2.1 Enable Secure Admin Access - 'telnet.distinct.enable = on' | TNS NetApp Data ONTAP 7G | NetApp | ACCESS CONTROL |
2.13 Ensure 'Enable Site Isolation for every site' is set to 'Enabled' | CIS Google Chrome L1 v2.0.0 | Windows | ACCESS CONTROL |
2.13 Ensure 'Enable Site Isolation for every site' is set to 'Enabled' | CIS Google Chrome L1 v2.1.0 | Windows | ACCESS CONTROL |
5.3 Ensure Linux Kernel Capabilities are restricted within containers | CIS Docker Community Edition v1.1.0 L1 Docker | Unix | ACCESS CONTROL |
5.3 Ensure that Linux kernel capabilities are restricted within containers | CIS Docker v1.2.0 L1 Docker Linux | Unix | ACCESS CONTROL |
5.3 Restrict Linux Kernel Capabilities within containers | CIS Docker 1.12.0 v1.0.0 L1 Docker | Unix | ACCESS CONTROL |
5.3 Restrict Linux Kernel Capabilities within containers | CIS Docker 1.13.0 v1.0.0 L1 Docker | Unix | ACCESS CONTROL |
5.3 Restrict Linux Kernel Capabilities within containers | CIS Docker 1.11.0 v1.0.0 L1 Docker | Unix | ACCESS CONTROL |
5.4 Do not use privileged containers | CIS Docker 1.12.0 v1.0.0 L1 Docker | Unix | ACCESS CONTROL |
5.4 Do not use privileged containers | CIS Docker 1.11.0 v1.0.0 L1 Docker | Unix | ACCESS CONTROL |
5.4 Do not use privileged containers | CIS Docker 1.13.0 v1.0.0 L1 Docker | Unix | ACCESS CONTROL |
5.4 Ensure privileged containers are not used | CIS Docker Community Edition v1.1.0 L1 Docker | Unix | ACCESS CONTROL |
5.4 Ensure that privileged containers are not used | CIS Docker v1.2.0 L1 Docker Linux | Unix | ACCESS CONTROL |
5.4 Restrict Linux Kernel Capabilities within containers | CIS Docker 1.6 v1.0.0 L1 Docker | Unix | ACCESS CONTROL |
5.22 Ensure that docker exec commands are not used with the privileged option | CIS Docker v1.2.0 L2 Docker Linux | Unix | ACCESS CONTROL |
DKER-EE-001960 - Privileged Linux containers must not be used for Docker Enterprise. | DISA STIG Docker Enterprise 2.x Linux/Unix v1r1 | Unix | ACCESS CONTROL |
GEN000000-SOL00620 - The inherit-pkg-dir zone option must be set to none or the system default list defined for sparse root zones. | DISA STIG Solaris 10 X86 v2r2 | Unix | ACCESS CONTROL |
GEN000000-SOL00620 - The inherit-pkg-dir zone option must be set to none or the system default list defined for sparse root zones. | DISA STIG Solaris 10 X86 v2r1 | Unix | ACCESS CONTROL |
GEN000000-SOL00620 - The inherit-pkg-dir zone option must be set to none or the system default list defined for sparse root zones. | DISA STIG Solaris 10 SPARC v2r1 | Unix | ACCESS CONTROL |
GEN000000-SOL00620 - The inherit-pkg-dir zone option must be set to none or the system default list defined for sparse root zones. | DISA STIG Solaris 10 SPARC v2r2 | Unix | ACCESS CONTROL |
GEN000000-SOL00640 - The limitpriv zone option must be set to the vendor default or less permissive. | DISA STIG Solaris 10 SPARC v2r2 | Unix | ACCESS CONTROL |
GEN000000-SOL00640 - The limitpriv zone option must be set to the vendor default or less permissive. | DISA STIG Solaris 10 SPARC v2r1 | Unix | ACCESS CONTROL |
GEN000000-SOL00640 - The limitpriv zone option must be set to the vendor default or less permissive. | DISA STIG Solaris 10 X86 v2r2 | Unix | ACCESS CONTROL |
GEN000000-SOL00640 - The limitpriv zone option must be set to the vendor default or less permissive. | DISA STIG Solaris 10 X86 v2r1 | Unix | ACCESS CONTROL |
GEN000000-SOL00660 - The physical devices must not be assigned to non-global zones. | DISA STIG Solaris 10 X86 v2r2 | Unix | ACCESS CONTROL |
GEN000000-SOL00660 - The physical devices must not be assigned to non-global zones. | DISA STIG Solaris 10 SPARC v2r1 | Unix | ACCESS CONTROL |
GEN000000-SOL00660 - The physical devices must not be assigned to non-global zones. | DISA STIG Solaris 10 X86 v2r1 | Unix | ACCESS CONTROL |
GEN000000-SOL00660 - The physical devices must not be assigned to non-global zones. | DISA STIG Solaris 10 SPARC v2r2 | Unix | ACCESS CONTROL |
IIST-SV-000132 - The IIS 10.0 web server must separate the hosted applications from hosted web server management functionality. | DISA IIS 10.0 Server v2r1 | Windows | ACCESS CONTROL |
IISW-SV-000132 - The IIS 8.5 web server must separate the hosted applications from hosted web server management functionality. | DISA IIS 8.5 Server v1r9 | Windows | ACCESS CONTROL |
IISW-SV-000132 - The IIS 8.5 web server must separate the hosted applications from hosted web server management functionality. | DISA IIS 8.5 Server v2r1 | Windows | ACCESS CONTROL |
JBOS-AS-000355 - The JBoss server must separate hosted application functionality from application server management functionality. | DISA RedHat JBoss EAP 6.3 STIG v1r4 | Unix | ACCESS CONTROL |
JBOS-AS-000355 - The JBoss server must separate hosted application functionality from application server management functionality. | DISA RedHat JBoss EAP 6.3 STIG v2r2 | Unix | ACCESS CONTROL |
SOL-11.1-100020 - The limitpriv zone option must be set to the vendor default or less permissive. | DISA STIG Solaris 11 X86 v2r4 | Unix | ACCESS CONTROL |
SOL-11.1-100020 - The limitpriv zone option must be set to the vendor default or less permissive. | DISA STIG Solaris 11 SPARC v2r4 | Unix | ACCESS CONTROL |
SOL-11.1-100020 - The limitpriv zone option must be set to the vendor default or less permissive. | DISA STIG Solaris 11 SPARC v2r2 | Unix | ACCESS CONTROL |
SOL-11.1-100030 - The systems physical devices must not be assigned to non-global zones. | DISA STIG Solaris 11 X86 v2r4 | Unix | ACCESS CONTROL |
SOL-11.1-100030 - The systems physical devices must not be assigned to non-global zones. | DISA STIG Solaris 11 SPARC v2r2 | Unix | ACCESS CONTROL |
SOL-11.1-100030 - The systems physical devices must not be assigned to non-global zones. | DISA STIG Solaris 11 SPARC v2r4 | Unix | ACCESS CONTROL |
TEM Client Locking - '__LockState value = false' | TNS IBM Tivoli Enterprise Client Linux Best Practices | Unix | ACCESS CONTROL |