Item Search

NameAudit NamePluginCategory
1.1.16 Ensure separate partition exists for /var/log/auditCIS Amazon Linux 2 STIG v2.0.0 L2 ServerUnix

AUDIT AND ACCOUNTABILITY

1.4 SNMP Security - a) SNMP Community SecurityTenable ZTE ROSNGZTE_ROSNG

IDENTIFICATION AND AUTHENTICATION

1.5.3 Ensure address space layout randomization (ASLR) is enabled - /etc/sysctlCIS SUSE Linux Enterprise Workstation 11 L1 v2.1.1Unix

SYSTEM AND INFORMATION INTEGRITY

1.5.3 Ensure address space layout randomization (ASLR) is enabled - configCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIGUnix

CONFIGURATION MANAGEMENT

1.5.3 Ensure address space layout randomization (ASLR) is enabled - sysctl.conf sysctl.dCIS Red Hat Enterprise Linux 7 STIG v2.0.0 L1 ServerUnix

SYSTEM AND INFORMATION INTEGRITY

1.5.3 Ensure address space layout randomization (ASLR) is enabled (sysctl.conf/sysctl.d)CIS Ubuntu Linux 14.04 LTS Workstation L1 v2.1.0Unix

SYSTEM AND INFORMATION INTEGRITY

1.6 Creating the database with the RESTERICTIVE clauseCIS IBM DB2 v10 v1.1.0 Database Level 2IBM_DB2DB
1.6.1.5 Ensure the SELinux mode is enforcingCIS Amazon Linux 2 STIG v2.0.0 L2 ServerUnix

ACCESS CONTROL, MEDIA PROTECTION

1.6.2 Ensure address space layout randomization (ASLR) is enabled - configCIS Ubuntu Linux 18.04 LXD Host L1 Workstation v1.0.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY

1.6.3 Ensure address space layout randomization (ASLR) is enabled - sysctlCIS Fedora 19 Family Linux Server L1 v1.0.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY

3.2.3 Authentication type for incoming connections at the server - srvcon_authCIS IBM DB2 v10 v1.1.0 Database Level 2IBM_DB2DB
4.1.3.4 Ensure events that modify the system's Mandatory Access Controls are collectedCIS Amazon Linux 2 STIG v2.0.0 L2 ServerUnix

AUDIT AND ACCOUNTABILITY

4.1.3.12 Ensure discretionary access control permission modification events are collectedCIS Amazon Linux 2 STIG v2.0.0 L2 ServerUnix

AUDIT AND ACCOUNTABILITY

4.1.3.14 Ensure events that modify user/group information are collectedCIS Amazon Linux 2 STIG v2.0.0 L2 ServerUnix

AUDIT AND ACCOUNTABILITY

5.3.23 Ensure SSH AllowTcpForwarding is disabledCIS Amazon Linux 2 STIG v2.0.0 L2 ServerUnix

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

6.1 Restrict Access to SYSCAT.AUDITPOLICIESCIS IBM DB2 v10 v1.1.0 Database Level 2IBM_DB2DB

ACCESS CONTROL

6.3 Restrict Access to SYSCAT.DBAUTHCIS IBM DB2 v10 v1.1.0 Database Level 2IBM_DB2DB

ACCESS CONTROL

6.13 Restrict Access to SYSCAT.SECURITYPOLICYEXEMPTIONSCIS IBM DB2 v10 v1.1.0 Database Level 2IBM_DB2DB

ACCESS CONTROL

6.18 Restrict Access to SYSCAT.SCHEMAAUTHCIS IBM DB2 v10 v1.1.0 Database Level 2IBM_DB2DB

ACCESS CONTROL

6.21 Restrict Access to SYSCAT.STATEMENTSCIS IBM DB2 v10 v1.1.0 Database Level 2IBM_DB2DB

ACCESS CONTROL

7.9 Secure ACCESSCTRL AuthorityCIS IBM DB2 v10 v1.1.0 Database Level 2IBM_DB2DB
7.10 Secure WLMADM authorityCIS IBM DB2 v10 v1.1.0 Database Level 2IBM_DB2DB
7.13 Secure CONNECT AuthorityCIS IBM DB2 v10 v1.1.0 Database Level 2IBM_DB2DB
8.2.6 Create a Strong PasswordCIS IBM DB2 11 v1.1.0 Database Level 2IBM_DB2DB

IDENTIFICATION AND AUTHENTICATION

8.2.7 Backup Your KeystoreCIS IBM DB2 11 v1.1.0 Database Level 2IBM_DB2DB

CONTINGENCY PLANNING

8.2.8 Backup Your Password In Case Stash File is Inaccessible or CorruptedCIS IBM DB2 11 v1.1.0 Database Level 2IBM_DB2DB

