Item Search

NameAudit NamePluginCategory
1.4 Use non-default account namesCIS IBM DB2 v10 v1.1.0 Linux OS Level 2Unix

ACCESS CONTROL

1.5 Configure DB2 to use non-standard ports - Port 523CIS IBM DB2 v10 v1.1.0 Windows OS Level 2Windows

CONFIGURATION MANAGEMENT

1.5 Configure DB2 to use non-standard ports - Port 50000CIS IBM DB2 v10 v1.1.0 Windows OS Level 2Windows

CONFIGURATION MANAGEMENT

2.2 Secure the database container directoryCIS IBM DB2 v10 v1.1.0 Linux OS Level 2Unix
3.1.3 Require explicit authorization for catalogingCIS IBM DB2 9 Benchmark v3.0.1 Level 2 DBIBM_DB2DB
3.1.4 Disable data links supportCIS IBM DB2 9 Benchmark v3.0.1 Level 2 DBIBM_DB2DB
3.1.11 Set maximum connection limits - MAX_CONNECTIONSCIS IBM DB2 v10 v1.1.0 Linux OS Level 2Unix

ACCESS CONTROL

3.1.11 Set maximum connection limits - MAX_COORDAGENTSCIS IBM DB2 v10 v1.1.0 Linux OS Level 2Unix

ACCESS CONTROL

3.1.11 Set maximum connection limits - MAXAPPLSCIS IBM DB2 v10 v1.1.0 Linux OS Level 2Unix

ACCESS CONTROL

3.1.12 Enable instance health monitoringCIS IBM DB2 9 Benchmark v3.0.1 Level 2 DBIBM_DB2DB
3.1.14 Set failed archive retry delayCIS IBM DB2 v10 v1.1.0 Windows OS Level 2Windows

CONFIGURATION MANAGEMENT

3.1.15 Auto-restart after abnormal terminationCIS IBM DB2 v10 v1.1.0 Linux OS Level 2Unix

CONFIGURATION MANAGEMENT

3.1.18 Secure permissions for the secondary archive log location - LOGARCHMETH2 OS PermissionCIS IBM DB2 v10 v1.1.0 Linux OS Level 2Unix
3.1.18 Secure permissions for the secondary archive log location - LOGARCHMETH2 SettingCIS IBM DB2 v10 v1.1.0 Windows OS Level 2Windows

AUDIT AND ACCOUNTABILITY

3.1.19 Secure permissions for the tertiary archive log location - FAILARCHPATH SettingCIS IBM DB2 v10 v1.1.0 Linux OS Level 2Unix

AUDIT AND ACCOUNTABILITY

4.3 Review Users, Groups, and Roles - Groups listCIS IBM DB2 v10 v1.1.0 Windows OS Level 2Windows

ACCESS CONTROL

6.7 Restrict Access to SYSCAT.ROUTINESCIS IBM DB2 9 Benchmark v3.0.1 Level 2 DBIBM_DB2DB

ACCESS CONTROL

6.8 Restrict Access to SYSCAT.INDEXAUTHCIS IBM DB2 9 Benchmark v3.0.1 Level 2 DBIBM_DB2DB

ACCESS CONTROL

6.19 Restrict Access to SYSCAT.SURROGATEAUTHIDSCIS IBM DB2 9 Benchmark v3.0.1 Level 2 DBIBM_DB2DB

ACCESS CONTROL

6.27 Restrict Access to SYSCAT.PROCEDURESCIS IBM DB2 9 Benchmark v3.0.1 Level 2 DBIBM_DB2DB

ACCESS CONTROL

6.29 Restrict Access to SYSCAT.TBSPACEAUTHCIS IBM DB2 9 Benchmark v3.0.1 Level 2 DBIBM_DB2DB

ACCESS CONTROL

6.34 Restrict Access to SYSCAT.XSROBJECTAUTHCIS IBM DB2 9 Benchmark v3.0.1 Level 2 DBIBM_DB2DB

ACCESS CONTROL

6.36 Restrict Access to SYSIBMADM.PRIVILEGESCIS IBM DB2 9 Benchmark v3.0.1 Level 2 DBIBM_DB2DB

ACCESS CONTROL

9.1 Start and Stop DB2 InstanceCIS IBM DB2 v10 v1.1.0 Windows OS Level 2Windows

ACCESS CONTROL

9.2 Review the role membersCIS IBM DB2 9 Benchmark v3.0.1 Level 2 DBIBM_DB2DB
9.4 Review roles granted to PUBLICCIS IBM DB2 9 Benchmark v3.0.1 Level 2 DBIBM_DB2DB
9.5 Enable SSL communication with LDAP serverCIS IBM DB2 v10 v1.1.0 Linux OS Level 2Unix

