Item Search

NameAudit NamePluginCategory
2.1.6 Ensure the latest firmware is installedCIS Fortigate 7.0.x v1.3.0 L2FortiGate

SECURITY ASSESSMENT AND AUTHORIZATION, RISK ASSESSMENT

2.4.8 Virtual patching on the local-in management interfaceCIS Fortigate 7.0.x v1.3.0 L1FortiGate

SECURITY ASSESSMENT AND AUTHORIZATION, RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

4.4.1 Ensure custom authselect profile is usedCIS Amazon Linux 2023 Server L1 v1.0.0Unix

SECURITY ASSESSMENT AND AUTHORIZATION, RISK ASSESSMENT

4.4.2.1 Ensure active authselect profile includes pam modulesCIS AlmaLinux OS 8 Server L1 v3.0.0Unix

SECURITY ASSESSMENT AND AUTHORIZATION, RISK ASSESSMENT

4.4.2.1 Ensure active authselect profile includes pam modulesCIS Rocky Linux 8 Workstation L1 v2.0.0Unix

SECURITY ASSESSMENT AND AUTHORIZATION, RISK ASSESSMENT

4.4.2.1 Ensure active authselect profile includes pam modulesCIS Red Hat EL8 Server L1 v3.0.0Unix

SECURITY ASSESSMENT AND AUTHORIZATION, RISK ASSESSMENT

4.4.2.1 Ensure active authselect profile includes pam modulesCIS Rocky Linux 8 Server L1 v2.0.0Unix

SECURITY ASSESSMENT AND AUTHORIZATION, RISK ASSESSMENT

4.4.2.1 Ensure active authselect profile includes pam modulesCIS Red Hat EL8 Workstation L1 v3.0.0Unix

SECURITY ASSESSMENT AND AUTHORIZATION, RISK ASSESSMENT

4.4.2.1 Ensure active authselect profile includes pam modulesCIS Oracle Linux 8 Workstation L1 v3.0.0Unix

SECURITY ASSESSMENT AND AUTHORIZATION, RISK ASSESSMENT

4.4.2.1 Ensure active authselect profile includes pam modulesCIS AlmaLinux OS 8 Workstation L1 v3.0.0Unix

SECURITY ASSESSMENT AND AUTHORIZATION, RISK ASSESSMENT

4.4.2.1 Ensure active authselect profile includes pam modulesCIS Oracle Linux 8 Server L1 v3.0.0Unix

SECURITY ASSESSMENT AND AUTHORIZATION, RISK ASSESSMENT

5.4.1 Ensure custom authselect profile is usedCIS Oracle Linux 9 Workstation L1 v1.0.0Unix

SECURITY ASSESSMENT AND AUTHORIZATION, RISK ASSESSMENT

5.4.1 Ensure custom authselect profile is usedCIS CentOS Linux 8 Server L1 v2.0.0Unix

SECURITY ASSESSMENT AND AUTHORIZATION, RISK ASSESSMENT

5.4.1 Ensure custom authselect profile is usedCIS Fedora 28 Family Linux Workstation L1 v2.0.0Unix

SECURITY ASSESSMENT AND AUTHORIZATION, RISK ASSESSMENT

5.4.1 Ensure custom authselect profile is usedCIS Red Hat EL9 Workstation L1 v1.0.0Unix

SECURITY ASSESSMENT AND AUTHORIZATION, RISK ASSESSMENT

5.4.1 Ensure custom authselect profile is usedCIS Fedora 28 Family Linux Server L1 v2.0.0Unix

SECURITY ASSESSMENT AND AUTHORIZATION, RISK ASSESSMENT

5.4.1 Ensure custom authselect profile is usedCIS AlmaLinux OS 9 Server L1 v1.0.0Unix

SECURITY ASSESSMENT AND AUTHORIZATION, RISK ASSESSMENT

5.4.1 Ensure custom authselect profile is usedCIS Red Hat EL9 Server L1 v1.0.0Unix

SECURITY ASSESSMENT AND AUTHORIZATION, RISK ASSESSMENT

5.4.1 Ensure custom authselect profile is usedCIS Rocky Linux 9 Server L1 v1.0.0Unix

SECURITY ASSESSMENT AND AUTHORIZATION, RISK ASSESSMENT

5.4.1 Ensure custom authselect profile is usedCIS AlmaLinux OS 9 Workstation L1 v1.0.0Unix

SECURITY ASSESSMENT AND AUTHORIZATION, RISK ASSESSMENT

5.4.1 Ensure custom authselect profile is usedCIS Oracle Linux 9 Server L1 v1.0.0Unix

SECURITY ASSESSMENT AND AUTHORIZATION, RISK ASSESSMENT

5.4.1 Ensure custom authselect profile is usedCIS CentOS Linux 8 Workstation L1 v2.0.0Unix

SECURITY ASSESSMENT AND AUTHORIZATION, RISK ASSESSMENT

5.4.1 Ensure custom authselect profile is usedCIS Rocky Linux 9 Workstation L1 v1.0.0Unix

SECURITY ASSESSMENT AND AUTHORIZATION, RISK ASSESSMENT

Design Your ISMS to Protect Your Assets on AWSTenable AWS Best Practice Auditamazon_aws

ACCESS CONTROL, SECURITY ASSESSMENT AND AUTHORIZATION, MEDIA PROTECTION, PHYSICAL AND ENVIRONMENTAL PROTECTION, PROGRAM MANAGEMENT, RISK ASSESSMENT, SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY

Managing Metrics and ImprovementTenable AWS Best Practice Auditamazon_aws

ACCESS CONTROL, AWARENESS AND TRAINING, AUDIT AND ACCOUNTABILITY, SECURITY ASSESSMENT AND AUTHORIZATION, CONFIGURATION MANAGEMENT, CONTINGENCY PLANNING, IDENTIFICATION AND AUTHENTICATION, INCIDENT RESPONSE, MAINTENANCE, MEDIA PROTECTION, PHYSICAL AND ENVIRONMENTAL PROTECTION, PLANNING, PROGRAM MANAGEMENT, PERSONNEL SECURITY, RISK ASSESSMENT, SYSTEM AND SERVICES ACQUISITION, SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY

Mitigating and Protecting Against DoS & DDoS AttacksTenable AWS Best Practice Auditamazon_aws

ACCESS CONTROL, SECURITY ASSESSMENT AND AUTHORIZATION, CONFIGURATION MANAGEMENT, CONTINGENCY PLANNING, PROGRAM MANAGEMENT, RISK ASSESSMENT, SYSTEM AND SERVICES ACQUISITION, SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY

Mitigating Compromise and AbuseTenable AWS Best Practice Auditamazon_aws

ACCESS CONTROL, SECURITY ASSESSMENT AND AUTHORIZATION, CONFIGURATION MANAGEMENT, PROGRAM MANAGEMENT, RISK ASSESSMENT