1.1 Install the latest fix packs | CIS IBM DB2 v10 v1.1.0 Database Level 2 | IBM_DB2DB | |
1.1.10 Ensure separate partition exists for /var | CIS Amazon Linux 2 STIG v2.0.0 L2 Server | Unix | ACCESS CONTROL, MEDIA PROTECTION |
1.1.11 Ensure separate partition exists for /var/tmp | CIS Amazon Linux 2 STIG v2.0.0 L2 Server | Unix | ACCESS CONTROL, CONFIGURATION MANAGEMENT, MEDIA PROTECTION, SYSTEM AND SERVICES ACQUISITION |
2.6.3 Enable Firewall | CIS Apple OSX 10.11 El Capitan L1 v1.1.0 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
3.2.1 TCP/IP service name - svcename | CIS IBM DB2 v10 v1.1.0 Database Level 2 | IBM_DB2DB | |
3.2.2 SSL service name - ssl_svcename | CIS IBM DB2 v10 v1.1.0 Database Level 2 | IBM_DB2DB | |
3.2.4 Database Manager Configuration parameter: trust_allclnts | CIS IBM DB2 v10 v1.1.0 Database Level 2 | IBM_DB2DB | |
3.2.5 Database Manager Configuration parameter: trust_clntauth | CIS IBM DB2 v10 v1.1.0 Database Level 2 | IBM_DB2DB | |
3.4.1 Ensure DCCP is disabled | CIS Amazon Linux 2 STIG v2.0.0 L2 Server | Unix | CONFIGURATION MANAGEMENT |
3.4.2 Ensure SCTP is disabled | CIS Amazon Linux 2 STIG v2.0.0 L2 Server | Unix | CONFIGURATION MANAGEMENT |
3.8 Ensure the Lock File Is Secured | CIS Apache HTTP Server 2.4 v2.2.0 L1 | Unix | ACCESS CONTROL, MEDIA PROTECTION |
4.1.3.10 Ensure use of privileged commands is collected | CIS Amazon Linux 2 STIG v2.0.0 L2 Server | Unix | AUDIT AND ACCOUNTABILITY |
4.5 Review Column Mask logic according to policy | CIS IBM DB2 v10 v1.1.0 Database Level 2 | IBM_DB2DB | |
5.1 Enable Backup Redundancy | CIS IBM DB2 v10 v1.1.0 Database Level 2 | IBM_DB2DB | |
5.3.8 Ensure SSH X11 forwarding is disabled | CIS Amazon Linux 2 STIG v2.0.0 L2 Server | Unix | CONFIGURATION MANAGEMENT |
6.1.1 Audit system file permissions | CIS Amazon Linux 2 STIG v2.0.0 L2 Server | Unix | ACCESS CONTROL, MEDIA PROTECTION |
6.2 Restrict Access to SYSCAT.AUDITUSE | CIS IBM DB2 v10 v1.1.0 Database Level 2 | IBM_DB2DB | ACCESS CONTROL |
6.4 Restrict Access to SYSCAT.COLAUTH | CIS IBM DB2 v10 v1.1.0 Database Level 2 | IBM_DB2DB | ACCESS CONTROL |
6.6 Restrict Access to SYSCAT.EVENTTABLES | CIS IBM DB2 v10 v1.1.0 Database Level 2 | IBM_DB2DB | ACCESS CONTROL |
6.10 Restrict Access to SYSCAT.PACKAGES | CIS IBM DB2 v10 v1.1.0 Database Level 2 | IBM_DB2DB | ACCESS CONTROL |
6.11 Restrict Access to SYSCAT.PASSTHRUAUTH | CIS IBM DB2 v10 v1.1.0 Database Level 2 | IBM_DB2DB | ACCESS CONTROL |
6.12 Restrict Access to SYSCAT.SECURITYPOLICIES | CIS IBM DB2 v10 v1.1.0 Database Level 2 | IBM_DB2DB | ACCESS CONTROL |
6.14 Restrict Access to SYSCAT.SURROGATEAUTHIDS | CIS IBM DB2 v10 v1.1.0 Database Level 2 | IBM_DB2DB | ACCESS CONTROL |
6.16 Restrict Access to SYSCAT.ROLES | CIS IBM DB2 v10 v1.1.0 Database Level 2 | IBM_DB2DB | ACCESS CONTROL |
6.17 Restrict Access to SYSCAT.ROUTINEAUTH | CIS IBM DB2 v10 v1.1.0 Database Level 2 | IBM_DB2DB | ACCESS CONTROL |
6.19 Restrict Access to SYSCAT.SCHEMATA | CIS IBM DB2 v10 v1.1.0 Database Level 2 | IBM_DB2DB | ACCESS CONTROL |
6.26 Restrict Access to SYSCAT.VARIABLEAUTH | CIS IBM DB2 v10 v1.1.0 Database Level 2 | IBM_DB2DB | ACCESS CONTROL |
6.27 Restrict Access to SYSCAT.WORKLOADAUTH | CIS IBM DB2 v10 v1.1.0 Database Level 2 | IBM_DB2DB | ACCESS CONTROL |
