Item Search

NameAudit NamePluginCategory
1.1.27 Disable AutomountingCIS Amazon Linux 2 STIG v2.0.0 L2 WorkstationUnix

CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION

1.6.1 Configure at least 2 external NTP ServersCIS Cisco NX-OS v1.2.0 L1Cisco

AUDIT AND ACCOUNTABILITY

1.9.1.3 Ensure 'trusted NTP server' existsCIS Cisco Firewall v8.x L1 v4.2.0Cisco

AUDIT AND ACCOUNTABILITY

2.1.1.2 Set version 2 for 'ip ssh version'CIS Cisco IOS 15 L1 v4.1.1Cisco

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

2.1.1.2 Set version 2 for 'ip ssh version'CIS Cisco IOS XE 17.x v2.2.1 L1Cisco

CONFIGURATION MANAGEMENT

2.2.3 Ensure Avahi Server is not installedCIS Amazon Linux 2 STIG v2.0.0 L2 WorkstationUnix

CONFIGURATION MANAGEMENT

2.4.2 Ensure requests for unknown host names are rejectedCIS NGINX v3.0.0 L1 LoadbalancerUnix

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

2.4.2 Ensure requests for unknown host names are rejectedCIS NGINX v3.0.0 L1 ProxyUnix

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

3.10 Verify that TLS CA certificate file permissions are set to 444 or more restrictiveCIS Docker 1.11.0 v1.0.0 L1 DockerUnix

CONFIGURATION MANAGEMENT

4.1.1.1 Ensure auditd is installedCIS Amazon Linux 2 STIG v2.0.0 L2 WorkstationUnix

AUDIT AND ACCOUNTABILITY

4.1.1.3 Ensure auditing for processes that start prior to auditd is enabledCIS Amazon Linux 2 STIG v2.0.0 L2 WorkstationUnix

AUDIT AND ACCOUNTABILITY

4.1.3.1 Ensure events that modify date and time information are collectedCIS Amazon Linux 2 STIG v2.0.0 L2 WorkstationUnix

AUDIT AND ACCOUNTABILITY

4.1.3.2 Ensure system administrator command executions (sudo) are collectedCIS Amazon Linux 2 STIG v2.0.0 L2 WorkstationUnix

AUDIT AND ACCOUNTABILITY

4.1.3.3 Ensure session initiation information is collectedCIS Amazon Linux 2 STIG v2.0.0 L2 WorkstationUnix

AUDIT AND ACCOUNTABILITY

4.1.3.6 Ensure successful file system mounts are collectedCIS Amazon Linux 2 STIG v2.0.0 L2 WorkstationUnix

AUDIT AND ACCOUNTABILITY

4.1.3.10 Ensure use of privileged commands is collectedCIS Amazon Linux 2 STIG v2.0.0 L2 WorkstationUnix

AUDIT AND ACCOUNTABILITY, MAINTENANCE

4.1.3.12 Ensure discretionary access control permission modification events are collectedCIS Amazon Linux 2 STIG v2.0.0 L2 WorkstationUnix

AUDIT AND ACCOUNTABILITY

4.1.3.13 Ensure login and logout events are collectedCIS Amazon Linux 2 STIG v2.0.0 L2 WorkstationUnix

AUDIT AND ACCOUNTABILITY, MAINTENANCE

5.1.4 Ensure SSH Protocol is set to 2CIS Google Container-Optimized OS v1.2.0 L1 ServerUnix

ACCESS CONTROL, CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION, MAINTENANCE, SYSTEM AND COMMUNICATIONS PROTECTION

