Item Search

NameAudit NamePluginCategory
1.1 Install the latest fix packsCIS IBM DB2 v10 v1.1.0 Database Level 2IBM_DB2DB
1.1.10 Ensure separate partition exists for /varCIS Amazon Linux 2 STIG v2.0.0 L2 ServerUnix

ACCESS CONTROL, MEDIA PROTECTION

1.1.11 Ensure separate partition exists for /var/tmpCIS Amazon Linux 2 STIG v2.0.0 L2 ServerUnix

ACCESS CONTROL, CONFIGURATION MANAGEMENT, MEDIA PROTECTION, SYSTEM AND SERVICES ACQUISITION

2.6.3 Enable FirewallCIS Apple OSX 10.11 El Capitan L1 v1.1.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION

3.2.1 TCP/IP service name - svcenameCIS IBM DB2 v10 v1.1.0 Database Level 2IBM_DB2DB
3.2.2 SSL service name - ssl_svcenameCIS IBM DB2 v10 v1.1.0 Database Level 2IBM_DB2DB
3.2.4 Database Manager Configuration parameter: trust_allclntsCIS IBM DB2 v10 v1.1.0 Database Level 2IBM_DB2DB
3.2.5 Database Manager Configuration parameter: trust_clntauthCIS IBM DB2 v10 v1.1.0 Database Level 2IBM_DB2DB
3.4.1 Ensure DCCP is disabledCIS Amazon Linux 2 STIG v2.0.0 L2 ServerUnix

CONFIGURATION MANAGEMENT

3.4.2 Ensure SCTP is disabledCIS Amazon Linux 2 STIG v2.0.0 L2 ServerUnix

CONFIGURATION MANAGEMENT

3.8 Ensure the Lock File Is SecuredCIS Apache HTTP Server 2.4 v2.2.0 L1Unix

ACCESS CONTROL, MEDIA PROTECTION

4.1.3.10 Ensure use of privileged commands is collectedCIS Amazon Linux 2 STIG v2.0.0 L2 ServerUnix

AUDIT AND ACCOUNTABILITY

4.5 Review Column Mask logic according to policyCIS IBM DB2 v10 v1.1.0 Database Level 2IBM_DB2DB
5.1 Enable Backup RedundancyCIS IBM DB2 v10 v1.1.0 Database Level 2IBM_DB2DB
5.3.8 Ensure SSH X11 forwarding is disabledCIS Amazon Linux 2 STIG v2.0.0 L2 ServerUnix

