Item Search

NameAudit NamePluginCategory
1.3 Ensure a customer created Customer Master Key (CMK) is created for the Database-TierCIS Amazon Web Services Three-tier Web Architecture L2 1.0.0amazon_aws

ACCESS CONTROL

1.8 Ensure all Customer owned Amazon Machine Images for Application Tier are not shared publiclyCIS Amazon Web Services Three-tier Web Architecture L1 1.0.0amazon_aws

ACCESS CONTROL

1.9 Ensure Web Tier ELB have SSL/TLS Certificate attachedCIS Amazon Web Services Three-tier Web Architecture L1 1.0.0amazon_aws
1.10 Ensure Web Tier ELB have the latest SSL Security Policies configuredCIS Amazon Web Services Three-tier Web Architecture L1 1.0.0amazon_aws

SYSTEM AND COMMUNICATIONS PROTECTION

1.11 Ensure Web Tier ELB is using HTTPS listenerCIS Amazon Web Services Three-tier Web Architecture L2 1.0.0amazon_aws

IDENTIFICATION AND AUTHENTICATION

1.12 Ensure App Tier ELB have SSL\TLS Certificate attachedCIS Amazon Web Services Three-tier Web Architecture L2 1.0.0amazon_aws

SYSTEM AND COMMUNICATIONS PROTECTION

1.16 Ensure all S3 buckets have policy to require server-side and in transit encryption for all objects stored in bucket.CIS Amazon Web Services Three-tier Web Architecture L1 1.0.0amazon_aws

SYSTEM AND COMMUNICATIONS PROTECTION

2.1.1 Disable Bluetooth, if no paired devices existCIS Apple OSX 10.10 Yosemite L1 v1.2.0Unix
2.2 Ensure IAM Policy for EC2 IAM Roles for App tier is configuredCIS Amazon Web Services Three-tier Web Architecture L1 1.0.0amazon_aws

ACCESS CONTROL

2.7 Ensure an IAM group for administration purposes is createdCIS Amazon Web Services Three-tier Web Architecture L1 1.0.0amazon_aws
2.8 Ensure monitoring and alerting exists for new share exposuresCIS Snowflake Foundations v1.0.0 L1Snowflake

AUDIT AND ACCOUNTABILITY

3.1 Ensure each Auto-Scaling Group has an associated Elastic Load BalancerCIS Amazon Web Services Three-tier Web Architecture L1 1.0.0amazon_aws

CONFIGURATION MANAGEMENT

3.7 Ensure Relational Database Service backup retention policy is setCIS Amazon Web Services Three-tier Web Architecture L1 1.0.0amazon_aws

CONTINGENCY PLANNING

3.13 Ensure all CloudFront Distributions require HTTPS between CloudFront and your Web-Tier ELB originCIS Amazon Web Services Three-tier Web Architecture L2 1.0.0amazon_aws

SYSTEM AND COMMUNICATIONS PROTECTION

4.1 Ensure a SNS topic is created for sending out notifications from Cloudtwatch Alarms and Auto-Scaling Groups - CloudwatchAlarmsCIS Amazon Web Services Three-tier Web Architecture L1 1.0.0amazon_aws

SYSTEM AND INFORMATION INTEGRITY

4.1 Ensure a SNS topic is created for sending out notifications from Cloudtwatch Alarms and Auto-Scaling Groups - List SNS SubscriptionsCIS Amazon Web Services Three-tier Web Architecture L1 1.0.0amazon_aws

ACCESS CONTROL

4.2 Ensure a SNS topic is created for sending out notifications from RDS events - List SNS SubscriptionsCIS Amazon Web Services Three-tier Web Architecture L1 1.0.0amazon_aws

ACCESS CONTROL

5.1 Ensure all resources are correctly taggedCIS Amazon Web Services Three-tier Web Architecture L1 1.0.0amazon_aws
5.2 Ensure AWS Elastic Load Balancer logging is enabledCIS Amazon Web Services Three-tier Web Architecture L1 1.0.0amazon_aws

AUDIT AND ACCOUNTABILITY

5.10 Ensure an AWS Managed Config Rule for encrypted volumes is applied to Web Tier - EncryptionCIS Amazon Web Services Three-tier Web Architecture L1 1.0.0amazon_aws

SYSTEM AND COMMUNICATIONS PROTECTION

5.11 Ensure an AWS Managed Config Rule for encrypted volumes is applied to App Tier - KMS IDCIS Amazon Web Services Three-tier Web Architecture L1 1.0.0amazon_aws

SYSTEM AND COMMUNICATIONS PROTECTION

6.2 Ensure a DNS alias record for the root domainCIS Amazon Web Services Three-tier Web Architecture L2 1.0.0amazon_aws

SYSTEM AND COMMUNICATIONS PROTECTION

6.3 Use CloudFront Content Distribution NetworkCIS Amazon Web Services Three-tier Web Architecture L1 1.0.0amazon_aws
6.6 Ensure subnets for the Web tier are createdCIS Amazon Web Services Three-tier Web Architecture L1 1.0.0amazon_aws

