1.4.1 Ensure address space layout randomization (ASLR) is enabled | CIS CentOS Linux 7 v4.0.0 L1 Workstation | Unix | SYSTEM AND INFORMATION INTEGRITY |
1.4.1 Ensure address space layout randomization (ASLR) is enabled | CIS Oracle Linux 7 v4.0.0 L1 Workstation | Unix | SYSTEM AND INFORMATION INTEGRITY |
1.4.1 Ensure address space layout randomization (ASLR) is enabled | CIS Red Hat EL8 Server L1 v3.0.0 | Unix | SYSTEM AND INFORMATION INTEGRITY |
1.5.1 Ensure address space layout randomization is enabled | CIS Ubuntu Linux 24.04 LTS v1.0.0 L1 Server | Unix | SYSTEM AND INFORMATION INTEGRITY |
1.5.1 Ensure address space layout randomization is enabled | CIS Ubuntu Linux 24.04 LTS v1.0.0 L1 Workstation | Unix | SYSTEM AND INFORMATION INTEGRITY |
1.5.1 Ensure address space layout randomization is enabled | CIS Debian Linux 11 v2.0.0 L1 Server | Unix | SYSTEM AND INFORMATION INTEGRITY |
1.5.1 Ensure address space layout randomization is enabled | CIS Ubuntu Linux 22.04 LTS v2.0.0 L1 Server | Unix | SYSTEM AND INFORMATION INTEGRITY |
1.5.1 Ensure address space layout randomization is enabled | CIS Ubuntu Linux 22.04 LTS v2.0.0 L1 Workstation | Unix | SYSTEM AND INFORMATION INTEGRITY |
1.5.1 Ensure address space layout randomization is enabled | CIS Red Hat Enterprise Linux 9 v2.0.0 L1 Server | Unix | SYSTEM AND INFORMATION INTEGRITY |
1.5.1 Ensure address space layout randomization is enabled | CIS Red Hat Enterprise Linux 9 v2.0.0 L1 Workstation | Unix | SYSTEM AND INFORMATION INTEGRITY |
1.5.1 Ensure address space layout randomization is enabled | CIS Rocky Linux 9 v2.0.0 L1 Workstation | Unix | SYSTEM AND INFORMATION INTEGRITY |
1.5.2 Ensure bootloader password is set - password_pbkdf2 | CIS Debian Family Server L1 v1.0.0 | Unix | CONFIGURATION MANAGEMENT |
1.5.2 Ensure bootloader password is set - set superusers | CIS Debian Family Server L1 v1.0.0 | Unix | CONFIGURATION MANAGEMENT |
2.2.3 Ensure 'ALLOWED_WEAK_CERT_ALGORITHMS' Is NOT Set | CIS Oracle Database 23ai v1.0.0 L1 RDBMS On Windows Server Host OS | Windows | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION |
3.1.2 Set 'no ip proxy-arp' | CIS Cisco IOS XE 17.x v2.2.0 L2 | Cisco | CONFIGURATION MANAGEMENT |
3.1.3.2 ndpd-host | CIS IBM AIX 7.1 L2 v2.1.0 | Unix | CONFIGURATION MANAGEMENT |
3.1.12 Set administrative notification level | CIS IBM DB2 v10 v1.1.0 Windows OS Level 2 | Windows | AUDIT AND ACCOUNTABILITY |
3.1.12 Set administrative notification level | CIS IBM DB2 v10 v1.1.0 Windows OS Level 1 | Windows | AUDIT AND ACCOUNTABILITY |
4.1.3.20 Ensure the audit configuration is immutable | CIS Fedora 28 Family Linux Server L2 v2.0.0 | Unix | ACCESS CONTROL, AUDIT AND ACCOUNTABILITY, MEDIA PROTECTION |
4.2 Ensure Federal Information Processing Standard (FIPS) is enabled | CIS MongoDB L1 Unix Audit v1.0.0 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
5.2.3.20 Ensure the audit configuration is immutable | CIS Ubuntu Linux 18.04 LTS v2.2.0 L2 Server | Unix | ACCESS CONTROL, AUDIT AND ACCOUNTABILITY, MEDIA PROTECTION |
5.2.3.20 Ensure the audit configuration is immutable | CIS Ubuntu Linux 20.04 LTS Server L2 v2.0.1 | Unix | ACCESS CONTROL, AUDIT AND ACCOUNTABILITY, MEDIA PROTECTION |
5.2.3.20 Ensure the audit configuration is immutable | CIS Ubuntu Linux 18.04 LTS v2.2.0 L2 Workstation | Unix | ACCESS CONTROL, AUDIT AND ACCOUNTABILITY, MEDIA PROTECTION |
5.2.3.20 Ensure the audit configuration is immutable | CIS AlmaLinux OS 8 Server L2 v3.0.0 | Unix | ACCESS CONTROL, AUDIT AND ACCOUNTABILITY, MEDIA PROTECTION |
5.3.2 Ensure system accounts are secured | CIS Google Container-Optimized OS v1.2.0 L2 Server | Unix | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION |
6.1.14 Audit system file permissions | CIS Oracle Linux 7 v4.0.0 L2 Workstation | Unix | ACCESS CONTROL, MEDIA PROTECTION |
6.1.14 Audit system file permissions | CIS Oracle Linux 8 Server L2 v3.0.0 | Unix | ACCESS CONTROL, MEDIA PROTECTION |
6.1.14 Audit system file permissions | CIS Red Hat EL8 Server L2 v3.0.0 | Unix | ACCESS CONTROL, MEDIA PROTECTION |
