Item Search

NameAudit NamePluginCategory
1.5.2 Ensure ptrace_scope is restrictedCIS Debian Linux 12 v1.1.0 L1 WorkstationUnix

CONFIGURATION MANAGEMENT

1.5.2 Ensure ptrace_scope is restrictedCIS Ubuntu Linux 24.04 LTS v1.0.0 L1 WorkstationUnix

CONFIGURATION MANAGEMENT

1.5.2 Ensure ptrace_scope is restrictedCIS Debian Linux 12 v1.1.0 L1 ServerUnix

CONFIGURATION MANAGEMENT

2.4 Verify the groups within the DB2_GRP_LOOKUP environment variable are appropriate (Windows only)CIS IBM DB2 v10 v1.1.0 Windows OS Level 2Windows

ACCESS CONTROL

3.1.1 Enable audit bufferCIS IBM DB2 v10 v1.1.0 Windows OS Level 2Windows

AUDIT AND ACCOUNTABILITY

3.1.4 Disable datalinks supportCIS IBM DB2 v10 v1.1.0 Windows OS Level 2Windows
3.1.5 Secure default database location - DFTDBPATH set to INSTANCE_HOMECIS IBM DB2 9 Benchmark v3.0.1 Level 2 DBIBM_DB2DB
3.1.5 Secure permissions for default database file pathCIS IBM DB2 v10 v1.1.0 Windows OS Level 2Windows
3.1.7 Set diagnostic logging to capture errors and warningsCIS IBM DB2 9 Benchmark v3.0.1 Level 2 DBIBM_DB2DB
3.1.10 Disable instance discoverabilityCIS IBM DB2 9 Benchmark v3.0.1 Level 2 DBIBM_DB2DB
3.1.11 Set maximum connection limits - MAX_COORDAGENTSCIS IBM DB2 v10 v1.1.0 Windows OS Level 2Windows

SYSTEM AND COMMUNICATIONS PROTECTION

3.1.14 Set maximum connection limits - MAX_CONNECTIONSCIS IBM DB2 9 Benchmark v3.0.1 Level 2 DBIBM_DB2DB

ACCESS CONTROL

3.1.16 Disable database discoveryCIS IBM DB2 v10 v1.1.0 Windows OS Level 2Windows

CONFIGURATION MANAGEMENT

3.1.16 Enable server-based authenticationCIS IBM DB2 9 Benchmark v3.0.1 Level 2 DBIBM_DB2DB

IDENTIFICATION AND AUTHENTICATION

3.1.17 Secure permissions for the primary archive log location - LOGARCHMETH1 SettingCIS IBM DB2 v10 v1.1.0 Windows OS Level 2Windows

AUDIT AND ACCOUNTABILITY

3.1.18 Secure permissions for the secondary archive log location - LOGARCHMETH2 OS PermissionsCIS IBM DB2 v10 v1.1.0 Windows OS Level 2Windows

AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT

3.1.20 Secure permissions for the log mirror location - MIRRORLOGPATH SettingCIS IBM DB2 v10 v1.1.0 Windows OS Level 2Windows

AUDIT AND ACCOUNTABILITY

4.1 Review Organization's Policies against DB2 RCAC PoliciesCIS IBM DB2 v10 v1.1.0 Windows OS Level 2Windows
6.8 Restrict Access to SYSCAT.INDEXAUTHCIS IBM DB2 9 Benchmark v3.0.1 Level 2 DBIBM_DB2DB

ACCESS CONTROL

6.11 Restrict Access to SYSCAT.PASSTHRUAUTHCIS IBM DB2 9 Benchmark v3.0.1 Level 2 DBIBM_DB2DB

ACCESS CONTROL

6.15 Restrict Access to SYSCAT.SECURITYLABELSCIS IBM DB2 9 Benchmark v3.0.1 Level 2 DBIBM_DB2DB

ACCESS CONTROL

6.17 Restrict Access to SYSCAT.SECURITYPOLICYCOMPONENTRULESCIS IBM DB2 9 Benchmark v3.0.1 Level 2 DBIBM_DB2DB

ACCESS CONTROL

6.19 Restrict Access to SYSCAT.SURROGATEAUTHIDSCIS IBM DB2 9 Benchmark v3.0.1 Level 2 DBIBM_DB2DB

ACCESS CONTROL

6.27 Restrict Access to SYSCAT.PROCEDURESCIS IBM DB2 9 Benchmark v3.0.1 Level 2 DBIBM_DB2DB

ACCESS CONTROL

6.34 Restrict Access to SYSCAT.XSROBJECTAUTHCIS IBM DB2 9 Benchmark v3.0.1 Level 2 DBIBM_DB2DB

ACCESS CONTROL

7.2 Secure SYSCTRL authority - SYSCTRL GroupCIS IBM DB2 v10 v1.1.0 Windows OS Level 2Windows

ACCESS CONTROL

9.2 Review the role membersCIS IBM DB2 9 Benchmark v3.0.1 Level 2 DBIBM_DB2DB
9.4 Remove Default DatabasesCIS IBM DB2 v10 v1.1.0 Windows OS Level 2Windows

CONFIGURATION MANAGEMENT

9.4 Review roles granted to PUBLICCIS IBM DB2 9 Benchmark v3.0.1 Level 2 DBIBM_DB2DB
9.6 Secure the permission of the IBMLDAPSecurity.ini fileCIS IBM DB2 v10 v1.1.0 Windows OS Level 2Windows
9.9 Secure plug-in library locations - clientCIS IBM DB2 v10 v1.1.0 Windows OS Level 2Windows
Big Sur - Allow Smartcard AuthenticationNIST macOS Big Sur v1.4.0 - 800-53r4 ModerateUnix

IDENTIFICATION AND AUTHENTICATION

Big Sur - Allow Smartcard AuthenticationNIST macOS Big Sur v1.4.0 - All ProfilesUnix

IDENTIFICATION AND AUTHENTICATION

DKER-EE-001240 - The Docker Enterprise hosts process namespace must not be shared.DISA STIG Docker Enterprise 2.x Linux/Unix v2r2Unix

ACCESS CONTROL

DKER-EE-001250 - The Docker Enterprise hosts IPC namespace must not be shared.DISA STIG Docker Enterprise 2.x Linux/Unix v2r2Unix

ACCESS CONTROL

DKER-EE-001770 - Docker Incs official GPG key must be added to the host using the users operating systems respective package repository management tooling.DISA STIG Docker Enterprise 2.x Linux/Unix v2r2Unix

CONFIGURATION MANAGEMENT

DKER-EE-001800 - The insecure registry capability in the Docker Engine - Enterprise component of Docker Enterprise must be disabled.DISA STIG Docker Enterprise 2.x Linux/Unix v2r2Unix

CONFIGURATION MANAGEMENT

DKER-EE-001940 - SELinux security options must be set on Red Hat or CentOS systems for Docker Enterprise.DISA STIG Docker Enterprise 2.x Linux/Unix v2r2Unix

CONFIGURATION MANAGEMENT

DKER-EE-001960 - Privileged Linux containers must not be used for Docker Enterprise.DISA STIG Docker Enterprise 2.x Linux/Unix v2r2Unix

CONFIGURATION MANAGEMENT

DKER-EE-002090 - Docker Enterprise exec commands must not be used with the user option.DISA STIG Docker Enterprise 2.x Linux/Unix v2r2Unix

CONFIGURATION MANAGEMENT

DKER-EE-002100 - cgroup usage must be confirmed in Docker Enterprise.DISA STIG Docker Enterprise 2.x Linux/Unix v2r2Unix

CONFIGURATION MANAGEMENT

DKER-EE-002110 - All Docker Enterprise containers must be restricted from acquiring additional privileges.DISA STIG Docker Enterprise 2.x Linux/Unix v2r2Unix

CONFIGURATION MANAGEMENT

DKER-EE-002120 - The Docker Enterprise hosts user namespace must not be shared.DISA STIG Docker Enterprise 2.x Linux/Unix v2r2Unix

CONFIGURATION MANAGEMENT

DKER-EE-002410 - Docker Enterprise secret management commands must be used for managing secrets in a Swarm cluster.DISA STIG Docker Enterprise 2.x Linux/Unix v2r2Unix

IDENTIFICATION AND AUTHENTICATION

DKER-EE-003340 - Log aggregation/SIEM systems must be configured to notify SA and ISSO on Docker Engine - Enterprise audit failure events.DISA STIG Docker Enterprise 2.x Linux/Unix v2r2Unix

AUDIT AND ACCOUNTABILITY

DKER-EE-004130 - Docker Enterprise older Universal Control Plane (UCP) and Docker Trusted Registry (DTR) images must be removed from all cluster nodes upon upgrading.DISA STIG Docker Enterprise 2.x Linux/Unix v2r2Unix

SYSTEM AND INFORMATION INTEGRITY

DKER-EE-005080 - Docker Enterprise node certificates must be rotated as defined in the System Security Plan (SSP).DISA STIG Docker Enterprise 2.x Linux/Unix v2r2Unix

CONFIGURATION MANAGEMENT

DKER-EE-005210 - Docker Enterprise /etc/docker directory ownership must be set to root:root - CentOS/RHELDISA STIG Docker Enterprise 2.x Linux/Unix v2r2Unix

CONFIGURATION MANAGEMENT

DKER-EE-005300 - Docker Enterprise server certificate key file permissions must be set to 400.DISA STIG Docker Enterprise 2.x Linux/Unix v2r2Unix

CONFIGURATION MANAGEMENT

DKER-EE-005340 - Docker Enterprise daemon.json file permissions must be set to 644 or more restrictive.DISA STIG Docker Enterprise 2.x Linux/Unix v2r2Unix

CONFIGURATION MANAGEMENT