Item Search

NameAudit NamePluginCategory
1.2.2 Ensure GPG keys are configuredCIS SUSE Linux Enterprise Server 11 L1 v2.0.0Unix

SYSTEM AND INFORMATION INTEGRITY

1.2.2 Ensure GPG keys are configuredCIS SUSE Linux Enterprise Workstation 11 L1 v2.0.0Unix

SYSTEM AND INFORMATION INTEGRITY

1.2.2 Ensure GPG keys are configuredCIS Ubuntu Linux 14.04 LTS Server L1 v2.0.0Unix

SYSTEM AND INFORMATION INTEGRITY

1.2.2 Ensure GPG keys are configuredCIS Ubuntu Linux 14.04 LTS Workstation L1 v2.0.0Unix

SYSTEM AND INFORMATION INTEGRITY

1.3.2 Ensure filesystem integrity is regularly checkedCIS Ubuntu Linux 14.04 LTS Workstation L1 v2.0.0Unix

SYSTEM AND INFORMATION INTEGRITY

1.3.2 Ensure filesystem integrity is regularly checkedCIS SUSE Linux Enterprise Server 11 L1 v2.0.0Unix

SYSTEM AND INFORMATION INTEGRITY

1.3.2 Ensure filesystem integrity is regularly checkedCIS Ubuntu Linux 14.04 LTS Server L1 v2.0.0Unix

SYSTEM AND INFORMATION INTEGRITY

1.4.2 Ensure bootloader password is set - 'passwd_pbkdf2'CIS Ubuntu Linux 14.04 LTS Workstation L1 v2.0.0Unix

SYSTEM AND INFORMATION INTEGRITY

1.4.2 Ensure bootloader password is set - password_pbkdf2CIS SUSE Linux Enterprise Workstation 11 L1 v2.0.0Unix

SYSTEM AND INFORMATION INTEGRITY

1.4.2 Ensure bootloader password is set - superusersCIS SUSE Linux Enterprise Server 11 L1 v2.0.0Unix

SYSTEM AND INFORMATION INTEGRITY

1.4.2 Ensure bootloader password is set - superusersCIS SUSE Linux Enterprise Workstation 11 L1 v2.0.0Unix

SYSTEM AND INFORMATION INTEGRITY

1.6.2.1 Ensure AppArmor is not disabled in bootloader configurationCIS Ubuntu Linux 14.04 LTS Server L2 v2.0.0Unix

SYSTEM AND INFORMATION INTEGRITY

2.1.1 Secure Installation via ISC SourceCIS ISC BIND 9.0/9.5 v2.0.0Unix

SYSTEM AND INFORMATION INTEGRITY

3.3.3 Ensure IPv6 is disabledCIS Ubuntu Linux 14.04 LTS Workstation L1 v2.0.0Unix

SYSTEM AND INFORMATION INTEGRITY

4.1.3 Ensure auditing for processes that start prior to auditd is enabledCIS Amazon Linux v2.0.0 L2Unix

SYSTEM AND INFORMATION INTEGRITY

5.2.4.11 Ensure cryptographic mechanisms are used to protect the integrity of audit toolsCIS Debian 10 Workstation L1 v2.0.0Unix

SYSTEM AND INFORMATION INTEGRITY

5.2.4.11 Ensure cryptographic mechanisms are used to protect the integrity of audit toolsCIS Ubuntu Linux 20.04 LTS Server L1 v2.0.1Unix

SYSTEM AND INFORMATION INTEGRITY

5.2.4.11 Ensure cryptographic mechanisms are used to protect the integrity of audit toolsCIS Ubuntu Linux 20.04 LTS Workstation L1 v2.0.1Unix

SYSTEM AND INFORMATION INTEGRITY

5.2.4.11 Ensure cryptographic mechanisms are used to protect the integrity of audit toolsCIS Debian 10 Server L1 v2.0.0Unix

SYSTEM AND INFORMATION INTEGRITY

5.3.3 Ensure cryptographic mechanisms are used to protect the integrity of audit toolsCIS AlmaLinux OS 8 Server L1 v3.0.0Unix

SYSTEM AND INFORMATION INTEGRITY

5.3.3 Ensure cryptographic mechanisms are used to protect the integrity of audit toolsCIS Red Hat EL8 Server L1 v3.0.0Unix

SYSTEM AND INFORMATION INTEGRITY

5.3.3 Ensure cryptographic mechanisms are used to protect the integrity of audit toolsCIS Rocky Linux 8 Workstation L1 v2.0.0Unix

SYSTEM AND INFORMATION INTEGRITY

6.1.1 Audit system file permissionsCIS Amazon Linux v2.0.0 L2Unix

SYSTEM AND INFORMATION INTEGRITY

6.1.3 Ensure cryptographic mechanisms are used to protect the integrity of audit toolsCIS AlmaLinux OS 9 v2.0.0 L1 WorkstationUnix

SYSTEM AND INFORMATION INTEGRITY

6.1.3 Ensure cryptographic mechanisms are used to protect the integrity of audit toolsCIS Debian Linux 11 v2.0.0 L2 ServerUnix

