1.4 Use non-default account names | CIS IBM DB2 v10 v1.1.0 Linux OS Level 2 | Unix | ACCESS CONTROL |
1.4 Use non-default account names | CIS IBM DB2 9 Benchmark v3.0.1 Level 1 OS Linux | Unix | ACCESS CONTROL |
1.4 Use non-default account names | CIS IBM DB2 v10 v1.1.0 Windows OS Level 1 | Windows | ACCESS CONTROL |
1.4 Use non-default account names | CIS IBM DB2 9 Benchmark v3.0.1 Level 1 OS Windows | Windows | ACCESS CONTROL |
1.4 Use non-default account names | CIS IBM DB2 v10 v1.1.0 Windows OS Level 2 | Windows | ACCESS CONTROL |
1.6 Ensure Warn users before password expiration is set to 7 days | CIS Check Point Firewall L1 v1.1.0 | CheckPoint | ACCESS CONTROL |
1.7 Ensure Lockout users after password expiration is set to 1 | CIS Check Point Firewall L1 v1.1.0 | CheckPoint | ACCESS CONTROL |
1.8 Ensure Deny access to unused accounts is selected | CIS Check Point Firewall L1 v1.1.0 | CheckPoint | ACCESS CONTROL |
1.9 Ensure Days of non-use before lock-out is set to 30 | CIS Check Point Firewall L1 v1.1.0 | CheckPoint | ACCESS CONTROL |
2.3 Lock the BIND User Account | CIS BIND DNS v3.0.1 Authoritative Name Server | Unix | ACCESS CONTROL |
2.3 Lock the BIND User Account | CIS BIND DNS v1.0.0 L1 Authoritative Name Server | Unix | ACCESS CONTROL |
2.3 Lock the BIND User Account | CIS BIND DNS v3.0.1 Caching Only Name Server | Unix | ACCESS CONTROL |
2.3 Lock the BIND User Account | CIS BIND DNS v1.0.0 L1 Caching Only Name Server | Unix | ACCESS CONTROL |
2.14 Oracle Installation - 'Oracle software owner account name NOT oracle' | CIS v1.1.0 Oracle 11g OS L2 | Unix | ACCESS CONTROL |
4.3 Review Users, Groups, and Roles - Users list | CIS IBM DB2 v10 v1.1.0 Windows OS Level 2 | Windows | ACCESS CONTROL |
4.3 Review Users, Groups, and Roles - Users list | CIS IBM DB2 v10 v1.1.0 Windows OS Level 1 | Windows | ACCESS CONTROL |
5.4.9 Ensure there are no unnecessary accounts | CIS Amazon Linux 2 STIG v1.0.0 L3 | Unix | ACCESS CONTROL |
6.2.20 Ensure shadow group is empty | CIS SUSE Linux Enterprise Server 11 L1 v2.1.1 | Unix | ACCESS CONTROL |
6.2.20 Ensure shadow group is empty | CIS SUSE Linux Enterprise Workstation 11 L1 v2.1.1 | Unix | ACCESS CONTROL |
6.2.20 Ensure shadow group is empty | CIS Ubuntu Linux 14.04 LTS Server L1 v2.1.0 | Unix | ACCESS CONTROL |
6.2.20 Ensure shadow group is empty | CIS Ubuntu Linux 14.04 LTS Workstation L1 v2.1.0 | Unix | ACCESS CONTROL |
9.3 Verify System Account Default Passwords - locked | CIS Solaris 11.2 L1 v1.1.0 | Unix | ACCESS CONTROL |
9.3 Verify System Account Default Passwords - locked | CIS Solaris 11 L1 v1.1.0 | Unix | ACCESS CONTROL |
9.3 Verify System Account Default Passwords - locked | CIS Solaris 11.1 L1 v1.0.0 | Unix | ACCESS CONTROL |
13.20 Ensure shadow group is empty | CIS Debian Linux 7 L1 v1.0.0 | Unix | ACCESS CONTROL |
13.20 Ensure shadow group is empty - No users in the 'Shadow' Group | CIS Ubuntu 12.04 LTS Benchmark L1 v1.1.0 | Unix | ACCESS CONTROL |
13.20 Ensure shadow group is empty - No users with 'Shadow' as their Primary Group | CIS Ubuntu 12.04 LTS Benchmark L1 v1.1.0 | Unix | ACCESS CONTROL |
Disabling the admin account | Tenable F5 BIG-IP Best Practice Audit | F5 | ACCESS CONTROL |
Ensure shadow group is empty | Tenable Cisco Firepower Management Center OS Best Practices Audit | Unix | ACCESS CONTROL |