Linux 6 Server L2 v1.1.0Unix

ACCESS CONTROL

1.6.1.3 Ensure SELinux policy is configuredCIS SUSE Linux Enterprise Workstation 12 L2 v2.1.0Unix

ACCESS CONTROL

1.6.1.3 Ensure SELinux policy is configuredCIS Ubuntu Linux 14.04 LTS Server L2 v2.1.0Unix

ACCESS CONTROL

1.6.1.3 Ensure SELinux policy is configured - 'SELINUXTYPE'CIS Ubuntu Linux 14.04 LTS Workstation L2 v2.1.0Unix

ACCESS CONTROL

1.6.2.1 Ensure SELinux is not disabled in bootloader configuration - enforcing=0CIS Distribution Independent Linux Server L2 v2.0.0Unix

ACCESS CONTROL

1.6.2.1 Ensure SELinux is not disabled in bootloader configuration - selinux=0CIS Distribution Independent Linux Workstation L2 v2.0.0Unix

ACCESS CONTROL

1.6.2.2 Ensure all AppArmor Profiles are enforcing - complain modeCIS SUSE Linux Enterprise Server 12 L2 v2.1.0Unix

ACCESS CONTROL

1.6.2.2 Ensure all AppArmor Profiles are enforcing - complain modeCIS SUSE Linux Enterprise Workstation 12 L2 v2.1.0Unix

ACCESS CONTROL

1.6.2.2 Ensure all AppArmor Profiles are enforcing - profiles loadedCIS SUSE Linux Enterprise Server 12 L2 v2.1.0Unix

ACCESS CONTROL

2.2.6 Reduce the Sudo Timeout PeriodCIS Apple OSX 10.5 Leopard L2 v1.0.0Unix

ACCESS CONTROL

2.13.2 - PCM - enhanced RBAC (AIX 6.1 only) - 'Enhanced RBAC is enabled'CIS AIX 5.3/6.1 L2 v1.1.0Unix

ACCESS CONTROL

2.13.2 - PCM - enhanced RBAC (AIX 6.1 only) - 'lskst -t dev info'CIS AIX 5.3/6.1 L2 v1.1.0Unix

ACCESS CONTROL

4.5 Activate AppArmor - '0 processes unconfined'CIS Ubuntu 12.04 LTS Benchmark L2 v1.1.0Unix

ACCESS CONTROL

4.5 Activate AppArmor - GRUB_CMDLINE_LINUX - 0 processes are unconfirmedCIS Debian Linux 7 L2 v1.0.0Unix

ACCESS CONTROL

4.5 Activate AppArmor - GRUB_CMDLINE_LINUX - 0 profiles are in complain modeCIS Debian Linux 7 L2 v1.0.0Unix

ACCESS CONTROL

4.16 init.ora - 'o7_dictionary_accessibility = FALSE'CIS v1.1.0 Oracle 11g OS L2Unix

ACCESS CONTROL

4.16 init.ora - 'o7_dictionary_accessibility = FALSE'CIS v1.1.0 Oracle 11g OS Windows Level 2Windows

ACCESS CONTROL

5. OpenStack Compute - Policy.json - 'os_compute_api:os-migrate-server:migrate_live'TNS OpenStack Nova/Compute Security GuideUnix

ACCESS CONTROL

5.1 Do not disable AppArmor ProfileCIS Docker 1.13.0 v1.0.0 L1 DockerUnix

ACCESS CONTROL

5.2 Verify SELinux security options, if applicableCIS Docker 1.11.0 v1.0.0 L2 DockerUnix

ACCESS CONTROL

5.2 Verify SELinux security options, if applicableCIS Docker 1.13.0 v1.0.0 L2 DockerUnix

ACCESS CONTROL

5.3 Reduce the sudo timeout periodCIS Apple OSX 10.9 L1 v1.3.0Unix

ACCESS CONTROL

5.3 Reduce the sudo timeout periodCIS Apple macOS 10.13 L1 v1.1.0Unix

ACCESS CONTROL

5.4 Use a separate timestamp for each user/tty comboCIS Apple macOS 10.13 L1 v1.0.0Unix

ACCESS CONTROL

20.46 Ensure 'Permissions for program file directories must conform to minimum requirements'CIS Microsoft Windows Server 2016 STIG v2.0.0 STIG MSWindows

