Item Search

NameAudit NamePluginCategory
1.4.1 Ensure address space layout randomization (ASLR) is enabledCIS CentOS Linux 7 v4.0.0 L1 WorkstationUnix

SYSTEM AND INFORMATION INTEGRITY

1.4.1 Ensure address space layout randomization (ASLR) is enabledCIS Oracle Linux 7 v4.0.0 L1 WorkstationUnix

SYSTEM AND INFORMATION INTEGRITY

1.4.1 Ensure address space layout randomization (ASLR) is enabledCIS Red Hat EL8 Server L1 v3.0.0Unix

SYSTEM AND INFORMATION INTEGRITY

1.5.1 Ensure address space layout randomization is enabledCIS Ubuntu Linux 24.04 LTS v1.0.0 L1 ServerUnix

SYSTEM AND INFORMATION INTEGRITY

1.5.1 Ensure address space layout randomization is enabledCIS Ubuntu Linux 24.04 LTS v1.0.0 L1 WorkstationUnix

SYSTEM AND INFORMATION INTEGRITY

1.5.1 Ensure address space layout randomization is enabledCIS Debian Linux 11 v2.0.0 L1 ServerUnix

SYSTEM AND INFORMATION INTEGRITY

1.5.1 Ensure address space layout randomization is enabledCIS Ubuntu Linux 22.04 LTS v2.0.0 L1 ServerUnix

SYSTEM AND INFORMATION INTEGRITY

1.5.1 Ensure address space layout randomization is enabledCIS Ubuntu Linux 22.04 LTS v2.0.0 L1 WorkstationUnix

SYSTEM AND INFORMATION INTEGRITY

1.5.1 Ensure address space layout randomization is enabledCIS Red Hat Enterprise Linux 9 v2.0.0 L1 ServerUnix

SYSTEM AND INFORMATION INTEGRITY

1.5.1 Ensure address space layout randomization is enabledCIS Red Hat Enterprise Linux 9 v2.0.0 L1 WorkstationUnix

SYSTEM AND INFORMATION INTEGRITY

1.5.1 Ensure address space layout randomization is enabledCIS Rocky Linux 9 v2.0.0 L1 WorkstationUnix

SYSTEM AND INFORMATION INTEGRITY

1.5.2 Ensure bootloader password is set - password_pbkdf2CIS Debian Family Server L1 v1.0.0Unix

CONFIGURATION MANAGEMENT

1.5.2 Ensure bootloader password is set - set superusersCIS Debian Family Server L1 v1.0.0Unix

CONFIGURATION MANAGEMENT

2.2.3 Ensure 'ALLOWED_WEAK_CERT_ALGORITHMS' Is NOT SetCIS Oracle Database 23ai v1.0.0 L1 RDBMS On Windows Server Host OSWindows

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

3.1.2 Set 'no ip proxy-arp'CIS Cisco IOS XE 17.x v2.2.0 L2Cisco

CONFIGURATION MANAGEMENT

3.1.3.2 ndpd-hostCIS IBM AIX 7.1 L2 v2.1.0Unix

CONFIGURATION MANAGEMENT

3.1.12 Set administrative notification levelCIS IBM DB2 v10 v1.1.0 Windows OS Level 2Windows

AUDIT AND ACCOUNTABILITY

3.1.12 Set administrative notification levelCIS IBM DB2 v10 v1.1.0 Windows OS Level 1Windows

AUDIT AND ACCOUNTABILITY

4.1.3.20 Ensure the audit configuration is immutableCIS Fedora 28 Family Linux Server L2 v2.0.0Unix

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY, MEDIA PROTECTION

4.2 Ensure Federal Information Processing Standard (FIPS) is enabledCIS MongoDB L1 Unix Audit v1.0.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION

5.2.3.20 Ensure the audit configuration is immutableCIS Ubuntu Linux 18.04 LTS v2.2.0 L2 ServerUnix

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY, MEDIA PROTECTION

5.2.3.20 Ensure the audit configuration is immutableCIS Ubuntu Linux 20.04 LTS Server L2 v2.0.1Unix

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY, MEDIA PROTECTION

5.2.3.20 Ensure the audit configuration is immutableCIS Ubuntu Linux 18.04 LTS v2.2.0 L2 WorkstationUnix

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY, MEDIA PROTECTION

5.2.3.20 Ensure the audit configuration is immutableCIS AlmaLinux OS 8 Server L2 v3.0.0Unix

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY, MEDIA PROTECTION

5.3.2 Ensure system accounts are securedCIS Google Container-Optimized OS v1.2.0 L2 ServerUnix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