CONFIGURATION MANAGEMENT

6.1.1 Audit system file permissionsCIS Amazon Linux 2 STIG v2.0.0 L2 ServerUnix

ACCESS CONTROL, MEDIA PROTECTION

6.2 Restrict Access to SYSCAT.AUDITUSECIS IBM DB2 v10 v1.1.0 Database Level 2IBM_DB2DB

ACCESS CONTROL

6.4 Restrict Access to SYSCAT.COLAUTHCIS IBM DB2 v10 v1.1.0 Database Level 2IBM_DB2DB

ACCESS CONTROL

6.6 Restrict Access to SYSCAT.EVENTTABLESCIS IBM DB2 v10 v1.1.0 Database Level 2IBM_DB2DB

ACCESS CONTROL

6.10 Restrict Access to SYSCAT.PACKAGESCIS IBM DB2 v10 v1.1.0 Database Level 2IBM_DB2DB

ACCESS CONTROL

6.11 Restrict Access to SYSCAT.PASSTHRUAUTHCIS IBM DB2 v10 v1.1.0 Database Level 2IBM_DB2DB

ACCESS CONTROL

6.12 Restrict Access to SYSCAT.SECURITYPOLICIESCIS IBM DB2 v10 v1.1.0 Database Level 2IBM_DB2DB

ACCESS CONTROL

6.14 Restrict Access to SYSCAT.SURROGATEAUTHIDSCIS IBM DB2 v10 v1.1.0 Database Level 2IBM_DB2DB

ACCESS CONTROL

6.16 Restrict Access to SYSCAT.ROLESCIS IBM DB2 v10 v1.1.0 Database Level 2IBM_DB2DB

ACCESS CONTROL

6.17 Restrict Access to SYSCAT.ROUTINEAUTHCIS IBM DB2 v10 v1.1.0 Database Level 2IBM_DB2DB

ACCESS CONTROL

6.19 Restrict Access to SYSCAT.SCHEMATACIS IBM DB2 v10 v1.1.0 Database Level 2IBM_DB2DB

ACCESS CONTROL

6.26 Restrict Access to SYSCAT.VARIABLEAUTHCIS IBM DB2 v10 v1.1.0 Database Level 2IBM_DB2DB

ACCESS CONTROL

6.27 Restrict Access to SYSCAT.WORKLOADAUTHCIS IBM DB2 v10 v1.1.0 Database Level 2IBM_DB2DB

ACCESS CONTROL

6.28 Restrict Access to SYSCAT.XSROBJECTAUTHCIS IBM DB2 v10 v1.1.0 Database Level 2IBM_DB2DB

ACCESS CONTROL

6.29 Restrict Access to SYSCAT.AUTHORIZATIONIDSCIS IBM DB2 v10 v1.1.0 Database Level 2IBM_DB2DB

ACCESS CONTROL

7.6 Secure DBADM AuthorityCIS IBM DB2 v10 v1.1.0 Database Level 2IBM_DB2DB
7.15 Secure EXTERNALROUTINE AuthorityCIS IBM DB2 v10 v1.1.0 Database Level 2IBM_DB2DB
8.2 Review Role MembersCIS IBM DB2 v10 v1.1.0 Database Level 2IBM_DB2DB
8.2.2 Do Not Use Encryption Algorithms that are Not SecureCIS IBM DB2 11 v1.1.0 Database Level 2IBM_DB2DB

SYSTEM AND SERVICES ACQUISITION

8.2.3 Secure the Configuration FileCIS IBM DB2 11 v1.1.0 Database Level 2IBM_DB2DB

ACCESS CONTROL, MEDIA PROTECTION

8.2.4 Secure the Stash FileCIS IBM DB2 11 v1.1.0 Database Level 2IBM_DB2DB

ACCESS CONTROL, MEDIA PROTECTION

8.2.11 Keep Master Key Labels UniqueCIS IBM DB2 11 v1.1.0 Database Level 2IBM_DB2DB

CONFIGURATION MANAGEMENT

8.2.12 Retain All Master KeysCIS IBM DB2 11 v1.1.0 Database Level 2IBM_DB2DB

CONTINGENCY PLANNING

8.3 Nested RolesCIS IBM DB2 v10 v1.1.0 Database Level 2IBM_DB2DB
9.1.3.1 Ensure that Defender for Servers is set to 'On'CIS Microsoft Azure Foundations v4.0.0 L2microsoft_azure

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

9.2 Remove Unused SchemasCIS IBM DB2 v10 v1.1.0 Database Level 2IBM_DB2DB

CONFIGURATION MANAGEMENT

9.8 Ensure Trusted Contexts are enabledCIS IBM DB2 v10 v1.1.0 Database Level 2IBM_DB2DB
Big Sur - Configure SSHD to Use Secure Key Exchange AlgorithmsNIST macOS Big Sur v1.4.0 - All ProfilesUnix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, MAINTENANCE

CISC-L2-000140 - The Cisco switch must have IP Source Guard enabled on all user-facing or untrusted access switch ports.DISA Cisco NX OS Switch L2S STIG v3r2Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

JUEX-L2-000070 - The Juniper EX switch must be configured to authenticate all network-connected endpoint devices before establishing any connection.DISA Juniper EX Series Layer 2 Switch v2r3Juniper

IDENTIFICATION AND AUTHENTICATION

JUEX-L2-000090 - The Juniper EX switch must be configured to enable BPDU Protection on all user-facing or untrusted access switch ports.DISA Juniper EX Series Layer 2 Switch v2r3Juniper

SYSTEM AND COMMUNICATIONS PROTECTION

JUEX-L2-000150 - The Juniper EX switch must be configured to enable Storm Control on all host-facing access interfaces.DISA Juniper EX Series Layer 2 Switch v2r3Juniper

CONFIGURATION MANAGEMENT

JUEX-L2-000170 - If STP is used, the Juniper EX switch must be configured to implement Rapid STP, or Multiple STP, where VLANs span multiple switches with redundant links.DISA Juniper EX Series Layer 2 Switch v2r3Juniper

CONFIGURATION MANAGEMENT

JUEX-L2-000220 - The Juniper EX switch must not use the default VLAN for management traffic.DISA Juniper EX Series Layer 2 Switch v2r3Juniper

SYSTEM AND COMMUNICATIONS PROTECTION

JUEX-L2-000240 - The Juniper EX switch must not have a native VLAN ID assigned, or have a unique native VLAN ID, for all 802.1q trunk links.DISA Juniper EX Series Layer 2 Switch v2r3Juniper

CONFIGURATION MANAGEMENT