Item Search

NameAudit NamePluginCategory
1.1.1.2 Ensure mounting of squashfs filesystems is disabledCIS Amazon Linux 2 STIG v2.0.0 L2 ServerUnix

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

1.1.15 Ensure separate partition exists for /var/logCIS Amazon Linux 2 STIG v2.0.0 L2 ServerUnix

AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

1.1.17 Ensure separate partition exists for /homeCIS Amazon Linux 2 STIG v2.0.0 L2 ServerUnix

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

1.3 Leverage the least privilege principleCIS IBM DB2 v10 v1.1.0 Database Level 2IBM_DB2DB
1.4.3 Ensure address space layout randomization (ASLR) is enabledCIS Google Container-Optimized OS v1.2.0 L1 ServerUnix

SYSTEM AND INFORMATION INTEGRITY

1.5.3 Ensure address space layout randomization (ASLR) is enabled - sysctlCIS Debian 8 Workstation L1 v2.0.2Unix

SYSTEM AND INFORMATION INTEGRITY

3.1.1 Disable IPv6CIS Amazon Linux 2 STIG v2.0.0 L2 ServerUnix

CONFIGURATION MANAGEMENT

4.1.1 Creating the Database Without PUBLIC Grants (RESTRICTIVE)CIS IBM DB2 11 v1.1.0 Database Level 2IBM_DB2DB

ACCESS CONTROL, MEDIA PROTECTION

4.1.1.1 Ensure auditd is installedCIS Amazon Linux 2 STIG v2.0.0 L2 ServerUnix

AUDIT AND ACCOUNTABILITY

4.1.1.2 Ensure auditd service is enabled and runningCIS Amazon Linux 2 STIG v2.0.0 L2 ServerUnix

AUDIT AND ACCOUNTABILITY

4.1.2.2 Ensure audit logs are not automatically deletedCIS Amazon Linux 2 STIG v2.0.0 L2 ServerUnix

AUDIT AND ACCOUNTABILITY

4.1.2.5 Ensure system is disabled when audit logs are fullCIS Amazon Linux 2 STIG v2.0.0 L2 ServerUnix

AUDIT AND ACCOUNTABILITY

4.1.3.1 Ensure events that modify date and time information are collectedCIS Amazon Linux 2 STIG v2.0.0 L2 ServerUnix

AUDIT AND ACCOUNTABILITY

4.1.3.2 Ensure system administrator command executions (sudo) are collectedCIS Amazon Linux 2 STIG v2.0.0 L2 ServerUnix

AUDIT AND ACCOUNTABILITY

4.1.3.3 Ensure session initiation information is collectedCIS Amazon Linux 2 STIG v2.0.0 L2 ServerUnix

AUDIT AND ACCOUNTABILITY

4.1.3.5 Ensure events that modify the system's network environment are collectedCIS Amazon Linux 2 STIG v2.0.0 L2 ServerUnix

AUDIT AND ACCOUNTABILITY

4.1.3.6 Ensure successful file system mounts are collectedCIS Amazon Linux 2 STIG v2.0.0 L2 ServerUnix

AUDIT AND ACCOUNTABILITY

4.1.3.8 Ensure changes to system administration scope (sudoers) is collectedCIS Amazon Linux 2 STIG v2.0.0 L2 ServerUnix

AUDIT AND ACCOUNTABILITY

4.1.3.9 Ensure file deletion events by users are collectedCIS Amazon Linux 2 STIG v2.0.0 L2 ServerUnix

AUDIT AND ACCOUNTABILITY

4.1.3.13 Ensure login and logout events are collectedCIS Amazon Linux 2 STIG v2.0.0 L2 ServerUnix

AUDIT AND ACCOUNTABILITY

4.1.3.41 Ensure the audit configuration is immutableCIS Amazon Linux 2 STIG v2.0.0 L2 ServerUnix

ACCESS CONTROL, MEDIA PROTECTION

4.4 Review Row Permission logic according to policyCIS IBM DB2 v10 v1.1.0 Database Level 2IBM_DB2DB
6.4.1 Ensure Trusted Contexts are EnabledCIS IBM DB2 11 v1.1.0 Database Level 2IBM_DB2DB

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

6.8 Restrict Access to SYSCAT.INDEXAUTHCIS IBM DB2 v10 v1.1.0 Database Level 2IBM_DB2DB

ACCESS CONTROL

6.15 Restrict Access to SYSCAT.ROLEAUTHCIS IBM DB2 v10 v1.1.0 Database Level 2IBM_DB2DB

ACCESS CONTROL

6.22 Restrict Access to SYSCAT.TABAUTHCIS IBM DB2 v10 v1.1.0 Database Level 2IBM_DB2DB

ACCESS CONTROL

6.25 Restrict Access to SYSCAT.MODULEAUTHCIS IBM DB2 v10 v1.1.0 Database Level 2IBM_DB2DB

ACCESS CONTROL

7.5 Secure SECADM AuthorityCIS IBM DB2 v10 v1.1.0 Database Level 2IBM_DB2DB
7.11 Secure CREATAB AuthorityCIS IBM DB2 v10 v1.1.0 Database Level 2IBM_DB2DB
7.14 Secure LOAD AuthorityCIS IBM DB2 v10 v1.1.0 Database Level 2IBM_DB2DB
8.2.1 Encrypt the DatabaseCIS IBM DB2 11 v1.1.0 Database Level 2IBM_DB2DB

IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

8.2.9 Rotate the Master KeyCIS IBM DB2 11 v1.1.0 Database Level 2IBM_DB2DB

IDENTIFICATION AND AUTHENTICATION

8.2.10 Turn Off ALLOW_KEY_INSERT_WITHOUT_KEYSTORE_BACKUPCIS IBM DB2 11 v1.1.0 Database Level 2IBM_DB2DB

CONFIGURATION MANAGEMENT

8.2.13 Set CFG Values in a Single CommandCIS IBM DB2 11 v1.1.0 Database Level 2IBM_DB2DB

CONFIGURATION MANAGEMENT

8.4 Review Roles granted to PUBLICCIS IBM DB2 v10 v1.1.0 Database Level 2IBM_DB2DB
ARST-L2-000100 - The Arista MLS layer 2 switch must have IP Source Guard enabled on all user-facing or untrusted access switch ports.DISA STIG Arista MLS EOS 4.2x L2S v2r1Arista

SYSTEM AND COMMUNICATIONS PROTECTION

Catalina - Configure SSHD to Use Secure Key Exchange AlgorithmsNIST macOS Catalina v1.5.0 - All ProfilesUnix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, MAINTENANCE

CISC-L2-000140 - The Cisco switch must have IP Source Guard enabled on all user-facing or untrusted access switch ports.DISA STIG Cisco IOS Switch L2S v3r1Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

GEN005305 - The SNMP service must use only SNMPv3 or its successors - /etc/snmp/conf/snmpd.confDISA STIG Solaris 10 SPARC v2r4Unix

CONFIGURATION MANAGEMENT

GEN005305 - The SNMP service must use only SNMPv3 or its successors.DISA STIG AIX 5.3 v1r2Unix

ACCESS CONTROL

JUEX-L2-000040 - The Juniper EX switch must be configured to manage excess bandwidth to limit the effects of packet flooding types of denial-of-service (DoS) attacks.DISA Juniper EX Series Layer 2 Switch v2r3Juniper

SYSTEM AND COMMUNICATIONS PROTECTION

JUEX-L2-000050 - The Juniper EX switch must be configured to permit authorized users to select a user session to capture.DISA Juniper EX Series Layer 2 Switch v2r3Juniper

AUDIT AND ACCOUNTABILITY

JUEX-L2-000060 - The Juniper EX switch must be configured to permit authorized users to remotely view, in real time, all content related to an established user session from a component separate from the layer 2 switch.DISA Juniper EX Series Layer 2 Switch v2r3Juniper

AUDIT AND ACCOUNTABILITY

JUEX-L2-000080 - The Juniper EX switch must be configured to enable Root Protection on STP switch ports connecting to access layer switches.DISA Juniper EX Series Layer 2 Switch v2r3Juniper

SYSTEM AND COMMUNICATIONS PROTECTION

JUEX-L2-000130 - The Juniper EX switch must be configured to enable IP Source Guard on all user-facing or untrusted access VLANs.DISA Juniper EX Series Layer 2 Switch v2r3Juniper

SYSTEM AND COMMUNICATIONS PROTECTION

JUEX-L2-000140 - The Juniper EX switch must be configured to enable Dynamic Address Resolution Protocol (ARP) Inspection (DAI) on all user VLANs.DISA Juniper EX Series Layer 2 Switch v2r3Juniper

SYSTEM AND COMMUNICATIONS PROTECTION

JUEX-L2-000180 - The Juniper EX switch must be configured to verify two-way connectivity on all interswitch trunked interfaces.DISA Juniper EX Series Layer 2 Switch v2r3Juniper

CONFIGURATION MANAGEMENT

JUEX-L2-000190 - The Juniper EX switch must be configured to assign all explicitly disabled access interfaces to an unused VLAN.DISA Juniper EX Series Layer 2 Switch v2r3Juniper

SYSTEM AND COMMUNICATIONS PROTECTION

JUEX-L2-000210 - The Juniper EX switch must be configured to prune the default VLAN from all trunked interfaces that do not require it.DISA Juniper EX Series Layer 2 Switch v2r3Juniper

CONFIGURATION MANAGEMENT

Monterey - Configure SSHD to Use Secure Key Exchange AlgorithmsNIST macOS Monterey v1.0.0 - All ProfilesUnix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, MAINTENANCE