Item Search

NameAudit NamePluginCategory
1.1.2.6.1 Ensure separate partition exists for /var/logCIS Amazon Linux 2 v3.0.0 L2Unix

AUDIT AND ACCOUNTABILITY

2.2.11 Disable Apache services - Make sure that /etc/apache/httpd.conf does not exist. Note this check is only applicable for Apache 1.xCIS Solaris 10 L1 v5.2Unix

CONFIGURATION MANAGEMENT

2.3.2 Ensure ldap client is not installedCIS Amazon Linux 2 v3.0.0 L2Unix

CONFIGURATION MANAGEMENT

2.4 Enable network password encryptionCIS Sybase 15.0 L1 DB v1.1.0SybaseDB

IDENTIFICATION AND AUTHENTICATION

2.4 Ensure the SharePoint setup account is configured with the minimum privileges on the SQL server.CIS Microsoft SharePoint 2019 DB v1.0.0MS_SQLDB
2.5 Ensure the SharePoint setup account is configured with the minimum privileges on the SQL server - db_ownerCIS Microsoft SharePoint 2016 DB v1.1.0MS_SQLDB

ACCESS CONTROL

3.2.1 Ensure dccp kernel module is not availableCIS Amazon Linux 2 v3.0.0 L2Unix

CONFIGURATION MANAGEMENT

3.2.2 Ensure tipc kernel module is not availableCIS Amazon Linux 2 v3.0.0 L2Unix

CONFIGURATION MANAGEMENT

3.8 Ensure the Lock File Is Secured - 'LockFile permissions'CIS Apache HTTP Server 2.2 L1 v3.6.0 MiddlewareUnix

ACCESS CONTROL

4.1.3 Ensure auditing for processes that start prior to auditd is enabledCIS Aliyun Linux 2 L2 v1.0.0Unix

AUDIT AND ACCOUNTABILITY

4.1.4 Ensure events that modify date and time information are collected - auditctl /etc/localtimeCIS Aliyun Linux 2 L2 v1.0.0Unix

CONFIGURATION MANAGEMENT

4.1.4 Ensure events that modify date and time information are collected - clock_settimeCIS Aliyun Linux 2 L2 v1.0.0Unix

CONFIGURATION MANAGEMENT

4.1.5 Ensure events that modify user/group information are collected - /etc/groupCIS Aliyun Linux 2 L2 v1.0.0Unix

AUDIT AND ACCOUNTABILITY

4.1.5 Ensure events that modify user/group information are collected - auditctl /etc/security/opasswdCIS Aliyun Linux 2 L2 v1.0.0Unix

AUDIT AND ACCOUNTABILITY

4.1.6 Ensure events that modify the system's network environment are collected - /etc/sysconfig/networkCIS Aliyun Linux 2 L2 v1.0.0Unix

CONFIGURATION MANAGEMENT

4.1.6 Ensure events that modify the system's network environment are collected - auditctl /etc/issue.netCIS Aliyun Linux 2 L2 v1.0.0Unix

CONFIGURATION MANAGEMENT

4.1.6 Ensure events that modify the system's network environment are collected - sethostname (64-bit)CIS Aliyun Linux 2 L2 v1.0.0Unix

CONFIGURATION MANAGEMENT

4.1.8 Ensure login and logout events are collected - /var/log/faillogCIS Aliyun Linux 2 L2 v1.0.0Unix

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

4.1.9 Ensure session initiation information is collected - /var/log/btmpCIS Aliyun Linux 2 L2 v1.0.0Unix

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

4.1.9 Ensure session initiation information is collected - auditctl /var/log/wtmpCIS Aliyun Linux 2 L2 v1.0.0Unix

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

4.1.14 Ensure file deletion events by users are collected - auditctl (32-bit)CIS Aliyun Linux 2 L2 v1.0.0Unix

AUDIT AND ACCOUNTABILITY

4.1.15 Ensure changes to system administration scope (sudoers) is collected - /etc/sudoers.dCIS Aliyun Linux 2 L2 v1.0.0Unix

