Item Search

NameAudit NamePluginCategory
1.1.16 Ensure that the --audit-log-maxbackup argument is set to 10 or as appropriateCIS Kubernetes 1.8 Benchmark v1.2.0 L1Unix

AUDIT AND ACCOUNTABILITY

1.1.17 Ensure that the --audit-log-maxbackup argument is set to 10 or as appropriateCIS Kubernetes 1.13 Benchmark v1.4.1 L1Unix

AUDIT AND ACCOUNTABILITY

1.2.20 Ensure that the --audit-log-maxbackup argument is set to 10 or as appropriateCIS Kubernetes v1.24 Benchmark v1.0.0 L1 MasterUnix

AUDIT AND ACCOUNTABILITY

1.13 Audit Docker files and directories - /etc/docker/daemon.jsonCIS Docker 1.12.0 v1.0.0 L1 LinuxUnix

AUDIT AND ACCOUNTABILITY

2.1 Secure the DB2 Runtime LibraryCIS IBM DB2 9 Benchmark v3.0.1 Level 1 OS LinuxUnix
3.1.8 Secure all diagnostic logsCIS IBM DB2 9 Benchmark v3.0.1 Level 1 OS LinuxUnix

AUDIT AND ACCOUNTABILITY

3.1.8 Secure all diagnostic logsCIS IBM DB2 9 Benchmark v3.0.1 Level 1 OS WindowsWindows
3.1.8 Secure all diagnostic logsCIS IBM DB2 9 Benchmark v3.0.1 Level 2 OS LinuxUnix

AUDIT AND ACCOUNTABILITY

3.1.8 Secure all diagnostic logsCIS IBM DB2 9 Benchmark v3.0.1 Level 2 OS WindowsWindows
3.1.17 Secure permissions for the primary archive log location - LOGARCHMETH1 OS PermissionsCIS IBM DB2 v10 v1.1.0 Linux OS Level 2Unix
3.1.17 Secure permissions for the primary archive log location - LOGARCHMETH1 OS PermissionsCIS IBM DB2 v10 v1.1.0 Windows OS Level 2Windows

AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT

3.1.17 Secure permissions for the primary archive log location - LOGARCHMETH1 OS PermissionsCIS IBM DB2 v10 v1.1.0 Linux OS Level 1Unix
3.1.17 Secure permissions for the primary archive log location - LOGARCHMETH1 OS PermissionsCIS IBM DB2 v10 v1.1.0 Windows OS Level 1Windows

AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT

3.1.17 Secure permissions for the primary archive log location - LOGARCHMETH1 SettingCIS IBM DB2 v10 v1.1.0 Linux OS Level 1Unix

AUDIT AND ACCOUNTABILITY

3.1.17 Secure permissions for the primary archive log location - LOGARCHMETH1 SettingCIS IBM DB2 v10 v1.1.0 Linux OS Level 2Unix

AUDIT AND ACCOUNTABILITY

3.1.17 Secure permissions for the primary archive log location - LOGARCHMETH1 SettingCIS IBM DB2 v10 v1.1.0 Windows OS Level 2Windows

AUDIT AND ACCOUNTABILITY

3.1.17 Secure permissions for the primary archive log location - LOGARCHMETH1 SettingCIS IBM DB2 v10 v1.1.0 Windows OS Level 1Windows

AUDIT AND ACCOUNTABILITY

3.1.18 Secure permissions for the secondary archive log location - LOGARCHMETH2 OS PermissionCIS IBM DB2 v10 v1.1.0 Linux OS Level 1Unix
3.1.18 Secure permissions for the secondary archive log location - LOGARCHMETH2 OS PermissionCIS IBM DB2 v10 v1.1.0 Linux OS Level 2Unix
3.1.18 Secure permissions for the secondary archive log location - LOGARCHMETH2 OS PermissionsCIS IBM DB2 v10 v1.1.0 Windows OS Level 1Windows

AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT

3.1.18 Secure permissions for the secondary archive log location - LOGARCHMETH2 OS PermissionsCIS IBM DB2 v10 v1.1.0 Windows OS Level 2Windows

AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT

3.1.18 Secure permissions for the secondary archive log location - LOGARCHMETH2 SettingCIS IBM DB2 v10 v1.1.0 Windows OS Level 1Windows

AUDIT AND ACCOUNTABILITY

3.1.18 Secure permissions for the secondary archive log location - LOGARCHMETH2 SettingCIS IBM DB2 v10 v1.1.0 Linux OS Level 2Unix

AUDIT AND ACCOUNTABILITY

3.1.18 Secure permissions for the secondary archive log location - LOGARCHMETH2 SettingCIS IBM DB2 v10 v1.1.0 Linux OS Level 1Unix

AUDIT AND ACCOUNTABILITY

3.1.18 Secure permissions for the secondary archive log location - LOGARCHMETH2 SettingCIS IBM DB2 v10 v1.1.0 Windows OS Level 2Windows

