Item Search

NameAudit NamePluginCategory
1.2.1 Ensure GPG keys are configuredCIS CentOS Linux 8 Server L1 v2.0.0Unix

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

1.2.1 Ensure GPG keys are configuredCIS Oracle Linux 8 Workstation L1 v3.0.0Unix

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

1.2.1 Ensure GPG keys are configuredCIS Red Hat EL8 Server L1 v3.0.0Unix

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

1.2.1 Ensure GPG keys are configuredCIS Red Hat Enterprise Linux 7 v4.0.0 L1 ServerUnix

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

1.2.1 Ensure GPG keys are configuredCIS Amazon Linux 2023 Server L1 v1.0.0Unix

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

1.2.1 Ensure GPG keys are configuredCIS Fedora 28 Family Linux Workstation L1 v2.0.0Unix

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

1.2.1 Ensure GPG keys are configuredCIS Oracle Linux 7 v4.0.0 L1 WorkstationUnix

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

1.2.1 Ensure GPG keys are configuredCIS Rocky Linux 8 Workstation L1 v2.0.0Unix

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

1.2.1 Ensure GPG keys are configuredCIS CentOS Linux 7 v4.0.0 L1 ServerUnix

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

1.2.1 Ensure GPG keys are configuredCIS CentOS Linux 7 v4.0.0 L1 WorkstationUnix

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

1.2.1 Ensure GPG keys are configuredCIS AlmaLinux OS 8 Server L1 v3.0.0Unix

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

1.2.1 Ensure GPG keys are configuredCIS Amazon Linux 2 v3.0.0 L1Unix

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

1.2.1 Ensure GPG keys are configuredCIS Fedora 28 Family Linux Server L1 v2.0.0Unix

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

1.2.1 Ensure GPG keys are configuredCIS AlmaLinux OS 8 Workstation L1 v3.0.0Unix

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

1.2.1 Ensure GPG keys are configuredCIS Red Hat EL8 Workstation L1 v3.0.0Unix

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

1.2.1 Ensure GPG keys are configuredCIS Rocky Linux 8 Server L1 v2.0.0Unix

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

1.2.1.1 Ensure GPG keys are configuredCIS AlmaLinux OS 9 v2.0.0 L1 ServerUnix

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

1.2.1.1 Ensure GPG keys are configuredCIS AlmaLinux OS 9 v2.0.0 L1 WorkstationUnix

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

1.2.1.1 Ensure GPG keys are configuredCIS Red Hat Enterprise Linux 9 v2.0.0 L1 WorkstationUnix

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

1.2.1.1 Ensure GPG keys are configuredCIS Oracle Linux 9 v2.0.0 L1 ServerUnix

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

1.2.1.1 Ensure GPG keys are configuredCIS SUSE Linux Enterprise 15 v2.0.0 L1 ServerUnix

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

1.2.4.2.3.18 Set 'Allow access to BitLocker-protected removable data drives from earlier versions of Windows' to 'Disabled'CIS Windows 8 L1 v1.0.0Windows

SYSTEM AND COMMUNICATIONS PROTECTION

2.8 (L1) Host must require TPM-based configuration encryptionCIS VMware ESXi 8.0 v1.1.0 L1VMware

IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

6.3.9 Audit Pop-up WindowsCIS Apple macOS 14.0 Sonoma v2.0.0 L1Unix

CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

6.3.9 Audit Pop-up WindowsCIS Apple macOS 13.0 Ventura v3.0.0 L1Unix

CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

6.3.9 Audit Pop-up WindowsCIS Apple macOS 15.0 Sequoia v1.0.0 L1Unix

CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

6.12 Update the Java Runtime Environment (JRE) regularly if Java is in useCIS Sybase 15.0 L2 OS Windows v1.1.0Windows
6.12 Update the Java Runtime Environment (JRE) regularly if Java is in useCIS Sybase 15.0 L2 OS Unix v1.1.0Unix

CONFIGURATION MANAGEMENT

7.2.10 Audit Pop-up WindowsCIS Apple macOS 12.0 Monterey v4.0.0 L1Unix

CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

8.3.4 Ensure templates are used whenever possible to deploy VMsCIS VMware ESXi 6.5 v1.0.0 Level 1VMware

CONFIGURATION MANAGEMENT

8.3.4 Use templates to deploy VMs whenever possibleCIS VMware ESXi 5.5 v1.2.0 Level 1VMware
18.9.85.1 Ensure 'Allow user control over installs' is set to 'Disabled'CIS Microsoft Windows 8.1 v2.4.1 L1Windows

