Item Search

NameAudit NamePluginCategory
1.1 Install the latest fix packsCIS IBM DB2 v10 v1.1.0 Database Level 2IBM_DB2DB
1.1.10 Ensure separate partition exists for /varCIS Amazon Linux 2 STIG v2.0.0 L2 ServerUnix

ACCESS CONTROL, MEDIA PROTECTION

1.1.11 Ensure separate partition exists for /var/tmpCIS Amazon Linux 2 STIG v2.0.0 L2 ServerUnix

ACCESS CONTROL, CONFIGURATION MANAGEMENT, MEDIA PROTECTION, SYSTEM AND SERVICES ACQUISITION

3.2.1 TCP/IP service name - svcenameCIS IBM DB2 v10 v1.1.0 Database Level 2IBM_DB2DB
3.2.5 Database Manager Configuration parameter: trust_clntauthCIS IBM DB2 v10 v1.1.0 Database Level 2IBM_DB2DB
3.4.1 Ensure DCCP is disabledCIS Amazon Linux 2 STIG v2.0.0 L2 ServerUnix

CONFIGURATION MANAGEMENT

3.4.2 Ensure SCTP is disabledCIS Amazon Linux 2 STIG v2.0.0 L2 ServerUnix

CONFIGURATION MANAGEMENT

4.1.1.3 Ensure auditing for processes that start prior to auditd is enabledCIS Amazon Linux 2 STIG v2.0.0 L2 ServerUnix

AUDIT AND ACCOUNTABILITY

4.1.3.10 Ensure use of privileged commands is collectedCIS Amazon Linux 2 STIG v2.0.0 L2 ServerUnix

AUDIT AND ACCOUNTABILITY

4.5 Review Column Mask logic according to policyCIS IBM DB2 v10 v1.1.0 Database Level 2IBM_DB2DB
5.3.8 Ensure SSH X11 forwarding is disabledCIS Amazon Linux 2 STIG v2.0.0 L2 ServerUnix

CONFIGURATION MANAGEMENT

6.1.1 Audit system file permissionsCIS Amazon Linux 2 STIG v2.0.0 L2 ServerUnix

ACCESS CONTROL, MEDIA PROTECTION

6.2 Restrict Access to SYSCAT.AUDITUSECIS IBM DB2 v10 v1.1.0 Database Level 2IBM_DB2DB

ACCESS CONTROL

6.4 Restrict Access to SYSCAT.COLAUTHCIS IBM DB2 v10 v1.1.0 Database Level 2IBM_DB2DB

ACCESS CONTROL

6.6 Restrict Access to SYSCAT.EVENTTABLESCIS IBM DB2 v10 v1.1.0 Database Level 2IBM_DB2DB

ACCESS CONTROL

6.10 Restrict Access to SYSCAT.PACKAGESCIS IBM DB2 v10 v1.1.0 Database Level 2IBM_DB2DB

ACCESS CONTROL

6.11 Restrict Access to SYSCAT.PASSTHRUAUTHCIS IBM DB2 v10 v1.1.0 Database Level 2IBM_DB2DB

ACCESS CONTROL

6.12 Restrict Access to SYSCAT.SECURITYPOLICIESCIS IBM DB2 v10 v1.1.0 Database Level 2IBM_DB2DB

ACCESS CONTROL

6.17 Restrict Access to SYSCAT.ROUTINEAUTHCIS IBM DB2 v10 v1.1.0 Database Level 2IBM_DB2DB

ACCESS CONTROL

6.19 Restrict Access to SYSCAT.SCHEMATACIS IBM DB2 v10 v1.1.0 Database Level 2IBM_DB2DB

ACCESS CONTROL

6.26 Restrict Access to SYSCAT.VARIABLEAUTHCIS IBM DB2 v10 v1.1.0 Database Level 2IBM_DB2DB

ACCESS CONTROL

6.27 Restrict Access to SYSCAT.WORKLOADAUTHCIS IBM DB2 v10 v1.1.0 Database Level 2IBM_DB2DB

ACCESS CONTROL

6.28 Restrict Access to SYSCAT.XSROBJECTAUTHCIS IBM DB2 v10 v1.1.0 Database Level 2IBM_DB2DB

ACCESS CONTROL

6.29 Restrict Access to SYSCAT.AUTHORIZATIONIDSCIS IBM DB2 v10 v1.1.0 Database Level 2IBM_DB2DB

ACCESS CONTROL

7.6 Secure DBADM AuthorityCIS IBM DB2 v10 v1.1.0 Database Level 2IBM_DB2DB
7.8 Secure DATAACCESS AuthorityCIS IBM DB2 v10 v1.1.0 Database Level 2IBM_DB2DB
7.15 Secure EXTERNALROUTINE AuthorityCIS IBM DB2 v10 v1.1.0 Database Level 2IBM_DB2DB
8.1 Review RolesCIS IBM DB2 v10 v1.1.0 Database Level 2IBM_DB2DB
8.2 Review Role MembersCIS IBM DB2 v10 v1.1.0 Database Level 2IBM_DB2DB
8.2.2 Do Not Use Encryption Algorithms that are Not SecureCIS IBM DB2 11 v1.1.0 Database Level 2IBM_DB2DB