ACCESS CONTROL

20.46 Ensure 'Permissions for program file directories must conform to minimum requirements'CIS Microsoft Windows Server 2022 STIG v1.0.0 STIG DCWindows

ACCESS CONTROL

20.46 Ensure 'Permissions for program file directories must conform to minimum requirements'CIS Microsoft Windows Server 2022 STIG v1.0.0 STIG MSWindows

ACCESS CONTROL

20.51 Ensure 'Permissions for the Windows installation directory conform to minimum requirements'CIS Microsoft Windows Server 2016 STIG v2.0.0 STIG DCWindows

ACCESS CONTROL

20.51 Ensure 'Permissions for the Windows installation directory conform to minimum requirements'CIS Microsoft Windows Server 2022 STIG v1.0.0 STIG DCWindows

ACCESS CONTROL

34. OpenStack Compute - Policy.json - 'compute_extension:instance_usage_audit_log'TNS OpenStack Nova/Compute Security GuideUnix

ACCESS CONTROL

40. OpenStack Compute - Policy.json - 'compute_extension:aggregates'TNS OpenStack Nova/Compute Security GuideUnix

ACCESS CONTROL

55. OpenStack Compute - Policy.json - 'compute_extension:flavormanage'TNS OpenStack Nova/Compute Security GuideUnix

ACCESS CONTROL

58. OpenStack Compute - Policy.json - 'compute_extension:fping:all_tenants'TNS OpenStack Nova/Compute Security GuideUnix

ACCESS CONTROL

59. OpenStack Compute - Policy.json - 'compute_extension:os-assisted-volume-snapshots:delete'TNS OpenStack Nova/Compute Security GuideUnix

ACCESS CONTROL

62. OpenStack Compute - Policy.json - 'os_compute_api:os-migrations:index'TNS OpenStack Nova/Compute Security GuideUnix

ACCESS CONTROL

63. OpenStack Compute - Policy.json - 'os_compute_api:os-pause-server:unpause'TNS OpenStack Nova/Compute Security GuideUnix

ACCESS CONTROL

104. OpenStack Compute - Policy.json - 'compute_extension:evacuate'TNS OpenStack Nova/Compute Security GuideUnix

ACCESS CONTROL

110. OpenStack Compute - Policy.json - 'os_compute_api:os-aggregates:show'TNS OpenStack Nova/Compute Security GuideUnix

ACCESS CONTROL

112. OpenStack Compute - Policy.json - 'os_compute_api:server-metadata:update'TNS OpenStack Nova/Compute Security GuideUnix

ACCESS CONTROL

126. OpenStack Compute - Policy.json - 'os_compute_api:os-server-diagnostics'TNS OpenStack Nova/Compute Security GuideUnix

ACCESS CONTROL

130. OpenStack Compute - Policy.json - 'compute_extension:os-server-external-events:create'TNS OpenStack Nova/Compute Security GuideUnix

ACCESS CONTROL

133. OpenStack Compute - Policy.json - 'os_compute_api:os-flavor-access:remove_tenant_access'TNS OpenStack Nova/Compute Security GuideUnix

ACCESS CONTROL

138. OpenStack Compute - Policy.json - 'compute_extension:cells:create'TNS OpenStack Nova/Compute Security GuideUnix

ACCESS CONTROL

140. OpenStack Compute - Policy.json - 'compute_extension:extended_server_attributes'TNS OpenStack Nova/Compute Security GuideUnix

ACCESS CONTROL

146. OpenStack Compute - Policy.json - 'compute:start'TNS OpenStack Nova/Compute Security GuideUnix

ACCESS CONTROL

147. OpenStack Compute - Policy.json - 'compute_extension:flavor_access:addTenantAccess'TNS OpenStack Nova/Compute Security GuideUnix

ACCESS CONTROL

IBM i : Use Adopted Authority (QUSEADPAUT) - AUTH_LIST_NAMEIBM System i Security Reference for V7R2AS/400

ACCESS CONTROL

IBM i : Use Adopted Authority (QUSEADPAUT) - AUTH_LIST_NAMEIBM System i Security Reference for V7R3AS/400

ACCESS CONTROL