Item Search

NameAudit NamePluginCategory
1.1.3 Ensure nodev option set on /tmp partitionCIS Google Container-Optimized OS v1.2.0 L1 ServerUnix

ACCESS CONTROL, MEDIA PROTECTION

1.1.8 Ensure nodev option set on /var partitionCIS Google Container-Optimized OS v1.2.0 L2 ServerUnix

ACCESS CONTROL, MEDIA PROTECTION

1.1.9 Ensure nodev option set on /home partitionCIS Google Container-Optimized OS v1.2.0 L1 ServerUnix

ACCESS CONTROL, MEDIA PROTECTION

1.6.2 Ensure local login warning banner is configured properlyCIS Debian Linux 11 v2.0.0 L1 WorkstationUnix

ACCESS CONTROL

1.6.3 Ensure remote login warning banner is configured properlyCIS Ubuntu Linux 24.04 LTS v1.0.0 L1 ServerUnix

ACCESS CONTROL

1.6.3 Ensure remote login warning banner is configured properlyCIS Ubuntu Linux 24.04 LTS v1.0.0 L1 WorkstationUnix

ACCESS CONTROL

1.6.3 Ensure remote login warning banner is configured properlyCIS Ubuntu Linux 22.04 LTS v2.0.0 L1 ServerUnix

ACCESS CONTROL

1.6.3 Ensure remote login warning banner is configured properlyCIS Oracle Linux 7 v4.0.0 L1 WorkstationUnix

ACCESS CONTROL

1.7.2 Ensure local login warning banner is configured properlyCIS Rocky Linux 9 v2.0.0 L1 ServerUnix

ACCESS CONTROL

1.7.2 Ensure local login warning banner is configured properlyCIS Red Hat Enterprise Linux 9 v2.0.0 L1 ServerUnix

ACCESS CONTROL

1.7.2 Ensure local login warning banner is configured properlyCIS Red Hat EL8 Workstation L1 v3.0.0Unix

ACCESS CONTROL

1.7.3 Ensure remote login warning banner is configured properlyCIS AlmaLinux OS 9 v2.0.0 L1 WorkstationUnix

ACCESS CONTROL

1.7.3 Ensure remote login warning banner is configured properlyCIS Rocky Linux 9 v2.0.0 L1 ServerUnix

ACCESS CONTROL

1.7.3 Ensure remote login warning banner is configured properlyCIS Red Hat Enterprise Linux 9 v2.0.0 L1 ServerUnix

ACCESS CONTROL

1.7.3 Ensure remote login warning banner is configured properlyCIS Oracle Linux 8 Server L1 v3.0.0Unix

ACCESS CONTROL

1.7.3 Ensure remote login warning banner is configured properlyCIS Red Hat EL8 Workstation L1 v3.0.0Unix

ACCESS CONTROL

18.10.93.4.2 (L1) Ensure 'Select when Preview Builds and Feature Updates are received' is set to 'Enabled: 180 or more days'CIS Microsoft Windows 10 Stand-alone v4.0.0 L1Windows

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

18.10.93.4.2 (L1) Ensure 'Select when Preview Builds and Feature Updates are received' is set to 'Enabled: 180 or more days'CIS Microsoft Windows 10 Stand-alone v4.0.0 L1 BLWindows

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

18.10.93.4.2 (L1) Ensure 'Select when Preview Builds and Feature Updates are received' is set to 'Enabled: 180 or more days'CIS Microsoft Windows Server 2019 v4.0.0 L1 DCWindows

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

APPL-14-001016 The macOS system must configure audit log files to mode 440 or less permissive.DISA Apple macOS 14 (Sonoma) STIG v2r3Unix

AUDIT AND ACCOUNTABILITY

CD12-00-000100 - PostgreSQL must be configured to prohibit or restrict the use of organization-defined functions, ports, protocols, and/or services, as defined in the PPSM CAL and vulnerability assessments.DISA STIG Crunchy Data PostgreSQL DB v3r1PostgreSQLDB

CONFIGURATION MANAGEMENT

CD12-00-011600 - PostgreSQL must automatically terminate a user session after organization-defined conditions or trigger events requiring session disconnect.DISA STIG Crunchy Data PostgreSQL DB v3r1PostgreSQLDB

ACCESS CONTROL

ESXI-80-000035 - The ESXi host must enforce password complexity by configuring a password quality policy.DISA VMware vSphere 8.0 ESXi STIG v2r3VMware

IDENTIFICATION AND AUTHENTICATION

PPS9-00-001200 - The EDB Postgres Advanced Server must generate audit records when privileges/permissions are retrieved.EDB PostgreSQL Advanced Server DB Audit v2r3PostgreSQLDB

AUDIT AND ACCOUNTABILITY

PPS9-00-001800 - The EDB Postgres Advanced Server must produce audit records containing sufficient information to establish where the events occurred.EDB PostgreSQL Advanced Server DB Audit v2r3PostgreSQLDB

AUDIT AND ACCOUNTABILITY

PPS9-00-002100 - The EDB Postgres Advanced Server must produce audit records containing sufficient information to establish the identity of any user/subject or process associated with the event.EDB PostgreSQL Advanced Server DB Audit v2r3PostgreSQLDB

AUDIT AND ACCOUNTABILITY

PPS9-00-002200 - The EDB Postgres Advanced Server must include additional, more detailed, organization-defined information in the audit records for audit events identified by type, location, or subject.EDB PostgreSQL Advanced Server DB Audit v2r3PostgreSQLDB