SYSTEM AND SERVICES ACQUISITION

8.2.3 Secure the Configuration FileCIS IBM DB2 11 v1.1.0 Database Level 2IBM_DB2DB

ACCESS CONTROL, MEDIA PROTECTION

8.2.4 Secure the Stash FileCIS IBM DB2 11 v1.1.0 Database Level 2IBM_DB2DB

ACCESS CONTROL, MEDIA PROTECTION

8.2.5 Backup the Stash FileCIS IBM DB2 11 v1.1.0 Database Level 2IBM_DB2DB

CONTINGENCY PLANNING

8.2.11 Keep Master Key Labels UniqueCIS IBM DB2 11 v1.1.0 Database Level 2IBM_DB2DB

CONFIGURATION MANAGEMENT

8.2.12 Retain All Master KeysCIS IBM DB2 11 v1.1.0 Database Level 2IBM_DB2DB

CONTINGENCY PLANNING

8.3 Nested RolesCIS IBM DB2 v10 v1.1.0 Database Level 2IBM_DB2DB
8.5 Review Role Grantees with WITH ADMIN OPTIONCIS IBM DB2 v10 v1.1.0 Database Level 2IBM_DB2DB
9.2 Remove Unused SchemasCIS IBM DB2 v10 v1.1.0 Database Level 2IBM_DB2DB

CONFIGURATION MANAGEMENT

9.8 Ensure Trusted Contexts are enabledCIS IBM DB2 v10 v1.1.0 Database Level 2IBM_DB2DB
9.10 Ensure that security plug-in support for two-part user IDs is enabledCIS IBM DB2 v10 v1.1.0 Database Level 2IBM_DB2DB
ARST-L2-000100 - The Arista MLS layer 2 switch must have IP Source Guard enabled on all user-facing or untrusted access switch ports.DISA STIG Arista MLS EOS 4.2x L2S v2r1Arista

SYSTEM AND COMMUNICATIONS PROTECTION

Catalina - Configure SSHD to Use Secure Key Exchange AlgorithmsNIST macOS Catalina v1.5.0 - All ProfilesUnix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, MAINTENANCE

CISC-L2-000140 - The Cisco switch must have IP Source Guard enabled on all user-facing or untrusted access switch ports.DISA STIG Cisco IOS Switch L2S v3r1Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

JUEX-L2-000070 - The Juniper EX switch must be configured to authenticate all network-connected endpoint devices before establishing any connection.DISA Juniper EX Series Layer 2 Switch v2r3Juniper

IDENTIFICATION AND AUTHENTICATION

JUEX-L2-000090 - The Juniper EX switch must be configured to enable BPDU Protection on all user-facing or untrusted access switch ports.DISA Juniper EX Series Layer 2 Switch v2r3Juniper

SYSTEM AND COMMUNICATIONS PROTECTION

JUEX-L2-000150 - The Juniper EX switch must be configured to enable Storm Control on all host-facing access interfaces.DISA Juniper EX Series Layer 2 Switch v2r3Juniper

CONFIGURATION MANAGEMENT

JUEX-L2-000170 - If STP is used, the Juniper EX switch must be configured to implement Rapid STP, or Multiple STP, where VLANs span multiple switches with redundant links.DISA Juniper EX Series Layer 2 Switch v2r3Juniper

CONFIGURATION MANAGEMENT

JUEX-L2-000220 - The Juniper EX switch must not use the default VLAN for management traffic.DISA Juniper EX Series Layer 2 Switch v2r3Juniper

SYSTEM AND COMMUNICATIONS PROTECTION

JUEX-L2-000240 - The Juniper EX switch must not have a native VLAN ID assigned, or have a unique native VLAN ID, for all 802.1q trunk links.DISA Juniper EX Series Layer 2 Switch v2r3Juniper

CONFIGURATION MANAGEMENT

Monterey - Configure SSHD to Use Secure Key Exchange AlgorithmsNIST macOS Monterey v1.0.0 - All ProfilesUnix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, MAINTENANCE