Name | Audit Name | Plugin | Category |
---|---|---|---|
2.1.6 Ensure the latest firmware is installed | CIS Fortigate 7.0.x v1.3.0 L2 | FortiGate | SECURITY ASSESSMENT AND AUTHORIZATION, RISK ASSESSMENT |
2.4.8 Virtual patching on the local-in management interface | CIS Fortigate 7.0.x v1.3.0 L1 | FortiGate | SECURITY ASSESSMENT AND AUTHORIZATION, RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY |
4.4.1 Ensure custom authselect profile is used | CIS Amazon Linux 2023 Server L1 v1.0.0 | Unix | SECURITY ASSESSMENT AND AUTHORIZATION, RISK ASSESSMENT |
4.4.2.1 Ensure active authselect profile includes pam modules | CIS AlmaLinux OS 8 Server L1 v3.0.0 | Unix | SECURITY ASSESSMENT AND AUTHORIZATION, RISK ASSESSMENT |
4.4.2.1 Ensure active authselect profile includes pam modules | CIS Rocky Linux 8 Workstation L1 v2.0.0 | Unix | SECURITY ASSESSMENT AND AUTHORIZATION, RISK ASSESSMENT |
4.4.2.1 Ensure active authselect profile includes pam modules | CIS Red Hat EL8 Server L1 v3.0.0 | Unix | SECURITY ASSESSMENT AND AUTHORIZATION, RISK ASSESSMENT |
4.4.2.1 Ensure active authselect profile includes pam modules | CIS Rocky Linux 8 Server L1 v2.0.0 | Unix | SECURITY ASSESSMENT AND AUTHORIZATION, RISK ASSESSMENT |
4.4.2.1 Ensure active authselect profile includes pam modules | CIS Red Hat EL8 Workstation L1 v3.0.0 | Unix | SECURITY ASSESSMENT AND AUTHORIZATION, RISK ASSESSMENT |
4.4.2.1 Ensure active authselect profile includes pam modules | CIS Oracle Linux 8 Workstation L1 v3.0.0 | Unix | SECURITY ASSESSMENT AND AUTHORIZATION, RISK ASSESSMENT |
4.4.2.1 Ensure active authselect profile includes pam modules | CIS AlmaLinux OS 8 Workstation L1 v3.0.0 | Unix | SECURITY ASSESSMENT AND AUTHORIZATION, RISK ASSESSMENT |
4.4.2.1 Ensure active authselect profile includes pam modules | CIS Oracle Linux 8 Server L1 v3.0.0 | Unix | SECURITY ASSESSMENT AND AUTHORIZATION, RISK ASSESSMENT |
5.4.1 Ensure custom authselect profile is used | CIS Oracle Linux 9 Workstation L1 v1.0.0 | Unix | SECURITY ASSESSMENT AND AUTHORIZATION, RISK ASSESSMENT |
5.4.1 Ensure custom authselect profile is used | CIS CentOS Linux 8 Server L1 v2.0.0 | Unix | SECURITY ASSESSMENT AND AUTHORIZATION, RISK ASSESSMENT |
5.4.1 Ensure custom authselect profile is used | CIS Fedora 28 Family Linux Workstation L1 v2.0.0 | Unix | SECURITY ASSESSMENT AND AUTHORIZATION, RISK ASSESSMENT |
5.4.1 Ensure custom authselect profile is used | CIS Red Hat EL9 Workstation L1 v1.0.0 | Unix | SECURITY ASSESSMENT AND AUTHORIZATION, RISK ASSESSMENT |
5.4.1 Ensure custom authselect profile is used | CIS Fedora 28 Family Linux Server L1 v2.0.0 | Unix | SECURITY ASSESSMENT AND AUTHORIZATION, RISK ASSESSMENT |
5.4.1 Ensure custom authselect profile is used | CIS AlmaLinux OS 9 Server L1 v1.0.0 | Unix | SECURITY ASSESSMENT AND AUTHORIZATION, RISK ASSESSMENT |
5.4.1 Ensure custom authselect profile is used | CIS Red Hat EL9 Server L1 v1.0.0 | Unix | SECURITY ASSESSMENT AND AUTHORIZATION, RISK ASSESSMENT |
5.4.1 Ensure custom authselect profile is used | CIS Rocky Linux 9 Server L1 v1.0.0 | Unix | SECURITY ASSESSMENT AND AUTHORIZATION, RISK ASSESSMENT |
5.4.1 Ensure custom authselect profile is used | CIS AlmaLinux OS 9 Workstation L1 v1.0.0 | Unix | SECURITY ASSESSMENT AND AUTHORIZATION, RISK ASSESSMENT |
5.4.1 Ensure custom authselect profile is used | CIS Oracle Linux 9 Server L1 v1.0.0 | Unix | SECURITY ASSESSMENT AND AUTHORIZATION, RISK ASSESSMENT |
5.4.1 Ensure custom authselect profile is used | CIS CentOS Linux 8 Workstation L1 v2.0.0 | Unix | SECURITY ASSESSMENT AND AUTHORIZATION, RISK ASSESSMENT |
5.4.1 Ensure custom authselect profile is used | CIS Rocky Linux 9 Workstation L1 v1.0.0 | Unix | SECURITY ASSESSMENT AND AUTHORIZATION, RISK ASSESSMENT |
Design Your ISMS to Protect Your Assets on AWS | Tenable AWS Best Practice Audit | amazon_aws | ACCESS CONTROL, SECURITY ASSESSMENT AND AUTHORIZATION, MEDIA PROTECTION, PHYSICAL AND ENVIRONMENTAL PROTECTION, PROGRAM MANAGEMENT, RISK ASSESSMENT, SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY |
Managing Metrics and Improvement | Tenable AWS Best Practice Audit | amazon_aws | ACCESS CONTROL, AWARENESS AND TRAINING, AUDIT AND ACCOUNTABILITY, SECURITY ASSESSMENT AND AUTHORIZATION, CONFIGURATION MANAGEMENT, CONTINGENCY PLANNING, IDENTIFICATION AND AUTHENTICATION, INCIDENT RESPONSE, MAINTENANCE, MEDIA PROTECTION, PHYSICAL AND ENVIRONMENTAL PROTECTION, PLANNING, PROGRAM MANAGEMENT, PERSONNEL SECURITY, RISK ASSESSMENT, SYSTEM AND SERVICES ACQUISITION, SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY |
Mitigating and Protecting Against DoS & DDoS Attacks | Tenable AWS Best Practice Audit | amazon_aws | ACCESS CONTROL, SECURITY ASSESSMENT AND AUTHORIZATION, CONFIGURATION MANAGEMENT, CONTINGENCY PLANNING, PROGRAM MANAGEMENT, RISK ASSESSMENT, SYSTEM AND SERVICES ACQUISITION, SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY |
Mitigating Compromise and Abuse | Tenable AWS Best Practice Audit | amazon_aws | ACCESS CONTROL, SECURITY ASSESSMENT AND AUTHORIZATION, CONFIGURATION MANAGEMENT, PROGRAM MANAGEMENT, RISK ASSESSMENT |