Item Search

NameAudit NamePluginCategory
2.1.1.1.2 Set the 'ip domain name'CIS Cisco IOS 12 L1 v4.0.0Cisco

CONFIGURATION MANAGEMENT

3.10.30.1 (L1) Ensure 'Enable RPC Endpoint Mapper Client Authentication' is set to 'Enabled'CIS Microsoft Intune for Windows 11 v3.0.1 L1Windows

CONFIGURATION MANAGEMENT

CISC-L2-000020 - The Cisco switch must uniquely identify all network-connected endpoint devices before establishing any connection.DISA STIG Cisco NX-OS Switch L2S v3r2Cisco

IDENTIFICATION AND AUTHENTICATION

CISC-L2-000020 - The Cisco switch must uniquely identify and authenticate all network-connected endpoint devices before establishing any connection.DISA STIG Cisco IOS XE Switch L2S v3r1Cisco

IDENTIFICATION AND AUTHENTICATION

CISC-L2-000030 - The Cisco switch must authenticate all VLAN Trunk Protocol (VTP) messages with a hash function using the most secured cryptographic algorithm available.DISA STIG Cisco IOS XE Switch L2S v3r1Cisco

IDENTIFICATION AND AUTHENTICATION

CISC-L2-000080 - The Cisco switch must authenticate all endpoint devices before establishing any connection.DISA STIG Cisco NX-OS Switch L2S v3r2Cisco

IDENTIFICATION AND AUTHENTICATION

CISC-L2-000090 - The Cisco switch must have Root Guard enabled on all switch ports connecting to access layer switches and hosts.DISA STIG Cisco NX-OS Switch L2S v3r2Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

CISC-L2-000100 - The Cisco switch must have BPDU Guard enabled on all user-facing or untrusted access switch ports.DISA STIG Cisco IOS XE Switch L2S v3r1Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

CISC-L2-000120 - The Cisco switch must have Unknown Unicast Flood Blocking (UUFB) enabled.DISA STIG Cisco IOS XE Switch L2S v3r1Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

CISC-L2-000130 - The Cisco switch must have DHCP snooping for all user VLANs to validate DHCP messages from untrusted sources.DISA STIG Cisco NX-OS Switch L2S v3r2Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

CISC-L2-000170 - The Cisco switch must have IGMP or MLD Snooping configured on all VLANs.DISA STIG Cisco IOS XE Switch L2S v3r1Cisco

CONFIGURATION MANAGEMENT

CISC-L2-000180 - The Cisco switch must implement Rapid STP where VLANs span multiple switches with redundant links.DISA STIG Cisco IOS XE Switch L2S v3r1Cisco

CONFIGURATION MANAGEMENT

CISC-L2-000220 - The Cisco switch must not have the default VLAN assigned to any host-facing switch ports.DISA STIG Cisco NX-OS Switch L2S v3r2Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

CISC-L2-000250 - The Cisco switch must have all user-facing or untrusted ports configured as access switch ports.DISA STIG Cisco IOS XE Switch L2S v3r1Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

CISC-L2-000260 - The Cisco switch must have the native VLAN assigned to an ID other than the default VLAN for all 802.1q trunk links.DISA STIG Cisco NX-OS Switch L2S v3r2Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

CISC-L2-000270 - The Cisco switch must not have any switchports assigned to the native VLAN.DISA STIG Cisco NX-OS Switch L2S v3r2Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

CISC-ND-000110 - The Cisco switch must be configured to automatically audit account disabling actions.DISA STIG Cisco NX-OS Switch NDM v3r2Cisco

ACCESS CONTROL

CISC-ND-000120 - The Cisco switch must be configured to automatically audit account removal actions.DISA STIG Cisco NX-OS Switch NDM v3r2Cisco

ACCESS CONTROL

CISC-ND-000140 - The Cisco switch must be configured to enforce approved authorizations for controlling the flow of management information within the device based on control policies.DISA STIG Cisco NX-OS Switch NDM v3r2Cisco

ACCESS CONTROL

CISC-ND-000160 - The Cisco switch must be configured to display the Standard Mandatory DoD Notice and Consent Banner before granting access to the device.DISA STIG Cisco NX-OS Switch NDM v3r2Cisco