IDENTIFICATION AND AUTHENTICATION

9.6 Secure the permission of the IBMLDAPSecurity.ini fileCIS IBM DB2 v10 v1.1.0 Linux OS Level 2Unix
9.7 Secure the permission of the SSLconfig.ini fileCIS IBM DB2 v10 v1.1.0 Windows OS Level 2Windows
DKER-EE-001240 - The Docker Enterprise hosts process namespace must not be shared.DISA STIG Docker Enterprise 2.x Linux/Unix v2r2Unix

ACCESS CONTROL

DKER-EE-001250 - The Docker Enterprise hosts IPC namespace must not be shared.DISA STIG Docker Enterprise 2.x Linux/Unix v2r2Unix

ACCESS CONTROL

DKER-EE-001770 - Docker Incs official GPG key must be added to the host using the users operating systems respective package repository management tooling.DISA STIG Docker Enterprise 2.x Linux/Unix v2r2Unix

CONFIGURATION MANAGEMENT

DKER-EE-001800 - The insecure registry capability in the Docker Engine - Enterprise component of Docker Enterprise must be disabled.DISA STIG Docker Enterprise 2.x Linux/Unix v2r2Unix

CONFIGURATION MANAGEMENT

DKER-EE-001810 - On Linux, a non-AUFS storage driver in the Docker Engine - Enterprise component of Docker Enterprise must be used.DISA STIG Docker Enterprise 2.x Linux/Unix v2r2Unix

CONFIGURATION MANAGEMENT

DKER-EE-001930 - An appropriate AppArmor profile must be enabled on Ubuntu systems for Docker Enterprise.DISA STIG Docker Enterprise 2.x Linux/Unix v2r2Unix

CONFIGURATION MANAGEMENT

DKER-EE-001940 - SELinux security options must be set on Red Hat or CentOS systems for Docker Enterprise.DISA STIG Docker Enterprise 2.x Linux/Unix v2r2Unix

CONFIGURATION MANAGEMENT

DKER-EE-001960 - Privileged Linux containers must not be used for Docker Enterprise.DISA STIG Docker Enterprise 2.x Linux/Unix v2r2Unix

CONFIGURATION MANAGEMENT

DKER-EE-001970 - SSH must not run within Linux containers for Docker Enterprise.DISA STIG Docker Enterprise 2.x Linux/Unix v2r2Unix

CONFIGURATION MANAGEMENT

DKER-EE-001990 - Only required ports must be open on the containers in Docker Enterprise.DISA STIG Docker Enterprise 2.x Linux/Unix v2r2Unix

CONFIGURATION MANAGEMENT

DKER-EE-002090 - Docker Enterprise exec commands must not be used with the user option.DISA STIG Docker Enterprise 2.x Linux/Unix v2r2Unix

CONFIGURATION MANAGEMENT

DKER-EE-002100 - cgroup usage must be confirmed in Docker Enterprise.DISA STIG Docker Enterprise 2.x Linux/Unix v2r2Unix

CONFIGURATION MANAGEMENT

DKER-EE-002110 - All Docker Enterprise containers must be restricted from acquiring additional privileges.DISA STIG Docker Enterprise 2.x Linux/Unix v2r2Unix

CONFIGURATION MANAGEMENT

DKER-EE-002120 - The Docker Enterprise hosts user namespace must not be shared.DISA STIG Docker Enterprise 2.x Linux/Unix v2r2Unix

CONFIGURATION MANAGEMENT

DKER-EE-002410 - Docker Enterprise secret management commands must be used for managing secrets in a Swarm cluster.DISA STIG Docker Enterprise 2.x Linux/Unix v2r2Unix

IDENTIFICATION AND AUTHENTICATION

DKER-EE-003340 - Log aggregation/SIEM systems must be configured to notify SA and ISSO on Docker Engine - Enterprise audit failure events.DISA STIG Docker Enterprise 2.x Linux/Unix v2r2Unix

AUDIT AND ACCOUNTABILITY

DKER-EE-004130 - Docker Enterprise older Universal Control Plane (UCP) and Docker Trusted Registry (DTR) images must be removed from all cluster nodes upon upgrading.DISA STIG Docker Enterprise 2.x Linux/Unix v2r2Unix

SYSTEM AND INFORMATION INTEGRITY

DKER-EE-005080 - Docker Enterprise node certificates must be rotated as defined in the System Security Plan (SSP).DISA STIG Docker Enterprise 2.x Linux/Unix v2r2Unix

CONFIGURATION MANAGEMENT

DKER-EE-005210 - Docker Enterprise /etc/docker directory ownership must be set to root:root - CentOS/RHELDISA STIG Docker Enterprise 2.x Linux/Unix v2r2Unix

CONFIGURATION MANAGEMENT

DKER-EE-005300 - Docker Enterprise server certificate key file permissions must be set to 400.DISA STIG Docker Enterprise 2.x Linux/Unix v2r2Unix

CONFIGURATION MANAGEMENT

DKER-EE-005340 - Docker Enterprise daemon.json file permissions must be set to 644 or more restrictive.DISA STIG Docker Enterprise 2.x Linux/Unix v2r2Unix

CONFIGURATION MANAGEMENT