SYSTEM AND COMMUNICATIONS PROTECTION

6.15 Ensure Routing Table associated with App tier subnet have the default route (0.0.0.0/0) defined to allow connectivityCIS Amazon Web Services Three-tier Web Architecture L1 1.0.0amazon_aws

SYSTEM AND COMMUNICATIONS PROTECTION

6.19 Create the Web tier Security Group and ensure it allows inbound connections from Web tier ELB Security Group for explicit portsCIS Amazon Web Services Three-tier Web Architecture L1 1.0.0amazon_aws

SYSTEM AND COMMUNICATIONS PROTECTION

6.20 Ensure Web tier Security Group has no inbound rules for CIDR of 0 (Global Allow)CIS Amazon Web Services Three-tier Web Architecture L1 1.0.0amazon_aws

SYSTEM AND COMMUNICATIONS PROTECTION

6.28 Ensure EC2 instances within App Tier have no Elastic / Public IP addresses associatedCIS Amazon Web Services Three-tier Web Architecture L1 1.0.0amazon_aws

SYSTEM AND COMMUNICATIONS PROTECTION

AIX7-00-002146 - The AIX /etc/syslog.conf file must have a mode of 0640 or less permissive.DISA STIG AIX 7.x v3r1Unix

CONFIGURATION MANAGEMENT

APPL-15-003080 - The macOS system must disable accounts after 35 days of inactivity.DISA Apple macOS 15 (Sequoia) STIG v1r3Unix

ACCESS CONTROL

Big Sur - Disable Accounts after 35 Days of InactivityNIST macOS Big Sur v1.4.0 - 800-171Unix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

Big Sur - Disable Accounts after 35 Days of InactivityNIST macOS Big Sur v1.4.0 - All ProfilesUnix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

Big Sur - Disable Accounts after 35 Days of InactivityNIST macOS Big Sur v1.4.0 - CNSSI 1253Unix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

BIND-9X-001042 - The BIND 9.x server implementation must maintain at least 3 file versions of the local log file.DISA BIND 9.x STIG v2r3Unix

AUDIT AND ACCOUNTABILITY

Brocade - Bottleneck alerts must be enabledTenable Best Practices Brocade FabricOSBrocade

AUDIT AND ACCOUNTABILITY

Catalina - Disable Accounts after 35 Days of InactivityNIST macOS Catalina v1.5.0 - 800-53r5 HighUnix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

Catalina - Disable Accounts after 35 Days of InactivityNIST macOS Catalina v1.5.0 - CNSSI 1253Unix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

F5BI-LT-000303 - The BIG-IP Core implementation must be configured to inspect for protocol compliance and protocol anomalies in inbound SMTP and Extended SMTP communications traffic to virtual servers.DISA F5 BIG-IP Local Traffic Manager STIG v2r4F5

CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

FireEye - Interface configurationTNS FireEyeFireEye

SYSTEM AND COMMUNICATIONS PROTECTION

JUSX-VN-000008 - The Juniper SRX Services Gateway VPN must be configured to use IPsec with SHA1 or greater to negotiate hashing to protect the integrity of remote access sessions.DISA Juniper SRX Services Gateway VPN v3r1Juniper

ACCESS CONTROL

Monterey - Disable Accounts after 35 Days of InactivityNIST macOS Monterey v1.0.0 - 800-171Unix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

Monterey - Disable Accounts after 35 Days of InactivityNIST macOS Monterey v1.0.0 - 800-53r4 LowUnix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

Monterey - Disable Accounts after 35 Days of InactivityNIST macOS Monterey v1.0.0 - CNSSI 1253Unix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

PANW-AG-000062 - The Palo Alto Networks security platform must drop malicious code upon detection.DISA STIG Palo Alto ALG v3r4Palo_Alto

SYSTEM AND INFORMATION INTEGRITY

RHEL-06-000285 - The system must have a host-based intrusion detection tool installed - hipclient processDISA Red Hat Enterprise Linux 6 STIG v2r2Unix

CONFIGURATION MANAGEMENT

RHEL-06-000285 - The system must have a host-based intrusion detection tool installed - MFEhiplsmDISA Red Hat Enterprise Linux 6 STIG v2r2Unix

CONFIGURATION MANAGEMENT

SYMP-AG-000240 - The reverse proxy Symantec ProxySG providing intermediary services for FTP must inspect inbound FTP communications traffic for protocol compliance and protocol anomalies - Review ProxiesDISA Symantec ProxySG Benchmark ALG v1r3BlueCoat

CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

SYMP-AG-000270 - Symantec ProxySG providing intermediary services for HTTP must inspect outbound HTTP traffic for protocol compliance and protocol anomalies - InternalDISA Symantec ProxySG Benchmark ALG v1r3BlueCoat

CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

UBTU-24-100840 - Ubuntu 24.04 LTS SSH server must be configured to use only FIPS 140-3 validated key exchange algorithms.DISA Canonical Ubuntu 24.04 LTS STIG v1r1Unix

ACCESS CONTROL

WN22-00-000120 - Windows Server 2022 must have a host-based intrusion detection or prevention system.DISA Microsoft Windows Server 2022 STIG v2r4Windows

CONFIGURATION MANAGEMENT