Item Search

NameAudit NamePluginCategory
1.1.1 Enable 'aaa new-model'CIS Cisco IOS XE 16.x v2.1.0 L1Cisco

ACCESS CONTROL

1.1.1 Enable 'aaa new-model'CIS Cisco IOS XE 17.x v2.1.1 L1Cisco

ACCESS CONTROL

1.1.1.1 Configure AAA Authentication - TACACS if applicableCIS Cisco NX-OS v1.2.0 L1Cisco

ACCESS CONTROL

1.1.2 Enable 'aaa authentication login'CIS Cisco IOS 15 L1 v4.1.1Cisco

ACCESS CONTROL

1.1.2 Enable 'aaa authentication login'CIS Cisco IOS XE 16.x v2.1.0 L1Cisco

ACCESS CONTROL

1.1.2 Enable 'aaa authentication login'CIS Cisco IOS XE 17.x v2.1.1 L1Cisco

ACCESS CONTROL

1.1.12 - AirWatch - Turn off VPN when not neededAirWatch - CIS Apple iOS 9 v1.0.0 L1MDM

ACCESS CONTROL

1.1.12 - MobileIron - Turn off VPN when not neededMobileIron - CIS Apple iOS 9 v1.0.0 L1MDM

ACCESS CONTROL

1.1.13 - AirWatch - Turn off VPN when not neededAirWatch - CIS Apple iOS 8 v1.0.0 L1MDM

ACCESS CONTROL

1.1.13 - MobileIron - Turn off VPN when not neededMobileIron - CIS Apple iOS 8 v1.0.0 L1MDM

ACCESS CONTROL

1.2.2 Set 'modulus' to greater than or equal to 2048 for 'crypto key generate rsa'CIS Cisco IOS XR 7.x v1.0.0 L1Cisco

IDENTIFICATION AND AUTHENTICATION

1.2.5 Set 'access-class' for 'line vty'CIS Cisco IOS XE 16.x v2.1.0 L1Cisco

ACCESS CONTROL, SYSTEM AND INFORMATION INTEGRITY

1.2.5 Set 'access-class' for 'line vty'CIS Cisco IOS XE 17.x v2.1.1 L1Cisco

ACCESS CONTROL, SYSTEM AND INFORMATION INTEGRITY

1.5.6 Create an 'access-list' for use with SNMP - 'SNMP deny secured by ACL'CIS Cisco IOS 12 L1 v4.0.0Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

1.5.6 Create an 'access-list' for use with SNMP - 'SNMP permit secured by ACL'CIS Cisco IOS 12 L1 v4.0.0Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

2.1.1.1.3 Set 'modulus' to greater than or equal to 2048 for 'crypto key generate rsa'CIS Cisco IOS 12 L1 v4.0.0Cisco

IDENTIFICATION AND AUTHENTICATION

3.1.1 Set 'no ip source-route'CIS Cisco IOS XE 17.x v2.1.1 L1Cisco

CONFIGURATION MANAGEMENT

3.1.1 Set 'no ip source-route'CIS Cisco IOS XE 16.x v2.1.0 L1Cisco

SYSTEM AND INFORMATION INTEGRITY

3.5.1 Basic Fiber Channel ConfigurationCIS Cisco NX-OS v1.2.0 L2Cisco

ACCESS CONTROL, CONFIGURATION MANAGEMENT

17.2.5 Ensure 'Audit Other Account Management Events' is set to include 'Success' (STIG Only)CIS Microsoft Windows Server 2016 STIG v3.0.0 STIG DCWindows

AUDIT AND ACCOUNTABILITY

17.2.5 Ensure 'Audit Other Account Management Events' is set to include 'Success' (STIG Only)CIS Microsoft Windows Server 2016 STIG v3.0.0 STIG MSWindows

AUDIT AND ACCOUNTABILITY

CIS_Cisco_IOS_12_v4.0.0_Level_1.audit for Cisco IOS 12 from CIS Cisco IOS 12 Benchmark v4.0.0CIS Cisco IOS 12 L1 v4.0.0Cisco
CIS_Cisco_IOS_12_v4.0.0_Level_2.audit for Cisco IOS 12 from CIS Cisco IOS 12 Benchmark v4.0.0CIS Cisco IOS 12 L2 v4.0.0Cisco
CIS_Cisco_IOS_15_v4.1.1_Level_2.audit from CIS Cisco IOS 15 BenchmarkCIS Cisco IOS 15 L2 v4.1.1Cisco
CISC-RT-000370 - The Cisco perimeter router must be configured to have Cisco Discovery Protocol (CDP) disabled on all external interfaces.DISA STIG Cisco IOS Router RTR v3r2Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

CISC-RT-000370 - The Cisco perimeter router must be configured to have Cisco Discovery Protocol (CDP) disabled on all external interfaces.DISA STIG Cisco IOS-XR Router RTR v3r2Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

CISC-RT-000370 - The Cisco perimeter router must be configured to have Cisco Discovery Protocol (CDP) disabled on all external interfaces.DISA STIG Cisco IOS XE Router RTR v3r2Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

CISC-RT-000370 - The Cisco perimeter switch must be configured to have Cisco Discovery Protocol (CDP) disabled on all external interfaces.DISA STIG Cisco IOS XE Switch RTR v3r1Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

CISC-RT-000370 - The Cisco perimeter switch must be configured to have Cisco Discovery Protocol (CDP) disabled on all external interfaces.DISA STIG Cisco IOS Switch RTR v3r1Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

CISC-RT-000370 - The Cisco perimeter switch must be configured to have Cisco Discovery Protocol (CDP) disabled on all external interfaces.DISA STIG Cisco NX-OS Switch RTR v3r2Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

ESXI-67-000065 - For the ESXi host, all port groups must not be configured to VLAN values reserved by upstream physical switches.DISA STIG VMware vSphere 6.7 ESXi v1r3VMware

CONFIGURATION MANAGEMENT

Fabric Security - Policy - FIPS ModeTenable Cisco ACICisco_ACI

SYSTEM AND COMMUNICATIONS PROTECTION

FGFW-ND-000085 - The FortiGate device must generate audit records showing starting and ending time for administrator access to the systemDISA Fortigate Firewall NDM STIG v1r4FortiGate

AUDIT AND ACCOUNTABILITY

FGFW-ND-000125 - The FortiGate device must record time stamps for audit records that can be mapped to Coordinated Universal Time (UTC) or Greenwich Mean Time (GMT).DISA Fortigate Firewall NDM STIG v1r4FortiGate

AUDIT AND ACCOUNTABILITY

FGFW-ND-000130 - The FortiGate device must protect audit information from unauthorized deletion.DISA Fortigate Firewall NDM STIG v1r4FortiGate

AUDIT AND ACCOUNTABILITY

FGFW-ND-000140 - The FortiGate device must protect audit tools from unauthorized modification.DISA Fortigate Firewall NDM STIG v1r4FortiGate

AUDIT AND ACCOUNTABILITY

FGFW-ND-000190 - FortiGate devices performing maintenance functions must restrict use of these functions to authorized personnel only.DISA Fortigate Firewall NDM STIG v1r4FortiGate

CONFIGURATION MANAGEMENT, MAINTENANCE

FGFW-ND-000195 - The FortiGate device must use DoD-approved Certificate Authorities (CAs) for public key certificates.DISA Fortigate Firewall NDM STIG v1r4FortiGate

CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

FGFW-ND-000210 - The FortiGate device must authenticate SNMP messages using a FIPS-validated Keyed-Hash Message Authentication Code (HMAC)DISA Fortigate Firewall NDM STIG v1r4FortiGate

IDENTIFICATION AND AUTHENTICATION

FGFW-ND-000215 - The FortiGate device must authenticate Network Time Protocol (NTP) sources using authentication that is cryptographically based.DISA Fortigate Firewall NDM STIG v1r4FortiGate

IDENTIFICATION AND AUTHENTICATION

FGFW-ND-000230 - The FortiGate device must enforce password complexity by requiring that at least one lowercase character be used.DISA Fortigate Firewall NDM STIG v1r4FortiGate

IDENTIFICATION AND AUTHENTICATION

FGFW-ND-000240 - The FortiGate device must enforce password complexity by requiring that at least one special character be used.DISA Fortigate Firewall NDM STIG v1r4FortiGate

IDENTIFICATION AND AUTHENTICATION

FGFW-ND-000250 - The FortiGate device must not have any default manufacturer passwords when deployed.DISA Fortigate Firewall NDM STIG v1r4FortiGate

IDENTIFICATION AND AUTHENTICATION

FGFW-ND-000260 - The FortiGate devices must use FIPS-validated Keyed-Hash Message Authentication Code (HMAC) to protect the integrity of nonlocal maintenance and diagnostic communications.DISA Fortigate Firewall NDM STIG v1r4FortiGate

MAINTENANCE

FGFW-ND-000280 - The FortiGate device must generate unique session identifiers using a FIPS 140-2-approved random number generator.DISA Fortigate Firewall NDM STIG v1r4FortiGate

SYSTEM AND COMMUNICATIONS PROTECTION

FGFW-ND-000290 - The FortiGate device must protect against known types of denial-of-service (DoS) attacks by employing organization-defined security safeguards.DISA Fortigate Firewall NDM STIG v1r4FortiGate

SYSTEM AND COMMUNICATIONS PROTECTION

FGFW-ND-000300 - The FortiGate device must limit the number of logon and user sessionsDISA Fortigate Firewall NDM STIG v1r4FortiGate

ACCESS CONTROL

Include Logout in Session RecordsTenable Cisco ACICisco_ACI

AUDIT AND ACCOUNTABILITY

JUSX-VN-000022 - The Juniper SRX Services Gateway VPN must terminate all network connections associated with a communications session at the end of the session.DISA Juniper SRX Services Gateway VPN v3r1Juniper

SYSTEM AND COMMUNICATIONS PROTECTION

PHTN-40-000244 The Photon operating system must enable hardlink access control protection in the kernel.DISA VMware vSphere 8.0 vCenter Appliance Photon OS 4.0 STIG v2r1Unix

CONFIGURATION MANAGEMENT