CONTINGENCY PLANNING

8.2.14 Key Rotation in HADR EnvironmentCIS IBM DB2 11 v1.1.0 Database Level 2IBM_DB2DB

CONFIGURATION MANAGEMENT

9.3 Review System TablespacesCIS IBM DB2 v10 v1.1.0 Database Level 2IBM_DB2DB

CONFIGURATION MANAGEMENT

18.8.7.1.5 (BL) Ensure 'Prevent installation of devices using drivers that match these device setup classes: Prevent installation of devices using drivers for these device setup' is set to 'IEEE 1394 device setup classes'CIS Microsoft Windows 8.1 v2.4.1 L1 BitlockerWindows

MEDIA PROTECTION, SYSTEM AND COMMUNICATIONS PROTECTION

18.9.7.1.2 (BL) Ensure 'Prevent installation of devices using drivers that match these device setup classes: Prevent installation of devices using drivers for these device setup' is set to 'IEEE 1394 device setup classes'CIS Microsoft Windows 11 Enterprise v4.0.0 L1 BitLockerWindows

SYSTEM AND INFORMATION INTEGRITY

18.9.7.1.5 (BL) Ensure 'Prevent installation of devices using drivers that match these device setup classes: Prevent installation of devices using drivers for these device setup' is set to 'IEEE 1394 device setup classes'CIS Microsoft Windows 10 Stand-alone v4.0.0 BLWindows

SYSTEM AND INFORMATION INTEGRITY

18.9.7.1.5 (BL) Ensure 'Prevent installation of devices using drivers that match these device setup classes: Prevent installation of devices using drivers for these device setup' is set to 'IEEE 1394 device setup classes'CIS Microsoft Windows 10 Stand-alone v4.0.0 L1 BLWindows

SYSTEM AND INFORMATION INTEGRITY

Deny log on through Remote Desktop ServicesMSCT Windows 10 1803 v1.0.0Windows

ACCESS CONTROL

Deny log on through Remote Desktop ServicesMSCT Windows 10 v1507 v1.0.0Windows

ACCESS CONTROL

Deny log on through Remote Desktop ServicesMSCT Windows Server 1903 MS v1.19.9Windows

ACCESS CONTROL

Deny log on through Remote Desktop ServicesMSCT Windows Server v1909 MS v1.0.0Windows

ACCESS CONTROL

Deny log on through Remote Desktop ServicesMSCT Windows Server 2016 DC v1.0.0Windows

ACCESS CONTROL

Deny log on through Remote Desktop ServicesMSCT Windows Server 2016 MS v1.0.0Windows

ACCESS CONTROL

Deny log on through Remote Desktop ServicesMSCT Windows 11 v22H2 v1.0.0Windows

ACCESS CONTROL

Deny log on through Remote Desktop ServicesMSCT Windows 11 v24H2 v1.0.0Windows

ACCESS CONTROL

Deny log on through Remote Desktop ServicesMSCT Windows Server 2022 v1.0.0Windows

ACCESS CONTROL

Ensure address space layout randomization (ASLR) is enabled - sysctlTenable Cisco Firepower Management Center OS Best Practices AuditUnix

SYSTEM AND INFORMATION INTEGRITY

Fortigate - SSH login grace time <= 30 secondsTNS Fortigate FortiOS Best Practices v2.0.0FortiGate

ACCESS CONTROL

GEN002720-2 - The audit system must be configured to audit failed attempts to access files and programs - '-S open -F exit=-EACCES'DISA STIG for Oracle Linux 5 v2r1Unix

AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT

GEN005305 - The SNMP service must use only SNMPv3 or its successors - /etc/sma/snmp/snmpd.confDISA STIG Solaris 10 X86 v2r4Unix

CONFIGURATION MANAGEMENT

GEN005305 - The SNMP service must use only SNMPv3 or its successors - /etc/snmp/conf/snmpd.confDISA STIG Solaris 10 X86 v2r4Unix

CONFIGURATION MANAGEMENT

JUEX-L2-000020 - The Juniper EX switch must be configured to uniquely identify all network-connected endpoint devices before establishing any connection.DISA Juniper EX Series Layer 2 Switch v2r3Juniper

IDENTIFICATION AND AUTHENTICATION

JUEX-L2-000120 - The Juniper EX switch must be configured to enable DHCP snooping for all user VLANs to validate DHCP messages from untrusted sources.DISA Juniper EX Series Layer 2 Switch v2r3Juniper

SYSTEM AND COMMUNICATIONS PROTECTION

JUEX-L2-000250 - The Juniper EX switch must not have any access interfaces assigned to a VLAN configured as native for any trunked interface.DISA Juniper EX Series Layer 2 Switch v2r3Juniper

CONFIGURATION MANAGEMENT

OL07-00-010492 - Oracle Linux operating systems version 7.2 or newer booted with United Extensible Firmware Interface (UEFI) must have a unique name for the grub superusers account when booting into single-user mode and maintenance.DISA Oracle Linux 7 STIG v3r2Unix

ACCESS CONTROL