Item Search

NameAudit NamePluginCategory
1.1.11 - /etc/security/login.cfg - 'pwd_algorithm = ssha256 (AIX 5.3 TL7+ only)'CIS AIX 5.3/6.1 L2 v1.1.0Unix

IDENTIFICATION AND AUTHENTICATION, SYSTEM AND INFORMATION INTEGRITY

1.2.4 Create 'access-list' for use with 'line vty'CIS Cisco IOS XE 17.x v2.1.0 L1Cisco

ACCESS CONTROL, SYSTEM AND INFORMATION INTEGRITY

1.2.5 Set 'access-class' for 'line vty'CIS Cisco IOS XE 16.x v2.1.0 L1Cisco

ACCESS CONTROL, SYSTEM AND INFORMATION INTEGRITY

1.5.6 Set 'snmp-server enable traps snmp'CIS Cisco IOS XR 7.x v1.0.0 L1Cisco

ACCESS CONTROL, SYSTEM AND INFORMATION INTEGRITY

1.5.8 Set 'snmp-server enable traps snmp'CIS Cisco IOS XE 16.x v2.1.0 L1Cisco

ACCESS CONTROL, SYSTEM AND INFORMATION INTEGRITY

2.8.4.1.1 Ensure 'Block macros from running in Office files from the internet' is set to 'Enabled'CIS Microsoft Office Enterprise v1.2.0 L1Windows

CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY

2.27 Ensure 'Http Allowlist' Is Properly ConfiguredCIS Google Chrome L1 v3.0.0Windows

CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY

3.1 Set a nondeterministic Shutdown command valueCIS Apache Tomcat 10 L1 v1.1.0Unix

CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY

3.1 Set a nondeterministic Shutdown command valueCIS Apache Tomcat 10 L1 v1.1.0 MiddlewareUnix

CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY

4.2 Ensure All Sample Data And Users Have Been RemovedCIS Oracle Server 19c DB Traditional Auditing v1.2.0OracleDB

CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY

4.2 Ensure All Sample Data And Users Have Been RemovedCIS Oracle Server 19c DB Unified Auditing v1.2.0OracleDB

CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY

4.3 Ensure 'Allow invocation of file selection dialogs' is set to 'Disabled'CIS Google Chrome L2 v3.0.0Windows

CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY

4.8.1 TE - implementationCIS IBM AIX 7.2 L2 v1.1.0Unix

SYSTEM AND INFORMATION INTEGRITY

4.12 Ensure all signed artifacts are validatedCIS Docker v1.6.0 L1 Docker LinuxUnix

CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY

5.1 Use secure RealmsCIS Apache Tomcat 10 L2 v1.1.0Unix

CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY

5.1 Use secure RealmsCIS Apache Tomcat 10 L2 v1.1.0 MiddlewareUnix

CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY

5.1.4 Minimize access to create podsCIS RedHat OpenShift Container Platform v1.6.0 L1OpenShift

CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY

5.3.3 Ensure that Content Security Policy (CSP) is enabled and configured properlyCIS NGINX Benchmark v2.1.0 L2 WebserverUnix

CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY

5.15 Ensure the IP Addresses for Listening for Requests Are Specified - 'httpd.conf Listen [::ffff:0.0.0.0]:80 does not exists'CIS Apache HTTP Server 2.4 L2 v2.1.0Unix

CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY

5.15 Ensure the IP Addresses for Listening for Requests Are Specified - 'httpd.conf Listen 0.0.0.0:80 does not exists'CIS Apache HTTP Server 2.4 L2 v2.1.0 MiddlewareUnix

CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY

5.15 Ensure the IP Addresses for Listening for Requests Are Specified - 'httpd.conf Listen 0.0.0.0:80 does not exists'CIS Apache HTTP Server 2.4 L2 v2.1.0Unix

CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY

6.2 Ensure that operating system resource limits are set for MongoDBCIS MongoDB 3.6 L2 Unix Audit v1.1.0Unix

ACCESS CONTROL, SYSTEM AND INFORMATION INTEGRITY

6.2 Ensure that operating system resource limits are set for MongoDBCIS MongoDB 3.6 L2 Windows Audit v1.1.0Windows

ACCESS CONTROL, SYSTEM AND INFORMATION INTEGRITY

6.3 Ensure that server-side scripting is disabled if not neededCIS MongoDB 3.6 L2 Windows Audit v1.1.0Windows

CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY

6.3 Ensure that server-side scripting is disabled if not neededCIS MongoDB 3.6 L2 Unix Audit v1.1.0Unix

CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY

6.3 Ensure that server-side scripting is disabled if not neededCIS MongoDB 7 v1.1.0 L2 MongoDBUnix

CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY

6.3 Ensure that server-side scripting is disabled if not neededCIS MongoDB 7 v1.1.0 L2 MongoDBWindows

CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY

6.3.1 Ensure 'external scripts enabled' database flag for Cloud SQL SQL Server instance is set to 'off'CIS Google Cloud Platform v3.0.0 L1GCP

CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY

7.6 Ensure directory in logging.properties is a secure location - check application log directory is secureCIS Apache Tomcat 10 L1 v1.1.0 MiddlewareUnix

CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY

7.6 Ensure directory in logging.properties is a secure location - check application log directory is secureCIS Apache Tomcat 10 L1 v1.1.0Unix

CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY

7.6 Ensure directory in logging.properties is a secure location - check log directory locationCIS Apache Tomcat 10 L1 v1.1.0Unix

CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY

7.6 Ensure directory in logging.properties is a secure location - check log directory locationCIS Apache Tomcat 10 L1 v1.1.0 MiddlewareUnix

CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY

7.6 Ensure directory in logging.properties is a secure location - check prefix application nameCIS Apache Tomcat 10 L1 v1.1.0Unix

CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY

7.6 Ensure directory in logging.properties is a secure location - check prefix application nameCIS Apache Tomcat 10 L1 v1.1.0 MiddlewareUnix

CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY

10.12 Do not allow symbolic linkingCIS Apache Tomcat 9 L1 v1.2.0 MiddlewareUnix

CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY

10.12 Do not allow symbolic linkingCIS Apache Tomcat 9 L1 v1.2.0Unix

CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY

10.12 Do not allow symbolic linkingCIS Apache Tomcat 10 L1 v1.1.0 MiddlewareUnix

CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY

10.12 Do not allow symbolic linkingCIS Apache Tomcat 10 L1 v1.1.0Unix

CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY

10.14 Do not allow cross context requestsCIS Apache Tomcat 10 L1 v1.1.0Unix

CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY

10.14 Do not allow cross context requestsCIS Apache Tomcat 10 L1 v1.1.0 MiddlewareUnix

CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY

10.14 Do not allow cross context requestsCIS Apache Tomcat 9 L1 v1.2.0 MiddlewareUnix

CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY

10.14 Do not allow cross context requestsCIS Apache Tomcat 9 L1 v1.2.0Unix

CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY

Monterey - Apply Gatekeeper Settings to Block Applications from Unidentified DevelopersNIST macOS Monterey v1.0.0 - 800-53r4 ModerateUnix

CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY

Monterey - Apply Gatekeeper Settings to Block Applications from Unidentified DevelopersNIST macOS Monterey v1.0.0 - All ProfilesUnix

CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY

Monterey - Apply Gatekeeper Settings to Block Applications from Unidentified DevelopersNIST macOS Monterey v1.0.0 - 800-171Unix

CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY

Monterey - Apply Gatekeeper Settings to Block Applications from Unidentified DevelopersNIST macOS Monterey v1.0.0 - CNSSI 1253Unix

CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY

Monterey - Apply Gatekeeper Settings to Block Applications from Unidentified DevelopersNIST macOS Monterey v1.0.0 - 800-53r5 HighUnix

CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY

Monterey - Apply Gatekeeper Settings to Block Applications from Unidentified DevelopersNIST macOS Monterey v1.0.0 - 800-53r5 LowUnix

CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY

Monterey - Apply Gatekeeper Settings to Block Applications from Unidentified DevelopersNIST macOS Monterey v1.0.0 - 800-53r5 ModerateUnix

CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY

Monterey - Apply Gatekeeper Settings to Block Applications from Unidentified DevelopersNIST macOS Monterey v1.0.0 - 800-53r4 HighUnix

CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY