1.1.2.1.3 Ensure nosuid option set on /tmp partition | CIS Ubuntu Linux 24.04 LTS v1.0.0 L1 Workstation | Unix | ACCESS CONTROL, MEDIA PROTECTION |
1.1.2.3.3 Ensure nosuid option set on /home partition | CIS Ubuntu Linux 24.04 LTS v1.0.0 L1 Workstation | Unix | ACCESS CONTROL, MEDIA PROTECTION |
1.1.2.4.3 Ensure nosuid option set on /var partition | CIS Ubuntu Linux 24.04 LTS v1.0.0 L1 Workstation | Unix | ACCESS CONTROL, MEDIA PROTECTION |
1.1.2.5.1 Ensure separate partition exists for /var/tmp | CIS Ubuntu Linux 24.04 LTS v1.0.0 L2 Server | Unix | ACCESS CONTROL, MEDIA PROTECTION |
1.1.2.5.3 Ensure nosuid option set on /var/tmp partition | CIS Ubuntu Linux 24.04 LTS v1.0.0 L1 Workstation | Unix | ACCESS CONTROL, MEDIA PROTECTION |
1.1.2.7.2 Ensure nodev option set on /var/log/audit partition | CIS Ubuntu Linux 24.04 LTS v1.0.0 L1 Workstation | Unix | ACCESS CONTROL, MEDIA PROTECTION |
1.1.2.7.4 Ensure noexec option set on /var/log/audit partition | CIS Ubuntu Linux 24.04 LTS v1.0.0 L1 Workstation | Unix | ACCESS CONTROL, MEDIA PROTECTION |
1.1.8 Ensure nodev option set on /var partition | CIS Google Container-Optimized OS L2 Server v1.1.0 | Unix | ACCESS CONTROL, MEDIA PROTECTION |
1.5.1.5 Ensure permissions on /etc/issue are configured | CIS Google Container-Optimized OS L1 Server v1.1.0 | Unix | ACCESS CONTROL, MEDIA PROTECTION |
1.6 Ensure AppArmor is installed | CIS Google Container-Optimized OS L1 Server v1.1.0 | Unix | ACCESS CONTROL, MEDIA PROTECTION |
1.11 Ensure That Separation of Duties Is Enforced While Assigning KMS Related Roles to Users | CIS Google Cloud Platform v3.0.0 L2 | GCP | ACCESS CONTROL, MEDIA PROTECTION |
2.1 Prevent Database Users from Logging into the Operating System | CIS IBM DB2 11 v1.1.0 Database Level 1 | IBM_DB2DB | ACCESS CONTROL, MEDIA PROTECTION |
2.3 (L1) Ensure Managed Object Browser (MOB) is disabled | CIS VMware ESXi 7.0 v1.4.0 L1 | VMware | ACCESS CONTROL, MEDIA PROTECTION |
2.3.1 Ensure NGINX directories and files are owned by root | CIS NGINX Benchmark v2.1.0 L1 Proxy | Unix | ACCESS CONTROL, MEDIA PROTECTION |
2.3.2 Ensure access to NGINX directories and files is restricted | CIS NGINX Benchmark v2.1.0 L1 Proxy | Unix | ACCESS CONTROL, MEDIA PROTECTION |
2.3.2 Ensure access to NGINX directories and files is restricted | CIS NGINX Benchmark v2.1.0 L1 Webserver | Unix | ACCESS CONTROL, MEDIA PROTECTION |
2.3.3 Ensure that public access is not given to RDS Instance | CIS Amazon Web Services Foundations L1 3.0.0 | amazon_aws | ACCESS CONTROL, MEDIA PROTECTION |
2.3.3 Ensure the NGINX process ID (PID) file is secured | CIS NGINX Benchmark v2.1.0 L1 Webserver | Unix | ACCESS CONTROL, MEDIA PROTECTION |
2.15 Ensure 'Access Approval' is 'Enabled' | CIS Google Cloud Platform v3.0.0 L2 | GCP | ACCESS CONTROL, MEDIA PROTECTION |
3.3.2 Secure the Database Container Directory | CIS IBM DB2 11 v1.1.0 Database Level 1 | IBM_DB2DB | ACCESS CONTROL, MEDIA PROTECTION |
4.1.3 Ensure private key permissions are restricted | CIS NGINX Benchmark v2.1.0 L1 Loadbalancer | Unix | ACCESS CONTROL, MEDIA PROTECTION |
4.1.3 Ensure private key permissions are restricted | CIS NGINX Benchmark v2.1.0 L1 Webserver | Unix | ACCESS CONTROL, MEDIA PROTECTION |
4.2.1 Restrict Access to SYSCAT.AUDITPOLICIES | CIS IBM DB2 11 v1.1.0 Database Level 1 | IBM_DB2DB | ACCESS CONTROL, MEDIA PROTECTION |
4.2.6 Restrict Access to SYSCAT.COLUMNS | CIS IBM DB2 11 v1.1.0 Database Level 1 | IBM_DB2DB | ACCESS CONTROL, MEDIA PROTECTION |
4.2.10 Restrict Access to SYSCAT.CONTROLS | CIS IBM DB2 11 v1.1.0 Database Level 1 | IBM_DB2DB | ACCESS CONTROL, MEDIA PROTECTION |
4.2.20 Restrict Access to SYSCAT.ROLEAUTH | CIS IBM DB2 11 v1.1.0 Database Level 1 | IBM_DB2DB | ACCESS CONTROL, MEDIA PROTECTION |