ACCESS CONTROL

CISC-ND-000290 - The Cisco switch must produce audit records containing information to establish where the events occurred.DISA STIG Cisco NX-OS Switch NDM v3r2Cisco

AUDIT AND ACCOUNTABILITY

CISC-ND-000470 - The Cisco switch must be configured to prohibit the use of all unnecessary and nonsecure functions and services.DISA STIG Cisco NX-OS Switch NDM v3r2Cisco

CONFIGURATION MANAGEMENT

CISC-ND-000720 - The Cisco switch must be configured to terminate all network connections associated with device management after five minutes of inactivity.DISA STIG Cisco NX-OS Switch NDM v3r2Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

CISC-ND-001210 - The Cisco switch must be configured to implement cryptographic mechanisms to protect the confidentiality of remote maintenance sessions.DISA STIG Cisco NX-OS Switch NDM v3r2Cisco

MAINTENANCE

CISC-ND-001240 - The Cisco switch must be configured to generate log records when administrator privileges are modified.DISA STIG Cisco NX-OS Switch NDM v3r2Cisco

AUDIT AND ACCOUNTABILITY

CISC-ND-001250 - The Cisco switch must be configured to generate log records when administrator privileges are deleted.DISA STIG Cisco NX-OS Switch NDM v3r2Cisco

AUDIT AND ACCOUNTABILITY

CISC-ND-001270 - The Cisco switch must be configured to generate log records for privileged activities.DISA STIG Cisco NX-OS Switch NDM v3r2Cisco

AUDIT AND ACCOUNTABILITY

CISC-ND-001280 - The Cisco switch must generate audit records showing starting and ending time for administrator access to the system.DISA STIG Cisco NX-OS Switch NDM v3r2Cisco

AUDIT AND ACCOUNTABILITY

CISC-ND-001370 - The Cisco switch must be configured to use at least two authentication servers for the purpose of authenticating users prior to granting administrative access.DISA STIG Cisco NX-OS Switch NDM v3r2Cisco

CONFIGURATION MANAGEMENT

CISC-RT-000190 - The Cisco switch must be configured to have Internet Control Message Protocol (ICMP) redirect messages disabled on all external interfaces.DISA STIG Cisco NX-OS Switch RTR v3r2Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

CISC-RT-000200 - The Cisco switch must be configured to log all packets that have been dropped at interfaces via an ACL.DISA STIG Cisco NX-OS Switch RTR v3r2Cisco

AUDIT AND ACCOUNTABILITY

CISC-RT-000250 - The Cisco perimeter switch must be configured to enforce approved authorizations for controlling the flow of information between interconnected networks in accordance with applicable policy.DISA STIG Cisco IOS XE Switch RTR v3r1Cisco

ACCESS CONTROL

CISC-RT-000310 - The Cisco perimeter switch must be configured to restrict it from accepting outbound IP packets that contain an illegitimate address in the source address field via egress filter or by enabling Unicast Reverse Path Forwarding (uRPF).DISA STIG Cisco NX-OS Switch RTR v3r2Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

CISC-RT-000520 - The Cisco BGP switch must be configured to reject outbound route advertisements for any prefixes that do not belong to any customers or the local autonomous system (AS).DISA STIG Cisco NX-OS Switch RTR v3r2Cisco

ACCESS CONTROL

CISC-RT-000530 - The Cisco BGP switch must be configured to reject outbound route advertisements for any prefixes belonging to the IP core.DISA STIG Cisco NX-OS Switch RTR v3r2Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

CISC-RT-000540 - The Cisco BGP switch must be configured to reject route advertisements from BGP peers that do not list their autonomous system (AS) number as the first AS in the AS_PATH attribute.DISA STIG Cisco NX-OS Switch RTR v3r2Cisco

ACCESS CONTROL

CISC-RT-000630 - The Cisco PE switch must be configured to have each Virtual Routing and Forwarding (VRF) instance bound to the appropriate physical or logical interfaces to maintain traffic separation between all MPLS L3VPNs.DISA STIG Cisco NX-OS Switch RTR v3r2Cisco