SYSTEM AND INFORMATION INTEGRITY

6.1.3 Ensure cryptographic mechanisms are used to protect the integrity of audit toolsCIS Red Hat Enterprise Linux 9 v2.0.0 L1 WorkstationUnix

SYSTEM AND INFORMATION INTEGRITY

6.1.3 Ensure cryptographic mechanisms are used to protect the integrity of audit toolsCIS Red Hat Enterprise Linux 9 v2.0.0 L1 ServerUnix

SYSTEM AND INFORMATION INTEGRITY

6.1.3 Ensure cryptographic mechanisms are used to protect the integrity of audit toolsCIS Rocky Linux 9 v2.0.0 L1 WorkstationUnix

SYSTEM AND INFORMATION INTEGRITY

6.1.3 Ensure cryptographic mechanisms are used to protect the integrity of audit toolsCIS Oracle Linux 9 v2.0.0 L1 ServerUnix

SYSTEM AND INFORMATION INTEGRITY

6.3.3 Ensure cryptographic mechanisms are used to protect the integrity of audit toolsCIS Ubuntu Linux 24.04 LTS v1.0.0 L2 ServerUnix

SYSTEM AND INFORMATION INTEGRITY

6.3.3 Ensure cryptographic mechanisms are used to protect the integrity of audit toolsCIS Debian Linux 12 v1.1.0 L2 WorkstationUnix

SYSTEM AND INFORMATION INTEGRITY

6.13 Secure the GRUB Menu - Check if 'lock' command is set after failsafe sectionCIS Solaris 10 v5.2Unix

SYSTEM AND INFORMATION INTEGRITY

6.13 Secure the GRUB Menu - should pass if /boot/grub/menu.lst permissions are OK.CIS Solaris 10 v5.2Unix

SYSTEM AND INFORMATION INTEGRITY

18.4.7 (L1) Ensure 'LSA Protection' is set to 'Enabled'CIS Microsoft Windows Server 2016 v3.0.0 L1 MSWindows

SYSTEM AND INFORMATION INTEGRITY

18.9.25.1 (NG) Ensure 'Configures LSASS to run as a protected process' is set to 'Enabled: Enabled with UEFI Lock'CIS Microsoft Windows Server 2019 STIG v2.0.0 NG MSWindows

SYSTEM AND INFORMATION INTEGRITY

18.9.25.2 Ensure 'Configures LSASS to run as a protected process' is set to 'Enabled: Enabled with UEFI Lock'CIS Microsoft Windows Server 2022 STIG v1.0.0 NG DCWindows

SYSTEM AND INFORMATION INTEGRITY

18.9.25.2 Ensure 'Configures LSASS to run as a protected process' is set to 'Enabled: Enabled with UEFI Lock'CIS Microsoft Windows Server 2022 STIG v1.0.0 NG MSWindows

SYSTEM AND INFORMATION INTEGRITY

Big Sur - Ensure Secure Boot Level Set to FullNIST macOS Big Sur v1.4.0 - All ProfilesUnix

SYSTEM AND INFORMATION INTEGRITY

Catalina - Ensure Secure Boot Level Set to FullNIST macOS Catalina v1.5.0 - 800-53r4 HighUnix

SYSTEM AND INFORMATION INTEGRITY

Catalina - Ensure Secure Boot Level Set to FullNIST macOS Catalina v1.5.0 - All ProfilesUnix

SYSTEM AND INFORMATION INTEGRITY

Check for signatures on downloaded programsMSCT Windows 10 v1903 v1.0.0Windows

SYSTEM AND INFORMATION INTEGRITY

Configures LSASS to run as a protected processMSCT Windows 11 v22H2 v1.0.0Windows

SYSTEM AND INFORMATION INTEGRITY

ESXi : verify-acceptance-level-acceptedVMWare vSphere 6.0 Hardening GuideVMware

SYSTEM AND INFORMATION INTEGRITY

Monterey - Ensure Secure Boot Level Set to FullNIST macOS Monterey v1.0.0 - 800-53r5 HighUnix

SYSTEM AND INFORMATION INTEGRITY

NET0760 - Configuration auto-loading must be disabled - 'service config'DISA STIG Cisco Perimeter Router v8r8Cisco

SYSTEM AND INFORMATION INTEGRITY

Turn On Virtualization Based Security - ConfigureSystemGuardLaunchMSCT Windows Server 1903 MS v1.0.0Windows

SYSTEM AND INFORMATION INTEGRITY

Turn On Virtualization Based Security - EnableVirtualizationBasedSecurityMSCT Windows 10 v1903 v1.0.0Windows

SYSTEM AND INFORMATION INTEGRITY

Turn On Virtualization Based Security - HVCIMATRequiredMSCT Windows Server 1903 DC v1.0.0Windows

SYSTEM AND INFORMATION INTEGRITY

Turn On Virtualization Based Security - RequirePlatformSecurityFeaturesMSCT Windows Server 1903 DC v1.0.0Windows

SYSTEM AND INFORMATION INTEGRITY

Turn On Virtualization Based Security - RequirePlatformSecurityFeaturesMSCT Windows Server 1903 MS v1.0.0Windows

SYSTEM AND INFORMATION INTEGRITY