4.2.21 Restrict Access to SYSCAT.ROLES | CIS IBM DB2 11 v1.1.0 Database Level 1 | IBM_DB2DB | ACCESS CONTROL, MEDIA PROTECTION |
4.3.10 Restrict Access to SYSIBM.SYSCONTROLS | CIS IBM DB2 11 v1.1.0 Database Level 1 | IBM_DB2DB | ACCESS CONTROL, MEDIA PROTECTION |
4.3.11 Restrict Access to SYSIBM.SYSDBAUTH | CIS IBM DB2 11 v1.1.0 Database Level 1 | IBM_DB2DB | ACCESS CONTROL, MEDIA PROTECTION |
4.3.19 Restrict Access to SYSIBM.SYSPLAN | CIS IBM DB2 11 v1.1.0 Database Level 1 | IBM_DB2DB | ACCESS CONTROL, MEDIA PROTECTION |
4.3.20 Restrict Access to SYSIBM.SYSROLEAUTH | CIS IBM DB2 11 v1.1.0 Database Level 1 | IBM_DB2DB | ACCESS CONTROL, MEDIA PROTECTION |
5.1.3 Ensure permissions on SSH public host key files are configured | CIS Ubuntu Linux 24.04 LTS v1.0.0 L1 Workstation | Unix | ACCESS CONTROL, MEDIA PROTECTION |
5.3.2.1 Ensure pam_unix module is enabled | CIS Ubuntu Linux 24.04 LTS v1.0.0 L1 Workstation | Unix | ACCESS CONTROL, MEDIA PROTECTION |
5.3.4 Ensure default user umask is 027 or more restrictive - /etc/bash/bashrc | CIS Google Container-Optimized OS L2 Server v1.1.0 | Unix | ACCESS CONTROL, MEDIA PROTECTION |
5.4.2.6 Ensure root user umask is configured | CIS Ubuntu Linux 24.04 LTS v1.0.0 L1 Workstation | Unix | ACCESS CONTROL, MEDIA PROTECTION |
6.1.1.2 Ensure journald log file access is configured | CIS Ubuntu Linux 24.04 LTS v1.0.0 L1 Workstation | Unix | ACCESS CONTROL, MEDIA PROTECTION |
6.1.3 Ensure permissions on /etc/group are configured | CIS Google Container-Optimized OS L1 Server v1.1.0 | Unix | ACCESS CONTROL, MEDIA PROTECTION |
6.1.5 Ensure permissions on /etc/passwd- are configured | CIS Google Container-Optimized OS L2 Server v1.1.0 | Unix | ACCESS CONTROL, MEDIA PROTECTION |
6.1.6 Ensure permissions on /etc/shadow- are configured | CIS Google Container-Optimized OS L2 Server v1.1.0 | Unix | ACCESS CONTROL, MEDIA PROTECTION |
6.2.4.1 Ensure audit log files mode is configured | CIS Ubuntu Linux 24.04 LTS v1.0.0 L2 Server | Unix | ACCESS CONTROL, MEDIA PROTECTION |
6.2.4.3 Ensure audit log files group owner is configured | CIS Ubuntu Linux 24.04 LTS v1.0.0 L2 Workstation | Unix | ACCESS CONTROL, MEDIA PROTECTION |
6.2.4.6 Ensure audit configuration files owner is configured | CIS Ubuntu Linux 24.04 LTS v1.0.0 L2 Workstation | Unix | ACCESS CONTROL, MEDIA PROTECTION |
6.2.4.7 Ensure audit configuration files group owner is configured | CIS Ubuntu Linux 24.04 LTS v1.0.0 L2 Workstation | Unix | ACCESS CONTROL, MEDIA PROTECTION |
6.2.4.8 Ensure audit tools mode is configured | CIS Ubuntu Linux 24.04 LTS v1.0.0 L2 Workstation | Unix | ACCESS CONTROL, MEDIA PROTECTION |
6.2.8 Ensure users' home directories permissions are 750 or more restrictive | CIS Google Container-Optimized OS L2 Server v1.1.0 | Unix | ACCESS CONTROL, MEDIA PROTECTION |
7.1 Ensure application security policies exist when allowing traffic from an untrusted zone to a more trusted zone | CIS Palo Alto Firewall 10 v1.2.0 L1 | Palo_Alto | ACCESS CONTROL, MEDIA PROTECTION |
7.1.5 Ensure permissions on /etc/shadow are configured | CIS Ubuntu Linux 24.04 LTS v1.0.0 L1 Workstation | Unix | ACCESS CONTROL, MEDIA PROTECTION |
7.1.6 Ensure permissions on /etc/shadow- are configured | CIS Ubuntu Linux 24.04 LTS v1.0.0 L1 Server | Unix | ACCESS CONTROL, MEDIA PROTECTION |
7.1.11 Ensure world writable files and directories are secured | CIS Ubuntu Linux 24.04 LTS v1.0.0 L1 Workstation | Unix | ACCESS CONTROL, MEDIA PROTECTION |
7.2 Ensure 'Service setting of ANY' in a security policy allowing traffic does not exist | CIS Palo Alto Firewall 10 v1.2.0 L1 | Palo_Alto | ACCESS CONTROL, MEDIA PROTECTION |