Item Search

NameAudit NamePluginCategory
2.2.7 Ensure 'SQLNET.ENCRYPTION_SERVER' Is Set To 'REQUIRED'CIS Oracle Database 23ai v1.0.0 L1 RDBMS On Windows Server Host OSWindows

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

2.2.7 Ensure 'SQLNET.ENCRYPTION_SERVER' Is Set To 'REQUIRED'CIS Oracle Database 23ai v1.0.0 L1 RDBMS On Linux Host OSUnix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

5.2.2.3 (L1) Enable Conditional Access policies to block legacy authenticationCIS Microsoft 365 Foundations v5.0.0 L1 E3microsoft_azure

CONFIGURATION MANAGEMENT

5.2.2.3 (L1) Enable Conditional Access policies to block legacy authenticationCIS Microsoft 365 Foundations v5.0.0 L1 E5microsoft_azure

CONFIGURATION MANAGEMENT

5.7.1 Enable Security PostureCIS Google Kubernetes Engine (GKE) Autopilot v1.1.0 L2GCP

CONFIGURATION MANAGEMENT

6.1 Perform regular security audits of your host system and containersCIS Docker 1.11.0 v1.0.0 L1 DockerUnix
9.23 Find Un-owned Files and DirectoriesCIS Solaris 11.2 L1 v1.1.0Unix

ACCESS CONTROL

9.23 Find Un-owned Files and DirectoriesCIS Oracle Solaris 11.4 L1 v1.1.0Unix

CONFIGURATION MANAGEMENT

9.24 Find Un-owned Files and DirectoriesCIS Solaris 11 L1 v1.1.0Unix

ACCESS CONTROL

Disable AutomountingTenable Cisco Firepower Management Center OS Best Practices AuditUnix

CONFIGURATION MANAGEMENT

Ensure /etc/hosts.deny is configuredTenable Cisco Firepower Management Center OS Best Practices AuditUnix

SYSTEM AND COMMUNICATIONS PROTECTION

Ensure AIDE is installed - dpkgTenable Cisco Firepower Management Center OS Best Practices AuditUnix

CONFIGURATION MANAGEMENT

Ensure all users' home directories existTenable Cisco Firepower Management Center OS Best Practices AuditUnix

CONFIGURATION MANAGEMENT

Ensure at/cron is restricted to authorized users - cron.allowTenable Cisco Firepower Management Center OS Best Practices AuditUnix

ACCESS CONTROL

Ensure broadcast ICMP requests are ignored - sysctlTenable Cisco Firepower Management Center OS Best Practices AuditUnix

SYSTEM AND COMMUNICATIONS PROTECTION

Ensure changes to system administration scope (sudoers) is collected - /etc/sudoers.dTenable Cisco Firepower Management Center OS Best Practices AuditUnix

AUDIT AND ACCOUNTABILITY

Ensure DCCP is disabledTenable Cisco Firepower Management Center OS Best Practices AuditUnix

CONFIGURATION MANAGEMENT

Ensure discard services are not enabledTenable Cisco Firepower Management Center OS Best Practices AuditUnix

CONFIGURATION MANAGEMENT

Ensure discretionary access control permission modification events are collected - auditctl b32 setxattrTenable Cisco Firepower Management Center OS Best Practices AuditUnix

AUDIT AND ACCOUNTABILITY

Ensure events that modify date and time information are collected - audit.rules b64 adjtimexTenable Cisco Firepower Management Center OS Best Practices AuditUnix

AUDIT AND ACCOUNTABILITY

Ensure events that modify the system's network environment are collected - /etc/issueTenable Cisco Firepower Management Center OS Best Practices AuditUnix

AUDIT AND ACCOUNTABILITY

Ensure events that modify the system's network environment are collected - b64 sethostnameTenable Cisco Firepower Management Center OS Best Practices AuditUnix

AUDIT AND ACCOUNTABILITY

Ensure events that modify user/group information are collected - auditctl /etc/passwdTenable Cisco Firepower Management Center OS Best Practices AuditUnix

AUDIT AND ACCOUNTABILITY

Ensure filesystem integrity is regularly checkedTenable Cisco Firepower Management Center OS Best Practices AuditUnix

SYSTEM AND INFORMATION INTEGRITY

Ensure GDM login banner is configured - banner-message-enableTenable Cisco Firepower Management Center OS Best Practices AuditUnix

ACCESS CONTROL

Ensure HTTP Proxy Server is not enabledTenable Cisco Firepower Management Center OS Best Practices AuditUnix

CONFIGURATION MANAGEMENT

Ensure ICMP redirects are not accepted - /etc/sysctl ipv4 default acceptTenable Cisco Firepower Management Center OS Best Practices AuditUnix

SYSTEM AND COMMUNICATIONS PROTECTION

Ensure IMAP and POP3 server is not enabledTenable Cisco Firepower Management Center OS Best Practices AuditUnix

CONFIGURATION MANAGEMENT

Ensure IP forwarding is disabled - /etc/sysctlTenable Cisco Firepower Management Center OS Best Practices AuditUnix

SYSTEM AND COMMUNICATIONS PROTECTION

Ensure IPv6 router advertisements are not accepted - sysctl ipv6 default acceptTenable Cisco Firepower Management Center OS Best Practices AuditUnix

SYSTEM AND COMMUNICATIONS PROTECTION

Ensure LDAP client is not installed - dpkgTenable Cisco Firepower Management Center OS Best Practices AuditUnix

CONFIGURATION MANAGEMENT

Ensure LDAP client is not installed - rpmTenable Cisco Firepower Management Center OS Best Practices AuditUnix

CONFIGURATION MANAGEMENT

Ensure mail transfer agent is configured for local-only mode - main.cfTenable Cisco Firepower Management Center OS Best Practices AuditUnix

CONFIGURATION MANAGEMENT

Ensure mail transfer agent is configured for local-only mode - netstat listeningTenable Cisco Firepower Management Center OS Best Practices AuditUnix

CONFIGURATION MANAGEMENT

Ensure SCTP is disabledTenable Cisco Firepower Management Center OS Best Practices AuditUnix

CONFIGURATION MANAGEMENT

Ensure SSH LogLevel is set to INFOTenable Cisco Firepower Management Center OS Best Practices AuditUnix

AUDIT AND ACCOUNTABILITY

Ensure SSH PermitUserEnvironment is disabledTenable Cisco Firepower Management Center OS Best Practices AuditUnix

CONFIGURATION MANAGEMENT

Ensure SSH Protocol is set to 2Tenable Cisco Firepower Management Center OS Best Practices AuditUnix

CONFIGURATION MANAGEMENT

Ensure SSH warning banner is configuredTenable Cisco Firepower Management Center OS Best Practices AuditUnix

ACCESS CONTROL

Ensure TCP SYN Cookies is enabled - sysctlTenable Cisco Firepower Management Center OS Best Practices AuditUnix

SYSTEM AND COMMUNICATIONS PROTECTION

Ensure TCP Wrappers is installed - rpmTenable Cisco Firepower Management Center OS Best Practices AuditUnix

SYSTEM AND COMMUNICATIONS PROTECTION

JBOS-AS-000045 - Silent Authentication must be removed from the Default Application Security Realm.DISA JBoss EAP 6.3 STIG v2r6Unix

ACCESS CONTROL

JBOS-AS-000050 - Silent Authentication must be removed from the Default Management Security Realm.DISA JBoss EAP 6.3 STIG v2r6Unix

ACCESS CONTROL

SQL2-00-007900 - SQL Server must not grant users direct access control to the Alter Any Availability Group permission.DISA STIG SQL Server 2012 DB Instance Security v1r20MS_SQLDB

ACCESS CONTROL

SQL6-D0-007200 - Access to xp_cmdshell must be disabled, unless specifically required and approved.DISA STIG SQL Server 2016 Instance DB Audit v3r4MS_SQLDB

CONFIGURATION MANAGEMENT

SQL6-D0-007300 - Access to CLR code must be disabled or restricted, unless specifically required and approved.DISA STIG SQL Server 2016 Instance DB Audit v3r4MS_SQLDB

CONFIGURATION MANAGEMENT

SQL6-D0-017400 - Hadoop Connectivity feature must be disabled, unless specifically required and approved.DISA STIG SQL Server 2016 Instance DB Audit v3r4MS_SQLDB

CONFIGURATION MANAGEMENT

SQL6-D0-017500 - Allow Polybase Export feature must be disabled, unless specifically required and approved.DISA STIG SQL Server 2016 Instance DB Audit v3r4MS_SQLDB

CONFIGURATION MANAGEMENT

WBSP-AS-000960 - The WebSphere Application Server must be run as a non-admin user.DISA IBM WebSphere Traditional 9 STIG v1r1 MiddlewareUnix

CONFIGURATION MANAGEMENT

WBSP-AS-000960 - The WebSphere Application Server must be run as a non-admin user.DISA IBM WebSphere Traditional 9 STIG v1r1Unix

CONFIGURATION MANAGEMENT