AUDIT AND ACCOUNTABILITY

4.1.17 Ensure kernel module loading and unloading is collected - rmmodCIS Aliyun Linux 2 L2 v1.0.0Unix

AUDIT AND ACCOUNTABILITY

4.3.4 Ensure users must provide password for escalationCIS Amazon Linux 2 v3.0.0 L2Unix

ACCESS CONTROL

4.5.3.1 Ensure nologin is not listed in /etc/shellsCIS Amazon Linux 2 v3.0.0 L2Unix

IDENTIFICATION AND AUTHENTICATION

5.2.3.2 Ensure actions as another user are always loggedCIS Amazon Linux 2 v3.0.0 L2Unix

AUDIT AND ACCOUNTABILITY

5.2.3.4 Ensure events that modify date and time information are collectedCIS Amazon Linux 2 v3.0.0 L2Unix

AUDIT AND ACCOUNTABILITY

5.2.3.20 Ensure the audit configuration is immutableCIS Amazon Linux 2 v3.0.0 L2Unix

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY, MEDIA PROTECTION

5.2.4.9 Ensure audit tools are owned by rootCIS Amazon Linux 2 v3.0.0 L2Unix

ACCESS CONTROL, MEDIA PROTECTION

5.4.5 Ensure default user shell timeout is 900 seconds or less - /etc/bashrcCIS Aliyun Linux 2 L2 v1.0.0Unix

ACCESS CONTROL

6.1.1 Audit system file permissionsCIS Aliyun Linux 2 L2 v1.0.0Unix

ACCESS CONTROL

6.3 Ensure 'log_error_verbosity' is Set to '2'CIS MySQL 8.0 Community Database L2 v1.1.0MySQLDB

AUDIT AND ACCOUNTABILITY

6.3 Ensure 'log_error_verbosity' is Set to '2'CIS Oracle MySQL Enterprise Edition 8.0 v1.4.0 L2 DatabaseMySQLDB

AUDIT AND ACCOUNTABILITY

6.3 Ensure 'log_warnings' is Set to '2'CIS MariaDB 10.6 Database L2 v1.1.0MySQLDB

AUDIT AND ACCOUNTABILITY

CIS_Apache_Tomcat_7_L1_v1.1.0.audit Level 2CIS Apache Tomcat 7 L2 v1.1.0Unix
CIS_Docker_1.13.0_L2_v1.0.0.audit Level 2CIS Docker 1.13.0 v1.0.0 L2 DockerUnix
CIS_Solaris_10_L2_v5.2.0.audit Level 2CIS Solaris 10 L2 v5.2Unix
CIS_Solaris_11_L2_v1.1.0.audit Level 2CIS Solaris 11 L2 v1.1.0Unix
Enable IKE Version 1/2 - cipher-suiteTenable Cisco Viptela SD-WAN - vEdgeCisco_Viptela

SYSTEM AND COMMUNICATIONS PROTECTION

Encryption type for password protected Office 97-2003 filesMSCT Microsoft 365 Apps for Enterprise 2206 v1.0.0Windows

SYSTEM AND COMMUNICATIONS PROTECTION

Ensure DHCP services are disabled for untrusted interfaces - dhcpdTenable Cisco Firepower Threat Defense Best Practices AuditCisco_Firepower

CONFIGURATION MANAGEMENT

Excel 2 macrosheets and add-in filesMSCT Microsoft 365 Apps for Enterprise 2206 v1.0.0Windows

SYSTEM AND INFORMATION INTEGRITY

Excel 2 macrosheets and add-in filesMicrosoft 365 Apps for Enterprise 2306 v1.0.0Windows

SYSTEM AND INFORMATION INTEGRITY

Excel 2 macrosheets and add-in filesMSCT Office 2016 v1.0.0Windows

SYSTEM AND INFORMATION INTEGRITY

OH12-1X-000209 - A public OHS installation, if hosted on the NIPRNet, must be isolated in an accredited DoD DMZ Extension.DISA STIG Oracle HTTP Server 12.1.3 v2r3Unix

CONFIGURATION MANAGEMENT

OH12-1X-000210 - A private OHS installation must be located on a separate controlled access subnet.DISA STIG Oracle HTTP Server 12.1.3 v2r3Unix

CONFIGURATION MANAGEMENT

Remove file extensions blocked as Level 2MSCT Microsoft 365 Apps for Enterprise 2112 v1.0.0Windows

SYSTEM AND COMMUNICATIONS PROTECTION

Remove file extensions blocked as Level 2MSCT M365 Apps for enterprise 2312 v1.0.0Windows

SYSTEM AND COMMUNICATIONS PROTECTION

Remove file extensions blocked as Level 2MSCT Office 2016 v1.0.0Windows

SYSTEM AND COMMUNICATIONS PROTECTION

SQL4-00-031100 - SQL Server must use NIST FIPS 140-2 or 140-3 validated cryptographic modules for cryptographic operations.DISA STIG SQL Server 2014 Instance OS Audit v2r4Windows

IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION