2.1.6 Ensure the latest firmware is installed | CIS Fortigate 7.0.x v1.3.0 L2 | FortiGate | SECURITY ASSESSMENT AND AUTHORIZATION, RISK ASSESSMENT |
2.4.8 Virtual patching on the local-in management interface | CIS Fortigate 7.0.x v1.3.0 L1 | FortiGate | SECURITY ASSESSMENT AND AUTHORIZATION, RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY |
4.4.1 Ensure custom authselect profile is used | CIS Amazon Linux 2023 Server L1 v1.0.0 | Unix | SECURITY ASSESSMENT AND AUTHORIZATION, RISK ASSESSMENT |
4.4.2.1 Ensure active authselect profile includes pam modules | CIS Oracle Linux 8 Workstation L1 v3.0.0 | Unix | SECURITY ASSESSMENT AND AUTHORIZATION, RISK ASSESSMENT |
4.4.2.1 Ensure active authselect profile includes pam modules | CIS Rocky Linux 8 Server L1 v2.0.0 | Unix | SECURITY ASSESSMENT AND AUTHORIZATION, RISK ASSESSMENT |
4.4.2.1 Ensure active authselect profile includes pam modules | CIS Red Hat EL8 Workstation L1 v3.0.0 | Unix | SECURITY ASSESSMENT AND AUTHORIZATION, RISK ASSESSMENT |
4.4.2.1 Ensure active authselect profile includes pam modules | CIS AlmaLinux OS 8 Server L1 v3.0.0 | Unix | SECURITY ASSESSMENT AND AUTHORIZATION, RISK ASSESSMENT |
4.4.2.1 Ensure active authselect profile includes pam modules | CIS Red Hat EL8 Server L1 v3.0.0 | Unix | SECURITY ASSESSMENT AND AUTHORIZATION, RISK ASSESSMENT |
4.4.2.1 Ensure active authselect profile includes pam modules | CIS Rocky Linux 8 Workstation L1 v2.0.0 | Unix | SECURITY ASSESSMENT AND AUTHORIZATION, RISK ASSESSMENT |
4.4.2.1 Ensure active authselect profile includes pam modules | CIS AlmaLinux OS 8 Workstation L1 v3.0.0 | Unix | SECURITY ASSESSMENT AND AUTHORIZATION, RISK ASSESSMENT |
4.4.2.1 Ensure active authselect profile includes pam modules | CIS Oracle Linux 8 Server L1 v3.0.0 | Unix | SECURITY ASSESSMENT AND AUTHORIZATION, RISK ASSESSMENT |
5.3.2.1 Ensure active authselect profile includes pam modules | CIS AlmaLinux OS 9 v2.0.0 L1 Server | Unix | SECURITY ASSESSMENT AND AUTHORIZATION, RISK ASSESSMENT |
5.3.2.1 Ensure active authselect profile includes pam modules | CIS Red Hat Enterprise Linux 9 v2.0.0 L1 Workstation | Unix | SECURITY ASSESSMENT AND AUTHORIZATION, RISK ASSESSMENT |
5.3.2.1 Ensure active authselect profile includes pam modules | CIS Rocky Linux 9 v2.0.0 L1 Workstation | Unix | SECURITY ASSESSMENT AND AUTHORIZATION, RISK ASSESSMENT |
5.3.2.1 Ensure active authselect profile includes pam modules | CIS AlmaLinux OS 9 v2.0.0 L1 Workstation | Unix | SECURITY ASSESSMENT AND AUTHORIZATION, RISK ASSESSMENT |
5.3.2.1 Ensure active authselect profile includes pam modules | CIS Oracle Linux 9 v2.0.0 L1 Server | Unix | SECURITY ASSESSMENT AND AUTHORIZATION, RISK ASSESSMENT |
5.3.2.1 Ensure active authselect profile includes pam modules | CIS Rocky Linux 9 v2.0.0 L1 Server | Unix | SECURITY ASSESSMENT AND AUTHORIZATION, RISK ASSESSMENT |
5.3.2.1 Ensure active authselect profile includes pam modules | CIS Red Hat Enterprise Linux 9 v2.0.0 L1 Server | Unix | SECURITY ASSESSMENT AND AUTHORIZATION, RISK ASSESSMENT |
5.3.2.1 Ensure active authselect profile includes pam modules | CIS Oracle Linux 9 v2.0.0 L1 Workstation | Unix | SECURITY ASSESSMENT AND AUTHORIZATION, RISK ASSESSMENT |
5.4.1 Ensure custom authselect profile is used | CIS Fedora 28 Family Linux Workstation L1 v2.0.0 | Unix | SECURITY ASSESSMENT AND AUTHORIZATION, RISK ASSESSMENT |
5.4.1 Ensure custom authselect profile is used | CIS Fedora 28 Family Linux Server L1 v2.0.0 | Unix | SECURITY ASSESSMENT AND AUTHORIZATION, RISK ASSESSMENT |
5.4.1 Ensure custom authselect profile is used | CIS CentOS Linux 8 Server L1 v2.0.0 | Unix | SECURITY ASSESSMENT AND AUTHORIZATION, RISK ASSESSMENT |
5.4.1 Ensure custom authselect profile is used | CIS CentOS Linux 8 Workstation L1 v2.0.0 | Unix | SECURITY ASSESSMENT AND AUTHORIZATION, RISK ASSESSMENT |