CSCv6|5

Title

Controlled Use of Administrative Privileges

Description

Controlled Use of Administrative Privileges

Reference Item Details

Category: Controlled Use of Administrative Privileges

Family: System

Audit Items

View all Reference Audit Items

NamePluginAudit Name
1.3.3 Ensure 'Minimum Uppercase Letters' is greater than or equal to 1Palo_AltoCIS Palo Alto Firewall 8 Benchmark L1 v1.0.0
1.3.3 Ensure 'Prevent Password Reuse Limit' is set to 24 or more passwordsPalo_AltoCIS Palo Alto Firewall 7 Benchmark L1 v1.0.0
1.3.4 Ensure 'Minimum Lowercase Letters' is greater than or equal to 1Palo_AltoCIS Palo Alto Firewall 8 Benchmark L1 v1.0.0
1.3.5 Ensure 'Minimum Numeric Letters' is greater than or equal to 1Palo_AltoCIS Palo Alto Firewall 8 Benchmark L1 v1.0.0
1.3.5 Ensure 'Password Profiles' do not existPalo_AltoCIS Palo Alto Firewall 7 Benchmark L1 v1.0.0
1.3.6 Ensure 'Minimum Special Characters' is greater than or equal to 1Palo_AltoCIS Palo Alto Firewall 8 Benchmark L1 v1.0.0
1.3.6 Ensure 'Minimum Uppercase Letters' is greater than or equal to 1Palo_AltoCIS Palo Alto Firewall 7 Benchmark L1 v1.0.0
1.3.7 Ensure 'Minimum Lowercase Letters' is greater than or equal to 1Palo_AltoCIS Palo Alto Firewall 7 Benchmark L1 v1.0.0
1.3.7 Ensure 'Minimum Lowercase Letters' is greater than or equal to 1Palo_AltoCIS Palo Alto Firewall 6 Benchmark L1 v1.0.0
1.3.8 Ensure 'Minimum Numeric Letters' is greater than or equal to 1Palo_AltoCIS Palo Alto Firewall 7 Benchmark L1 v1.0.0
1.3.9 Ensure 'Minimum Special Characters' is greater than or equal to 1Palo_AltoCIS Palo Alto Firewall 7 Benchmark L1 v1.0.0
1.3.9 Ensure 'Prevent Password Reuse Limit' is set to 24 or more passwordsPalo_AltoCIS Palo Alto Firewall 8 Benchmark L1 v1.0.0
1.3.10 Ensure 'Password Profiles' do not existPalo_AltoCIS Palo Alto Firewall 8 Benchmark L1 v1.0.0
1.6.8 Place compensating controls in the form of PSP and RBAC for privileged containers usage - clusterrolebindingUnixCIS Kubernetes 1.13 Benchmark v1.4.1 L2
1.6.8 Place compensating controls in the form of PSP and RBAC for privileged containers usage - clusterrolebindingUnixCIS Kubernetes 1.11 Benchmark v1.3.0 L2
1.6.8 Place compensating controls in the form of PSP and RBAC for privileged containers usage - pspUnixCIS Kubernetes 1.13 Benchmark v1.4.1 L2
1.6.8 Place compensating controls in the form of PSP and RBAC for privileged containers usage - pspUnixCIS Kubernetes 1.11 Benchmark v1.3.0 L2
1.6.8 Place compensating controls in the form of PSP and RBAC for privileged containers usage - rolebindingUnixCIS Kubernetes 1.11 Benchmark v1.3.0 L2
1.6.8 Place compensating controls in the form of PSP and RBAC for privileged containers usage - rolebindingUnixCIS Kubernetes 1.13 Benchmark v1.4.1 L2
1.6.9 Place compensating controls in the form of PSP and RBAC for privileged containers usage - clusterrolebindingUnixCIS Kubernetes 1.8 Benchmark v1.2.0 L2
1.6.9 Place compensating controls in the form of PSP and RBAC for privileged containers usage - pspUnixCIS Kubernetes 1.8 Benchmark v1.2.0 L2
1.6.9 Place compensating controls in the form of PSP and RBAC for privileged containers usage - rolebindingUnixCIS Kubernetes 1.8 Benchmark v1.2.0 L2
1.9 Ensure 'Developer Options' is set to 'Disabled'MDMMobileIron - CIS Google Android v1.3.0 L1
1.9 Ensure 'Developer Options' is set to 'Disabled'MDMAirWatch - CIS Google Android v1.3.0 L1
1.11 Do not root your deviceMDMMobileIron - CIS Google Android v1.3.0 L1
1.11 Do not root your deviceMDMAirWatch - CIS Google Android v1.3.0 L1
3.5 Ensure the Group Is Set Correctly on Apache Directories and FilesUnixCIS Apache HTTP Server 2.2 L1 v3.6.0 Middleware
3.5 Ensure the Group Is Set Correctly on Apache Directories and FilesUnixCIS Apache HTTP Server 2.2 L1 v3.6.0
3.5 Ensure the Group Is Set Correctly on Apache Directories and FilesUnixCIS Apache HTTP Server 2.2 L2 v3.6.0
5.4.3 Ensure default group for the root account is GID 0UnixCIS Debian 8 Workstation L1 v2.0.2
5.4.3 Ensure default group for the root account is GID 0UnixCIS Distribution Independent Linux Server L1 v2.0.0
5.4.3 Ensure default group for the root account is GID 0UnixCIS Ubuntu Linux 18.04 LXD Host L1 Workstation v1.0.0
5.4.3 Ensure default group for the root account is GID 0UnixCIS Ubuntu Linux 14.04 LTS Workstation L1 v2.1.0
5.4.3 Ensure default group for the root account is GID 0UnixCIS Distribution Independent Linux Workstation L1 v2.0.0
5.4.3 Ensure default group for the root account is GID 0UnixCIS Debian 8 Server L1 v2.0.2
5.4.3 Ensure default group for the root account is GID 0UnixCIS Ubuntu Linux 18.04 LXD Container L1 v1.0.0
5.4.3 Ensure default group for the root account is GID 0UnixCIS Ubuntu Linux 18.04 LXD Host L1 Server v1.0.0
5.4.3 Ensure default group for the root account is GID 0UnixCIS Ubuntu Linux 14.04 LTS Server L1 v2.1.0
5.4.3 Ensure default group for the root account is GID 0UnixCIS Amazon Linux v2.1.0 L1
5.5.3 Ensure default group for the root account is GID 0UnixCIS CentOS 6 Server L1 v3.0.0
5.5.3 Ensure default group for the root account is GID 0UnixCIS Oracle Linux 6 Workstation L1 v2.0.0
5.5.3 Ensure default group for the root account is GID 0UnixCIS Red Hat 6 Server L1 v3.0.0
5.5.3 Ensure default group for the root account is GID 0UnixCIS CentOS 6 Workstation L1 v3.0.0
5.5.3 Ensure default group for the root account is GID 0UnixCIS Oracle Linux 6 Server L1 v2.0.0
5.5.3 Ensure default group for the root account is GID 0UnixCIS Red Hat 6 Workstation L1 v3.0.0
5.23 Ensure docker exec commands are not used with user optionUnixCIS Docker Community Edition v1.1.0 L2 Docker
Do not display network selection UIWindowsMSCT Windows Server 2016 MS v1.0.0
Do not display network selection UIWindowsMSCT Windows Server 2012 R2 DC v1.0.0
Do not display network selection UIWindowsMSCT Windows Server 2016 DC v1.0.0
Do not display network selection UIWindowsMSCT Windows 10 v1507 v1.0.0