6.1.14 Audit system file permissions | CIS Red Hat EL8 Workstation L2 v3.0.0 | Unix | ACCESS CONTROL, MEDIA PROTECTION |
6.1.14 Audit system file permissions | CIS CentOS Linux 7 v4.0.0 L2 Server | Unix | ACCESS CONTROL, MEDIA PROTECTION |
6.3.3.20 Ensure the audit configuration is immutable | CIS Ubuntu Linux 22.04 LTS v2.0.0 L2 Server | Unix | ACCESS CONTROL, AUDIT AND ACCOUNTABILITY, MEDIA PROTECTION |
6.4.3.20 Ensure the audit configuration is immutable | CIS Debian Linux 11 v2.0.0 L2 Workstation | Unix | ACCESS CONTROL, AUDIT AND ACCOUNTABILITY, MEDIA PROTECTION |
6.4.3.20 Ensure the audit configuration is immutable | CIS Debian Linux 11 v2.0.0 L2 Server | Unix | ACCESS CONTROL, AUDIT AND ACCOUNTABILITY, MEDIA PROTECTION |
18.10.17.1 (L1) Ensure 'Download Mode' is NOT set to 'Enabled: Internet' | CIS Microsoft Windows 11 Enterprise v4.0.0 L1 | Windows | RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY |
18.10.17.1 (L1) Ensure 'Download Mode' is NOT set to 'Enabled: Internet' | CIS Microsoft Windows 10 Enterprise v4.0.0 L1 | Windows | RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY |
18.10.17.1 (L1) Ensure 'Download Mode' is NOT set to 'Enabled: Internet' | CIS Microsoft Windows 10 Stand-alone v4.0.0 L1 | Windows | RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY |
AOSX-13-000054 - The macOS system must implement approved Ciphers to protect the confidentiality of SSH connections. | DISA STIG Apple Mac OSX 10.13 v2r5 | Unix | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, MAINTENANCE |
AOSX-14-000056 - The macOS system must implement an approved Key Exchange Algorithm. | DISA STIG Apple Mac OSX 10.14 v2r6 | Unix | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, MAINTENANCE |
AOSX-15-000054 - The macOS system must implement approved Ciphers to protect the confidentiality of SSH connections.. | DISA STIG Apple Mac OSX 10.15 v1r10 | Unix | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, MAINTENANCE |
AOSX-15-000056 - The macOS system must implement an approved Key Exchange Algorithm. | DISA STIG Apple Mac OSX 10.15 v1r10 | Unix | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, MAINTENANCE |
APPL-11-000054 - The macOS system must implement approved ciphers to protect the confidentiality of SSH connections. | DISA STIG Apple macOS 11 v1r5 | Unix | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, MAINTENANCE |
APPL-11-000056 - The macOS system must implement an approved Key Exchange Algorithm. | DISA STIG Apple macOS 11 v1r5 | Unix | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, MAINTENANCE |
APPL-11-000056 - The macOS system must implement an approved Key Exchange Algorithm. | DISA STIG Apple macOS 11 v1r8 | Unix | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, MAINTENANCE |
DTOO242 - The prompt to display level 1 attachments must be disallowed when sending an item. | DISA STIG Microsoft Outlook 2013 v1r14 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
GEN005531-ESXI5-000108 - The SSH daemon must not permit tunnels. | DISA STIG VMWare ESXi Server 5 STIG v2r1 | VMware | CONFIGURATION MANAGEMENT |
GEN005532-ESXI5-709 - The SSH client must not permit tunnels. | DISA STIG VMWare ESXi Server 5 STIG v2r1 | VMware | CONFIGURATION MANAGEMENT |
KNOX-07-900300 - The Samsung must be configured to not allow Container passwords with more than two repeating or sequential characters. | MobileIron - DISA Samsung Android 7 with Knox 2.x v1r1 | MDM | CONFIGURATION MANAGEMENT |
OL6-00-000227 - The SSH daemon must be configured to use only the SSHv2 protocol. | DISA STIG Oracle Linux 6 v2r7 | Unix | IDENTIFICATION AND AUTHENTICATION |
SLES-12-010440 - SUSE operating systems with Unified Extensible Firmware Interface (UEFI) implemented must require authentication upon booting into single-user mode and maintenance. | DISA SLES 12 STIG v3r2 | Unix | ACCESS CONTROL |
UBTU-18-010110 - The Ubuntu operating system must employ a FIPS 140-2 approved cryptographic hashing algorithms for all created and stored passwords. | DISA STIG Ubuntu 18.04 LTS v2r15 | Unix | IDENTIFICATION AND AUTHENTICATION |