AUDIT AND ACCOUNTABILITY

3.2.7 Secure permissions for the log mirror locationCIS IBM DB2 9 Benchmark v3.0.1 Level 1 OS LinuxUnix

AUDIT AND ACCOUNTABILITY

3.2.7 Secure permissions for the log mirror locationCIS IBM DB2 9 Benchmark v3.0.1 Level 1 OS WindowsWindows

AUDIT AND ACCOUNTABILITY

3.2.7 Secure permissions for the log mirror locationCIS IBM DB2 9 Benchmark v3.0.1 Level 1 DBIBM_DB2DB
3.2.7 Secure permissions for the log mirror location - FILE_PERMISSIONSCIS IBM DB2 9 Benchmark v3.0.1 Level 1 OS WindowsWindows

AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT

4.8 (L1) Host must store one week of audit recordsCIS VMware ESXi 8.0 v1.2.0 L1VMware

AUDIT AND ACCOUNTABILITY

5.3.22 Ensure SSH MaxStartups is configuredCIS Ubuntu Linux 16.04 LTS Workstation L1 v2.0.0Unix

CONFIGURATION MANAGEMENT

5.3.22 Ensure SSH MaxStartups is configured - sshdCIS Oracle Linux 6 Workstation L1 v2.0.0Unix

CONFIGURATION MANAGEMENT

5.3.22 Ensure SSH MaxStartups is configured - sshdCIS CentOS 6 Workstation L1 v3.0.0Unix

CONFIGURATION MANAGEMENT

5.3.22 Ensure SSH MaxStartups is configured - sshdCIS Oracle Linux 6 Server L1 v2.0.0Unix

CONFIGURATION MANAGEMENT

5.3.22 Ensure SSH MaxStartups is configured - sshdCIS CentOS 6 Server L1 v3.0.0Unix

CONFIGURATION MANAGEMENT

5.3.22 Ensure SSH MaxStartups is configured - sshdCIS Red Hat 6 Workstation L1 v3.0.0Unix

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

5.3.22 Ensure SSH MaxStartups is configured - sshdCIS Red Hat 6 Server L1 v3.0.0Unix

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

5.3.22 Ensure SSH MaxStartups is configured - sshd_configCIS Red Hat 6 Workstation L1 v3.0.0Unix

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

5.3.22 Ensure SSH MaxStartups is configured - sshd_configCIS CentOS 6 Workstation L1 v3.0.0Unix

CONFIGURATION MANAGEMENT

5.3.22 Ensure SSH MaxStartups is configured - sshd_configCIS Oracle Linux 6 Workstation L1 v2.0.0Unix

CONFIGURATION MANAGEMENT

5.3.22 Ensure SSH MaxStartups is configured - sshd_configCIS Oracle Linux 6 Server L1 v2.0.0Unix

CONFIGURATION MANAGEMENT

5.3.22 Ensure SSH MaxStartups is configured - sshd_configCIS CentOS 6 Server L1 v3.0.0Unix

CONFIGURATION MANAGEMENT

5.3.22 Ensure SSH MaxStartups is configured - sshd_configCIS Red Hat 6 Server L1 v3.0.0Unix

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

5.3.24 Ensure SSH MaxStartups is configuredCIS Red Hat Enterprise Linux 7 STIG v2.0.0 L1 WorkstationUnix

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

ARST-RT-000080 - The Arista Multicast Source Discovery Protocol (MSDP) router must be configured to filter source-active multicast advertisements to external MSDP peers to avoid global visibility of local-only multicast sources and groups.DISA STIG Arista MLS EOS 4.2x Router v2r1Arista

ACCESS CONTROL

DTAVSEL-100 - The McAfee VirusScan Enterprise for Linux 1.9.x/2.0.x must be configured to run a scheduled On-Demand scan at least once a week.McAfee Virus Scan Enterprise for Linux 1.9x/2.0x Local Client v1r6Unix

SYSTEM AND INFORMATION INTEGRITY

Out-of-Band Management portArubaOS Switch 16.x Hardening Guide v1.0.0ArubaOS

SYSTEM AND COMMUNICATIONS PROTECTION

RHEL-07-010120 - The Red Hat Enterprise Linux operating system must be configured so that when passwords are changed or new passwords are established, the new password must contain at least one upper-case character.DISA Red Hat Enterprise Linux 7 STIG v3r15Unix

IDENTIFICATION AND AUTHENTICATION

RHEL-07-010483 - Red Hat Enterprise Linux operating systems version 7.2 or newer booted with a BIOS must have a unique name for the grub superusers account when booting into single-user and maintenance modes.DISA Red Hat Enterprise Linux 7 STIG v3r15Unix

ACCESS CONTROL

VCENTER-000021 - The use of Linux-based clients must be restricted.DISA STIG VMWare ESXi vCenter 5 STIG v2r1VMware

CONFIGURATION MANAGEMENT