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

18.9.90.1 Ensure 'Allow user control over installs' is set to 'Disabled'CIS Azure Compute Microsoft Windows Server 2022 v1.0.0 L1 MSWindows

CONFIGURATION MANAGEMENT

18.9.90.1 Ensure 'Allow user control over installs' is set to 'Disabled'CIS Azure Compute Microsoft Windows Server 2022 v1.0.0 L1 DCWindows

CONFIGURATION MANAGEMENT

20.65 Ensure 'The system must have the Roles and Features required for it documented'CIS Microsoft Windows Server 2016 STIG v3.0.0 STIG DCWindows

CONFIGURATION MANAGEMENT

20.65 Ensure 'The system must have the Roles and Features required for it documented'CIS Microsoft Windows Server 2019 STIG v3.0.0 STIG DCWindows

CONFIGURATION MANAGEMENT

20.65 Ensure 'The system must have the Roles and Features required for it documented'CIS Microsoft Windows Server 2016 STIG v3.0.0 STIG MSWindows

CONFIGURATION MANAGEMENT

20.65 Ensure 'The system must have the Roles and Features required for it documented'CIS Microsoft Windows Server 2019 STIG v3.0.0 STIG MSWindows

CONFIGURATION MANAGEMENT

20.65 Ensure 'The system must have the Roles and Features required for it documented' (STIG only)CIS Microsoft Windows Server 2022 STIG v2.0.0 STIG MSWindows

CONFIGURATION MANAGEMENT

20.65 Ensure 'The system must have the Roles and Features required for it documented' (STIG only)CIS Microsoft Windows Server 2022 STIG v2.0.0 STIG DCWindows

CONFIGURATION MANAGEMENT

AS24-U1-000710 - The Apache web server must use a logging mechanism that is configured to allocate log record storage capacity large enough to accommodate the logging requirements of the Apache web server.DISA STIG Apache Server 2.4 Unix Server v3r1Unix

AUDIT AND ACCOUNTABILITY

AS24-W1-000710 - The Apache web server must use a logging mechanism that is configured to allocate log record storage capacity large enough to accommodate the logging requirements of the Apache web server.DISA STIG Apache Server 2.4 Windows Server v2r3Windows

AUDIT AND ACCOUNTABILITY

AS24-W1-000710 - The Apache web server must use a logging mechanism that is configured to allocate log record storage capacity large enough to accommodate the logging requirements of the Apache web server.DISA STIG Apache Server 2.4 Windows Server v3r3Windows

AUDIT AND ACCOUNTABILITY

CIS Microsoft IIS 8 Benchmark v1.5.1 Level 1CIS IIS 8.0 v1.5.1 Level 1Windows
CIS Microsoft IIS 8 Benchmark v1.5.1 Level 2CIS IIS 8.0 v1.5.1 Level 2Windows
FGFW-ND-000305 - The FortiGate device must only install patches or updates that are validated by the vendor via digital signature or hash.DISA Fortigate Firewall NDM STIG v1r4FortiGate

CONFIGURATION MANAGEMENT

GOOG-15-012500 - Google Android 15 must be configured to disable 'Private Space' use.AirWatch - DISA Google Android 15 COBO v1r2MDM

CONFIGURATION MANAGEMENT

GOOG-15-012500 - Google Android 15 must be configured to disable 'Private Space' use.MobileIron - DISA Google Android 15 COBO v1r2MDM

CONFIGURATION MANAGEMENT

KNOX-07-012400 - The Samsung Android 7 with Knox must implement the management setting: Disable Allow New Admin Install.AirWatch - DISA Samsung Android 7 with Knox 2.x v1r1MDM

CONFIGURATION MANAGEMENT

KNOX-07-012400 - The Samsung Android 7 with Knox must implement the management setting: Disable Allow New Admin Install.MobileIron - DISA Samsung Android 7 with Knox 2.x v1r1MDM

CONFIGURATION MANAGEMENT