2.8 Ensure an IAM policy that allows admin privileges for all services used is created - Policy Exist | CIS Amazon Web Services Three-tier Web Architecture L1 1.0.0 | amazon_aws | ACCESS CONTROL |
2.8 Ensure an IAM policy that allows admin privileges for all services used is created - Review Policy Document | CIS Amazon Web Services Three-tier Web Architecture L1 1.0.0 | amazon_aws | ACCESS CONTROL |
3.4 Ensure that each role for each MongoDB database is needed and grants only the necessary privileges | CIS MongoDB Database Audit L2 v1.0.0 | MongoDB | ACCESS CONTROL |
3.5 Review User-Defined Roles | CIS MongoDB Database Audit L2 v1.0.0 | MongoDB | ACCESS CONTROL |
3.6 Review Superuser/Admin Roles - clusterAdmin | CIS MongoDB Database Audit L2 v1.0.0 | MongoDB | ACCESS CONTROL |
3.6 Review Superuser/Admin Roles - dbAdminAnyDatabase | CIS MongoDB Database Audit L2 v1.0.0 | MongoDB | ACCESS CONTROL |
3.6 Review Superuser/Admin Roles - dbOwner | CIS MongoDB Database Audit L2 v1.0.0 | MongoDB | ACCESS CONTROL |
3.6 Review Superuser/Admin Roles - hostManager | CIS MongoDB Database Audit L2 v1.0.0 | MongoDB | ACCESS CONTROL |
3.6 Review Superuser/Admin Roles - readWriteAnyDatabase | CIS MongoDB Database Audit L2 v1.0.0 | MongoDB | ACCESS CONTROL |
3.6 Review Superuser/Admin Roles - userAdmin | CIS MongoDB Database Audit L2 v1.0.0 | MongoDB | ACCESS CONTROL |
5.4.2.1 Ensure root is the only UID 0 account | CIS Debian Linux 12 v1.1.0 L1 Workstation | Unix | ACCESS CONTROL |
5.4.2.1 Ensure root is the only UID 0 account | CIS Red Hat Enterprise Linux 9 v2.0.0 L1 Server | Unix | ACCESS CONTROL |
5.4.2.1 Ensure root is the only UID 0 account | CIS Debian Linux 12 v1.1.0 L1 Server | Unix | ACCESS CONTROL |
5.4.2.1 Ensure root is the only UID 0 account | CIS Debian Linux 11 v2.0.0 L1 Server | Unix | ACCESS CONTROL |
5.4.2.1 Ensure root is the only UID 0 account | CIS Ubuntu Linux 22.04 LTS v2.0.0 L1 Server | Unix | ACCESS CONTROL |
5.4.2.1 Ensure root is the only UID 0 account | CIS Ubuntu Linux 24.04 LTS v1.0.0 L1 Workstation | Unix | ACCESS CONTROL |
5.4.2.1 Ensure root is the only UID 0 account | CIS Oracle Linux 9 v2.0.0 L1 Server | Unix | ACCESS CONTROL |
5.4.2.1 Ensure root is the only UID 0 account | CIS Debian Linux 11 v2.0.0 L1 Workstation | Unix | ACCESS CONTROL |
5.4.2.1 Ensure root is the only UID 0 account | CIS Oracle Linux 9 v2.0.0 L1 Workstation | Unix | ACCESS CONTROL |
5.4.2.1 Ensure root is the only UID 0 account | CIS Red Hat Enterprise Linux 9 v2.0.0 L1 Workstation | Unix | ACCESS CONTROL |
5.4.2.1 Ensure root is the only UID 0 account | CIS Rocky Linux 9 v2.0.0 L1 Server | Unix | ACCESS CONTROL |
5.4.2.1 Ensure root is the only UID 0 account | CIS Rocky Linux 9 v2.0.0 L1 Workstation | Unix | ACCESS CONTROL |
5.4.2.1 Ensure root is the only UID 0 account | CIS Ubuntu Linux 24.04 LTS v1.0.0 L1 Server | Unix | ACCESS CONTROL |
6.2.9 Ensure root is the only UID 0 account | CIS Amazon Linux 2 v3.0.0 L1 | Unix | ACCESS CONTROL |
6.2.9 Ensure root is the only UID 0 account | CIS CentOS Linux 7 v4.0.0 L1 Workstation | Unix | ACCESS CONTROL |
6.2.9 Ensure root is the only UID 0 account | CIS AlmaLinux OS 8 Server L1 v3.0.0 | Unix | ACCESS CONTROL |
6.2.9 Ensure root is the only UID 0 account | CIS Red Hat EL8 Server L1 v3.0.0 | Unix | ACCESS CONTROL |
6.2.9 Ensure root is the only UID 0 account | CIS AlmaLinux OS 8 Workstation L1 v3.0.0 | Unix | ACCESS CONTROL |
6.2.9 Ensure root is the only UID 0 account | CIS Rocky Linux 8 Server L1 v2.0.0 | Unix | ACCESS CONTROL |
6.2.9 Ensure root is the only UID 0 account | CIS Rocky Linux 8 Workstation L1 v2.0.0 | Unix | ACCESS CONTROL |
6.2.9 Ensure root is the only UID 0 account | CIS Amazon Linux 2023 Server L1 v1.0.0 | Unix | ACCESS CONTROL |
6.2.9 Ensure root is the only UID 0 account | CIS Red Hat Enterprise Linux 7 v4.0.0 L1 Server | Unix | ACCESS CONTROL |
6.2.9 Ensure root is the only UID 0 account | CIS Red Hat Enterprise Linux 7 v4.0.0 L1 Workstation | Unix | ACCESS CONTROL |
6.2.9 Ensure root is the only UID 0 account | CIS Oracle Linux 8 Server L1 v3.0.0 | Unix | ACCESS CONTROL |
6.2.9 Ensure root is the only UID 0 account | CIS CentOS Linux 7 v4.0.0 L1 Server | Unix | ACCESS CONTROL |
6.2.9 Ensure root is the only UID 0 account | CIS Oracle Linux 7 v4.0.0 L1 Server | Unix | ACCESS CONTROL |
6.2.10 Ensure root is the only UID 0 account | CIS Debian 10 Server L1 v2.0.0 | Unix | ACCESS CONTROL |
6.2.10 Ensure root is the only UID 0 account | CIS Ubuntu Linux 20.04 LTS Workstation L1 v2.0.1 | Unix | ACCESS CONTROL |
6.2.10 Ensure root is the only UID 0 account | CIS Debian 10 Workstation L1 v2.0.0 | Unix | ACCESS CONTROL |
6.34 Ensure RDS Database is configured to use the Data Tier Security Group | CIS Amazon Web Services Three-tier Web Architecture L1 1.0.0 | amazon_aws | ACCESS CONTROL |
ESXi : audit-exception-users | VMWare vSphere 6.0 Hardening Guide | VMware | ACCESS CONTROL |
ESXi : enable-normal-lockdown-mode | VMWare vSphere 6.0 Hardening Guide | VMware | ACCESS CONTROL |
ESXi : enable-normal-lockdown-mode | VMWare vSphere 6.5 Hardening Guide | VMware | ACCESS CONTROL |
ESXi : enable-strict-lockdown-mode | VMWare vSphere 6.5 Hardening Guide | VMware | ACCESS CONTROL |
ESXi : enable-strict-lockdown-mode | VMWare vSphere 6.0 Hardening Guide | VMware | ACCESS CONTROL |
User Account Control: Admin Approval Mode for the Built-in Administrator account | MSCT MSCT Windows Server 2022 DC v1.0.0 | Windows | ACCESS CONTROL |
User Account Control: Admin Approval Mode for the Built-in Administrator account | MSCT Windows Server 2022 v1.0.0 | Windows | ACCESS CONTROL |
User Account Control: Admin Approval Mode for the Built-in Administrator account | MSCT Windows 11 v22H2 v1.0.0 | Windows | ACCESS CONTROL |
User Account Control: Admin Approval Mode for the Built-in Administrator account | MSCT Windows 11 v1.0.0 | Windows | ACCESS CONTROL |
User Account Control: Admin Approval Mode for the Built-in Administrator account | MSCT Windows 10 v22H2 v1.0.0 | Windows | ACCESS CONTROL |