CONTINGENCY PLANNING

CISC-RT-000660 - The Cisco PE switch providing MPLS Layer 2 Virtual Private Network (L2VPN) services must be configured to authenticate targeted Label Distribution Protocol (LDP) sessions used to exchange virtual circuit (VC) information using a FIPS-approved message authentication code algorithm.DISA STIG Cisco NX-OS Switch RTR v3r2Cisco

IDENTIFICATION AND AUTHENTICATION

CISC-RT-000710 - The Cisco PE switch must be configured to implement Internet Group Management Protocol (IGMP) or Multicast Listener Discovery (MLD) snooping for each Virtual Private LAN Services (VPLS) bridge domain.DISA STIG Cisco NX-OS Switch RTR v3r2Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

CISC-RT-000820 - The Cisco multicast Rendezvous Point (RP) switch must be configured to limit the multicast forwarding cache so that its resources are not saturated by managing an overwhelming number of Protocol Independent Multicast (PIM) and Multicast Source Discovery Protocol (MSDP) source-active entries.DISA STIG Cisco NX-OS Switch RTR v3r2Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

CISC-RT-000830 - The Cisco multicast Rendezvous Point (RP) switch must be configured to filter Protocol Independent Multicast (PIM) Register messages received from the Designated switch (DR) for any undesirable multicast groups and sources.DISA STIG Cisco IOS XE Switch RTR v3r1Cisco

ACCESS CONTROL

CISC-RT-000830 - The Cisco multicast Rendezvous Point (RP) switch must be configured to filter Protocol Independent Multicast (PIM) Register messages received from the Designated switch (DR) for any undesirable multicast groups and sources.DISA STIG Cisco NX-OS Switch RTR v3r2Cisco

ACCESS CONTROL

CISC-RT-000840 - The Cisco multicast Rendezvous Point (RP) switch must be configured to filter Protocol Independent Multicast (PIM) Join messages received from the Designated Cisco switch (DR) for any undesirable multicast groups.DISA STIG Cisco IOS XE Switch RTR v3r1Cisco

ACCESS CONTROL

CISC-RT-000860 - The Cisco multicast Designated switch (DR) must be configured to filter the Internet Group Management Protocol (IGMP) and Multicast Listener Discovery (MLD) Report messages to allow hosts to join only multicast groups that have been approved by the organization.DISA STIG Cisco NX-OS Switch RTR v3r2Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

CISC-RT-000880 - The Cisco multicast Designated switch (DR) must be configured to limit the number of mroute states resulting from Internet Group Management Protocol (IGMP) and Multicast Listener Discovery (MLD) Host Membership Reports.DISA STIG Cisco IOS XE Switch RTR v3r1Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

CISC-RT-000880 - The Cisco multicast Designated switch (DR) must be configured to limit the number of mroute states resulting from Internet Group Management Protocol (IGMP) and Multicast Listener Discovery (MLD) Host Membership Reports.DISA STIG Cisco NX-OS Switch RTR v3r2Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

CISC-RT-000910 - The Cisco Multicast Source Discovery Protocol (MSDP) switch must be configured to authenticate all received MSDP packets.DISA STIG Cisco NX-OS Switch RTR v3r2Cisco

IDENTIFICATION AND AUTHENTICATION

DISA_VMware_vSphere_8.0_vCenter_Appliance_Management_Interface_(VAMI)_STIG_v2r1.audit from DISA VMware vSphere 8.0 vCenter Appliance Management Interface (VAMI) STIG v2r1DISA VMware vSphere 8.0 vCenter Appliance Management Interface (VAMI) STIG v2r1Unix
DISA_VMware_vSphere_8.0_vCenter_Appliance_User_Interface_(UI)_STIG_v2r1.audit from DISA VMware vSphere 8.0 vCenter Appliance User Interface (UI) STIG v2r1DISA VMware vSphere 8.0 vCenter Appliance User Interface (UI) STIG v2r1Unix
FGFW-ND-000290 - The FortiGate device must protect against known types of denial-of-service (DoS) attacks by employing organization-defined security safeguards.DISA Fortigate Firewall NDM STIG v1r4FortiGate

SYSTEM AND COMMUNICATIONS PROTECTION