6.1.14 Audit system file permissionsCIS Oracle Linux 7 v4.0.0 L2 WorkstationUnix

ACCESS CONTROL, MEDIA PROTECTION

6.1.14 Audit system file permissionsCIS Oracle Linux 8 Server L2 v3.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

6.1.14 Audit system file permissionsCIS Red Hat EL8 Server L2 v3.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

6.1.14 Audit system file permissionsCIS Red Hat EL8 Workstation L2 v3.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

6.1.14 Audit system file permissionsCIS CentOS Linux 7 v4.0.0 L2 ServerUnix

ACCESS CONTROL, MEDIA PROTECTION

6.3.3.20 Ensure the audit configuration is immutableCIS Ubuntu Linux 22.04 LTS v2.0.0 L2 ServerUnix

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY, MEDIA PROTECTION

6.4.3.20 Ensure the audit configuration is immutableCIS Debian Linux 11 v2.0.0 L2 WorkstationUnix

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY, MEDIA PROTECTION

6.4.3.20 Ensure the audit configuration is immutableCIS Debian Linux 11 v2.0.0 L2 ServerUnix

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY, MEDIA PROTECTION

18.10.17.1 (L1) Ensure 'Download Mode' is NOT set to 'Enabled: Internet'CIS Microsoft Windows 11 Enterprise v4.0.0 L1Windows

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

18.10.17.1 (L1) Ensure 'Download Mode' is NOT set to 'Enabled: Internet'CIS Microsoft Windows 10 Enterprise v4.0.0 L1Windows

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

18.10.17.1 (L1) Ensure 'Download Mode' is NOT set to 'Enabled: Internet'CIS Microsoft Windows 10 Stand-alone v4.0.0 L1Windows

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

AOSX-13-000054 - The macOS system must implement approved Ciphers to protect the confidentiality of SSH connections.DISA STIG Apple Mac OSX 10.13 v2r5Unix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, MAINTENANCE

AOSX-14-000056 - The macOS system must implement an approved Key Exchange Algorithm.DISA STIG Apple Mac OSX 10.14 v2r6Unix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, MAINTENANCE

AOSX-15-000054 - The macOS system must implement approved Ciphers to protect the confidentiality of SSH connections..DISA STIG Apple Mac OSX 10.15 v1r10Unix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, MAINTENANCE

AOSX-15-000056 - The macOS system must implement an approved Key Exchange Algorithm.DISA STIG Apple Mac OSX 10.15 v1r10Unix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, MAINTENANCE

APPL-11-000054 - The macOS system must implement approved ciphers to protect the confidentiality of SSH connections.DISA STIG Apple macOS 11 v1r5Unix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, MAINTENANCE

APPL-11-000056 - The macOS system must implement an approved Key Exchange Algorithm.DISA STIG Apple macOS 11 v1r5Unix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, MAINTENANCE

APPL-11-000056 - The macOS system must implement an approved Key Exchange Algorithm.DISA STIG Apple macOS 11 v1r8Unix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, MAINTENANCE

DTOO242 - The prompt to display level 1 attachments must be disallowed when sending an item.DISA STIG Microsoft Outlook 2013 v1r14Windows

SYSTEM AND COMMUNICATIONS PROTECTION

GEN005531-ESXI5-000108 - The SSH daemon must not permit tunnels.DISA STIG VMWare ESXi Server 5 STIG v2r1VMware

CONFIGURATION MANAGEMENT

GEN005532-ESXI5-709 - The SSH client must not permit tunnels.DISA STIG VMWare ESXi Server 5 STIG v2r1VMware

CONFIGURATION MANAGEMENT

KNOX-07-900300 - The Samsung must be configured to not allow Container passwords with more than two repeating or sequential characters.MobileIron - DISA Samsung Android 7 with Knox 2.x v1r1MDM

CONFIGURATION MANAGEMENT

OL6-00-000227 - The SSH daemon must be configured to use only the SSHv2 protocol.DISA STIG Oracle Linux 6 v2r7Unix

IDENTIFICATION AND AUTHENTICATION

SLES-12-010440 - SUSE operating systems with Unified Extensible Firmware Interface (UEFI) implemented must require authentication upon booting into single-user mode and maintenance.DISA SLES 12 STIG v3r2Unix

ACCESS CONTROL

UBTU-18-010110 - The Ubuntu operating system must employ a FIPS 140-2 approved cryptographic hashing algorithms for all created and stored passwords.DISA STIG Ubuntu 18.04 LTS v2r15Unix

IDENTIFICATION AND AUTHENTICATION