1.1.16 Ensure nosuid option set on /dev/shm partition | CIS SUSE Linux Enterprise Server 11 L1 v2.1.1 | Unix | ACCESS CONTROL, MEDIA PROTECTION |
1.1.19 Ensure nosuid option set on removable media partitions | CIS SUSE Linux Enterprise Workstation 11 L1 v2.1.1 | Unix | ACCESS CONTROL, MEDIA PROTECTION |
1.1.19 Ensure nosuid option set on removable media partitions | CIS SUSE Linux Enterprise Server 11 L1 v2.1.1 | Unix | ACCESS CONTROL, MEDIA PROTECTION |
1.02 Windows Oracle Local Account - 'Use Restricted Service Account (RSA)' | CIS v1.1.0 Oracle 11g OS Windows Level 1 | Windows | ACCESS CONTROL |
1.7.6.5 Allow Information Rights Management: Level I Disabled | CIS MS Office 2007 v1.1.0 L1 | Windows | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
2.2 Ensure extension directory has appropriate ownership and permissions | CIS PostgreSQL 14 OS v 1.2.0 | Unix | ACCESS CONTROL, MEDIA PROTECTION |
2.2.1.2 Ensure chrony is configured - ps chrony | CIS Oracle Linux 8 Server L1 v1.0.0 | Unix | ACCESS CONTROL |
2.2.1.2 Ensure chrony is configured - ps chrony | CIS Oracle Linux 8 Workstation L1 v1.0.0 | Unix | ACCESS CONTROL |
2.2.1.2 Ensure chrony is configured - user | CIS Red Hat EL8 Server L1 v1.0.0 | Unix | ACCESS CONTROL |
2.2.1.2 Ensure chrony is configured - user | CIS Red Hat EL8 Workstation L1 v1.0.0 | Unix | ACCESS CONTROL |
2.2.1.2 Ensure chrony is configured - user | CIS CentOS Linux 8 Workstation L1 v1.0.0 | Unix | ACCESS CONTROL |
2.2.1.2 Ensure chrony is configured - user | CIS CentOS Linux 8 Server L1 v1.0.0 | Unix | ACCESS CONTROL |
2.2.1.3 Ensure chrony is configured | CIS Ubuntu Linux 14.04 LTS Workstation L1 v2.0.0 | Unix | ACCESS CONTROL |
2.2.1.3 Ensure chrony is configured | CIS Ubuntu Linux 14.04 LTS Server L1 v2.0.0 | Unix | ACCESS CONTROL |
2.2.1.3 Ensure chrony is configured | CIS Debian 9 Server L1 v1.0.0 | Unix | ACCESS CONTROL |
2.2.1.3 Ensure chrony is configured | CIS Ubuntu Linux 16.04 LTS Workstation L1 v1.1.0 | Unix | ACCESS CONTROL |
2.2.1.3 Ensure chrony is configured | CIS Debian 9 Workstation L1 v1.0.0 | Unix | ACCESS CONTROL |
2.2.1.3 Ensure chrony is configured | CIS Ubuntu Linux 14.04 LTS Workstation L1 v2.1.0 | Unix | ACCESS CONTROL |
2.2.1.3 Ensure chrony is configured | CIS Ubuntu Linux 16.04 LTS Server L1 v1.1.0 | Unix | ACCESS CONTROL |
2.2.1.3 Ensure chrony is configured | CIS Ubuntu Linux 14.04 LTS Server L1 v2.1.0 | Unix | ACCESS CONTROL |
2.2.1.3 Ensure chrony is configured | CIS Debian 8 Workstation L1 v2.0.1 | Unix | ACCESS CONTROL |
2.2.1.3 Ensure chrony is configured | CIS Debian 8 Server L1 v2.0.1 | Unix | ACCESS CONTROL |
2.2.1.3 Ensure chrony is configured - 'server' | CIS Ubuntu Linux 16.04 LTS Server L1 v1.1.0 | Unix | ACCESS CONTROL |
2.2.1.3 Ensure chrony is configured - 'server' | CIS Ubuntu Linux 16.04 LTS Workstation L1 v1.1.0 | Unix | ACCESS CONTROL |
2.2.1.3 Ensure chrony is configured - server | CIS Ubuntu Linux 18.04 LTS Workstation L1 v2.0.1 | Unix | ACCESS CONTROL |
2.2.1.3 Ensure chrony is configured - server | CIS Ubuntu Linux 18.04 LTS Server L1 v2.0.1 | Unix | ACCESS CONTROL |
2.2.1.3 Ensure chrony is configured - server | CIS Ubuntu Linux 20.04 LTS Workstation L1 v1.0.0 | Unix | ACCESS CONTROL |