AUDIT AND ACCOUNTABILITY

PPS9-00-003700 - Default, demonstration and sample databases, database objects, and applications must be removed.EDB PostgreSQL Advanced Server DB Audit v2r3PostgreSQLDB

CONFIGURATION MANAGEMENT

PPS9-00-006400 - The EDB Postgres Advanced Server and associated applications, when making use of dynamic code execution, must scan input data for invalid values that may indicate a code injection attack.EDB PostgreSQL Advanced Server DB Audit v2r3PostgreSQLDB

SYSTEM AND INFORMATION INTEGRITY

PPS9-00-006500 - The EDB Postgres Advanced Server must provide non-privileged users with error messages that provide information necessary for corrective actions without revealing information that could be exploited by adversaries.EDB PostgreSQL Advanced Server DB Audit v2r3PostgreSQLDB

SYSTEM AND INFORMATION INTEGRITY

PPS9-00-007100 - The EDB Postgres Advanced Server must associate organization-defined types of security labels having organization-defined security label values with information in transmission.EDB PostgreSQL Advanced Server DB Audit v2r3PostgreSQLDB

ACCESS CONTROL

PPS9-00-007510 - Execution of software modules (to include stored procedures, functions, and triggers) with elevated privileges must be restricted to necessary cases only.EDB PostgreSQL Advanced Server DB Audit v2r3PostgreSQLDB

ACCESS CONTROL

SLES-12-020650 - The SUSE operating system must generate audit records for all modifications to the tallylog file must generate an audit record.DISA SLES 12 STIG v3r2Unix

AUDIT AND ACCOUNTABILITY, MAINTENANCE

SLES-15-030010 - The SUSE operating system must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/group.DISA SUSE Linux Enterprise Server 15 STIG v2r4Unix

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

SLES-15-030030 - The SUSE operating system must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/security/opasswd.DISA SUSE Linux Enterprise Server 15 STIG v2r4Unix

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

SLES-15-030040 - The SUSE operating system must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/gshadow.DISA SUSE Linux Enterprise Server 15 STIG v2r4Unix

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

SOL-11.1-050240 - The boundary protection system (firewall) must be configured to deny network traffic by default and must allow network traffic by exception (i.e., deny all, permit by exception).DISA STIG Solaris 11 X86 v3r1Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION, MAINTENANCE

UBTU-16-020400 - Successful/unsuccessful uses of the ssh-agent command must generate an audit record.DISA STIG Ubuntu 16.04 LTS v2r3Unix

AUDIT AND ACCOUNTABILITY, MAINTENANCE

UBTU-16-020460 - The audit system must be configured to audit any usage of the setxattr system call - root b32DISA STIG Ubuntu 16.04 LTS v2r3Unix

AUDIT AND ACCOUNTABILITY, MAINTENANCE

UBTU-16-020530 - Successful/unsuccessful uses of the fchown command must generate an audit record - b64DISA STIG Ubuntu 16.04 LTS v2r3Unix

AUDIT AND ACCOUNTABILITY, MAINTENANCE

UBTU-16-020560 - Successful/unsuccessful uses of the chmod command must generate an audit record.DISA STIG Ubuntu 16.04 LTS v2r3Unix

AUDIT AND ACCOUNTABILITY, MAINTENANCE

UBTU-16-020590 - Successful/unsuccessful uses of the open command must generate an audit record - EPERM b64DISA STIG Ubuntu 16.04 LTS v2r3Unix

AUDIT AND ACCOUNTABILITY, MAINTENANCE

UBTU-16-020610 - Successful/unsuccessful uses of the ftruncate command must generate an audit record - EACCES b32DISA STIG Ubuntu 16.04 LTS v2r3Unix

AUDIT AND ACCOUNTABILITY, MAINTENANCE

UBTU-16-020630 - Successful/unsuccessful uses of the openat command must generate an audit record - EACCES b32DISA STIG Ubuntu 16.04 LTS v2r3Unix

AUDIT AND ACCOUNTABILITY, MAINTENANCE

UBTU-16-020640 - Successful/unsuccessful uses of the open_by_handle_at command must generate an audit record - EACCES b64DISA STIG Ubuntu 16.04 LTS v2r3Unix

AUDIT AND ACCOUNTABILITY, MAINTENANCE

UBTU-16-020710 - Successful/unsuccessful uses of the setfacl command must generate an audit record.DISA STIG Ubuntu 16.04 LTS v2r3Unix

AUDIT AND ACCOUNTABILITY, MAINTENANCE

UBTU-16-020790 - Successful/unsuccessful uses of the chage command must generate an audit record.DISA STIG Ubuntu 16.04 LTS v2r3Unix

AUDIT AND ACCOUNTABILITY, MAINTENANCE

UBTU-16-020800 - Successful/unsuccessful uses of the usermod command must generate an audit record.DISA STIG Ubuntu 16.04 LTS v2r3Unix

AUDIT AND ACCOUNTABILITY, MAINTENANCE

UBTU-16-020830 - Successful/unsuccessful uses of the init_module command must generate an audit record - b64DISA STIG Ubuntu 16.04 LTS v2r3Unix

AUDIT AND ACCOUNTABILITY, MAINTENANCE

UBTU-16-020840 - Successful/unsuccessful uses of the finit_module command must generate an audit record - b64DISA STIG Ubuntu 16.04 LTS v2r3Unix

AUDIT AND ACCOUNTABILITY, MAINTENANCE