6.28 Restrict Access to SYSCAT.XSROBJECTAUTH | CIS IBM DB2 v10 v1.1.0 Database Level 2 | IBM_DB2DB | ACCESS CONTROL |
6.29 Restrict Access to SYSCAT.AUTHORIZATIONIDS | CIS IBM DB2 v10 v1.1.0 Database Level 2 | IBM_DB2DB | ACCESS CONTROL |
7.6 Secure DBADM Authority | CIS IBM DB2 v10 v1.1.0 Database Level 2 | IBM_DB2DB | |
7.15 Secure EXTERNALROUTINE Authority | CIS IBM DB2 v10 v1.1.0 Database Level 2 | IBM_DB2DB | |
8.2 Review Role Members | CIS IBM DB2 v10 v1.1.0 Database Level 2 | IBM_DB2DB | |
8.2.2 Do Not Use Encryption Algorithms that are Not Secure | CIS IBM DB2 11 v1.1.0 Database Level 2 | IBM_DB2DB | SYSTEM AND SERVICES ACQUISITION |
8.2.3 Secure the Configuration File | CIS IBM DB2 11 v1.1.0 Database Level 2 | IBM_DB2DB | ACCESS CONTROL, MEDIA PROTECTION |
8.2.4 Secure the Stash File | CIS IBM DB2 11 v1.1.0 Database Level 2 | IBM_DB2DB | ACCESS CONTROL, MEDIA PROTECTION |
8.2.11 Keep Master Key Labels Unique | CIS IBM DB2 11 v1.1.0 Database Level 2 | IBM_DB2DB | CONFIGURATION MANAGEMENT |
8.2.12 Retain All Master Keys | CIS IBM DB2 11 v1.1.0 Database Level 2 | IBM_DB2DB | CONTINGENCY PLANNING |
8.3 Nested Roles | CIS IBM DB2 v10 v1.1.0 Database Level 2 | IBM_DB2DB | |
9.1.3.1 Ensure that Defender for Servers is set to 'On' | CIS Microsoft Azure Foundations v4.0.0 L2 | microsoft_azure | RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY |
9.2 Remove Unused Schemas | CIS IBM DB2 v10 v1.1.0 Database Level 2 | IBM_DB2DB | CONFIGURATION MANAGEMENT |
9.8 Ensure Trusted Contexts are enabled | CIS IBM DB2 v10 v1.1.0 Database Level 2 | IBM_DB2DB | |
Big Sur - Configure SSHD to Use Secure Key Exchange Algorithms | NIST macOS Big Sur v1.4.0 - All Profiles | Unix | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, MAINTENANCE |
CISC-L2-000140 - The Cisco switch must have IP Source Guard enabled on all user-facing or untrusted access switch ports. | DISA Cisco NX OS Switch L2S STIG v3r2 | Cisco | SYSTEM AND COMMUNICATIONS PROTECTION |
JUEX-L2-000070 - The Juniper EX switch must be configured to authenticate all network-connected endpoint devices before establishing any connection. | DISA Juniper EX Series Layer 2 Switch v2r3 | Juniper | IDENTIFICATION AND AUTHENTICATION |
JUEX-L2-000090 - The Juniper EX switch must be configured to enable BPDU Protection on all user-facing or untrusted access switch ports. | DISA Juniper EX Series Layer 2 Switch v2r3 | Juniper | SYSTEM AND COMMUNICATIONS PROTECTION |
JUEX-L2-000150 - The Juniper EX switch must be configured to enable Storm Control on all host-facing access interfaces. | DISA Juniper EX Series Layer 2 Switch v2r3 | Juniper | CONFIGURATION MANAGEMENT |
JUEX-L2-000170 - If STP is used, the Juniper EX switch must be configured to implement Rapid STP, or Multiple STP, where VLANs span multiple switches with redundant links. | DISA Juniper EX Series Layer 2 Switch v2r3 | Juniper | CONFIGURATION MANAGEMENT |
JUEX-L2-000220 - The Juniper EX switch must not use the default VLAN for management traffic. | DISA Juniper EX Series Layer 2 Switch v2r3 | Juniper | SYSTEM AND COMMUNICATIONS PROTECTION |
JUEX-L2-000240 - The Juniper EX switch must not have a native VLAN ID assigned, or have a unique native VLAN ID, for all 802.1q trunk links. | DISA Juniper EX Series Layer 2 Switch v2r3 | Juniper | CONFIGURATION MANAGEMENT |