2.2.1.3 Ensure chrony is configured - server | CIS Ubuntu Linux 20.04 LTS Server L1 v1.0.0 | Unix | ACCESS CONTROL |
2.2.1.3 Ensure chrony is configured - uid | CIS Ubuntu Linux 18.04 LTS Workstation L1 v2.0.1 | Unix | ACCESS CONTROL |
2.2.1.3 Ensure chrony is configured - uid | CIS Ubuntu Linux 18.04 LTS Server L1 v2.0.1 | Unix | ACCESS CONTROL |
2.2.1.3 Ensure chrony is configured - uid | CIS Ubuntu Linux 20.04 LTS Server L1 v1.0.0 | Unix | ACCESS CONTROL |
2.2.1.3 Ensure chrony is configured - uid | CIS Ubuntu Linux 20.04 LTS Workstation L1 v1.0.0 | Unix | ACCESS CONTROL |
2.2.1.3 Ensure chrony is configured - User | CIS Distribution Independent Linux Server L1 v1.1.0 | Unix | ACCESS CONTROL |
2.2.1.3 Ensure chrony is configured - User | CIS Distribution Independent Linux Workstation L1 v1.1.0 | Unix | ACCESS CONTROL |
2.3.18.4 Ensure 'Never allow users to specify groups when restricting permission for documents' is set to 'Enabled' | CIS Microsoft Office Enterprise v1.1.0 L1 | Windows | ACCESS CONTROL, MEDIA PROTECTION |
2.3.18.5 Ensure 'Prevent users from changing permissions on rights managed content' is set to 'Disabled' | CIS Microsoft Office Enterprise v1.1.0 L1 | Windows | ACCESS CONTROL, MEDIA PROTECTION |
3.5 Application Data with requirement for world writable directories | CIS IBM AIX 7.2 L1 v1.1.0 | Unix | ACCESS CONTROL, MEDIA PROTECTION |
4.05 init.ora - 'remote_os_roles = FALSE' | CIS Oracle 9/10 OS Audit L1 v2.01 | Unix | ACCESS CONTROL |
4.07 init.ora - 'os_authent_prefix = NULL String' | CIS v1.1.0 Oracle 11g OS L1 | Unix | ACCESS CONTROL |
4.09 init.ora - 'os_roles = FALSE' | CIS Oracle 9/10 OS Audit L1 v2.01 | Unix | ACCESS CONTROL |
5.1.3.1 Ensure a dynamic group for guest users is created | CIS Microsoft 365 Foundations E3 L1 v3.1.0 | microsoft_azure | ACCESS CONTROL, MEDIA PROTECTION |
5.1.8 Ensure cron is restricted to authorized users | CIS CentOS Linux 8 Workstation L1 v2.0.0 | Unix | ACCESS CONTROL, MEDIA PROTECTION |
5.1.8 Ensure cron is restricted to authorized users | CIS CentOS Linux 8 Server L1 v2.0.0 | Unix | ACCESS CONTROL, MEDIA PROTECTION |
5.1.9 Ensure at is restricted to authorized users | CIS SUSE Linux Enterprise 15 Workstation L1 v1.1.1 | Unix | ACCESS CONTROL, MEDIA PROTECTION |
5.1.9 Ensure at is restricted to authorized users | CIS CentOS Linux 8 Workstation L1 v2.0.0 | Unix | ACCESS CONTROL, MEDIA PROTECTION |
5.4.2 Ensure system accounts are secured | CIS SUSE Linux Enterprise 15 Server L1 v1.1.1 | Unix | ACCESS CONTROL, MEDIA PROTECTION |
5.6 Ensure access to the su command is restricted - /etc/group | CIS SUSE Linux Enterprise Workstation 11 L1 v2.1.1 | Unix | ACCESS CONTROL, MEDIA PROTECTION |
5.6 Ensure access to the su command is restricted - /etc/pam.d/su | CIS SUSE Linux Enterprise Server 11 L1 v2.1.1 | Unix | ACCESS CONTROL, MEDIA PROTECTION |
6.2.13 Ensure all groups in /etc/passwd exist in /etc/group | CIS SUSE Linux Enterprise 15 Workstation L1 v1.1.1 | Unix | ACCESS CONTROL, MEDIA PROTECTION |
10.2 Allowlist Approved Servers Belonging to a MySQL InnoDB Cluster | CIS MySQL 8.0 Community Database L2 v1.0.0 | MySQLDB | ACCESS CONTROL, MEDIA PROTECTION |