5.2.2 Ensure SSH Protocol is set to 2CIS SUSE Linux Enterprise Server 11 L1 v2.1.1Unix

CONFIGURATION MANAGEMENT

5.2.4 Ensure SSH Protocol is set to 2CIS Debian 9 Workstation L1 v1.0.1Unix

SYSTEM AND COMMUNICATIONS PROTECTION

5.3.4 Ensure SSH Protocol is set to 2CIS CentOS 6 Workstation L1 v3.0.0Unix

CONFIGURATION MANAGEMENT

5.3.4 Ensure SSH Protocol is set to 2CIS Oracle Linux 6 Server L1 v2.0.0Unix

CONFIGURATION MANAGEMENT

5.3.4 Ensure SSH Protocol is set to 2CIS CentOS 6 Server L1 v3.0.0Unix

CONFIGURATION MANAGEMENT

5.3.4 Ensure SSH Protocol is set to 2CIS Oracle Linux 6 Workstation L1 v2.0.0Unix

CONFIGURATION MANAGEMENT

5.3.4 Ensure SSH Protocol is set to 2CIS Red Hat 6 Workstation L1 v3.0.0Unix

CONFIGURATION MANAGEMENT

5.3.4 Ensure SSH Protocol is set to 2CIS Ubuntu Linux 16.04 LTS Server L1 v2.0.0Unix

CONFIGURATION MANAGEMENT

6.1.1 Audit system file permissionsCIS Amazon Linux 2 STIG v2.0.0 L2 WorkstationUnix

CONFIGURATION MANAGEMENT

6.6.1.2 Ensure Max Login Backoff Threshold of 2CIS Juniper OS Benchmark v2.1.0 L1Juniper

ACCESS CONTROL

6.10.1.2 Ensure SSH is Restricted to Version 2CIS Juniper OS Benchmark v2.1.0 L1Juniper

IDENTIFICATION AND AUTHENTICATION

7.2 Set Strong Password Creation Policies - MINALPHA = 2CIS Solaris 11.2 L1 v1.1.0Unix

IDENTIFICATION AND AUTHENTICATION

7.2 Set Strong Password Creation Policies - MINALPHA = 2CIS Solaris 11 L1 v1.1.0Unix

IDENTIFICATION AND AUTHENTICATION

9.1.1 Enable cron Daemon - anacron run level 2CIS Debian Linux 7 L1 v1.0.0Unix

CONFIGURATION MANAGEMENT

18.10.77.1.5 Ensure 'Service Enabled' is set to 'Enabled'CIS Microsoft Windows 11 Enterprise v5.0.1 L1 BLWindows

SYSTEM AND INFORMATION INTEGRITY

18.10.77.1.5 Ensure 'Service Enabled' is set to 'Enabled'CIS Microsoft Windows 11 Stand-alone v5.0.0 L1Windows

SYSTEM AND INFORMATION INTEGRITY

18.10.77.1.5 Ensure 'Service Enabled' is set to 'Enabled'CIS Microsoft Windows 11 Enterprise v5.0.1 L1Windows

SYSTEM AND INFORMATION INTEGRITY

Allow users to demote attachments to Level 2MSCT M365 Apps for enterprise 2312 v1.0.0Windows

CONFIGURATION MANAGEMENT

Allow users to demote attachments to Level 2MSCT M365 Apps for enterprise 2412 v1.0.0Windows

CONFIGURATION MANAGEMENT

Allow users to demote attachments to Level 2MSCT Office 2016 v1.0.0Windows

CONFIGURATION MANAGEMENT

ARST-L2-000030 - The Arista MLS layer 2 switch must be configured for Storm Control to limit the effects of packet flooding types of denial-of-service (DoS) attacks.DISA Arista MLS EOS 4.X L2S STIG v2r3Arista

SYSTEM AND COMMUNICATIONS PROTECTION

DTBC-0055 - Download restrictions must be configured.DISA Google Chrome Current Windows STIG v2r11Windows

AUDIT AND ACCOUNTABILITY

Encryption type for password protected Office 97-2003 filesMSCT M365 Apps for enterprise 2312 v1.0.0Windows

SYSTEM AND COMMUNICATIONS PROTECTION

IISW-SI-000223 - The IIS 8.5 website must generate unique session identifiers that cannot be reliably reproduced.DISA IIS 8.5 Site v2r9Windows

SYSTEM AND COMMUNICATIONS PROTECTION

OL6-00-000228 - The Oracle Linux operating system must be configured so that the SSH daemon is configured to only use Message Authentication Codes (MACs) employing FIPS 140-2 approved cryptographic hash algorithms.DISA STIG Oracle Linux 6 v2r7Unix

ACCESS CONTROL

OL07-00-040400 - The Oracle Linux operating system must be configured so that the SSH daemon is configured to only use Message Authentication Codes (MACs) employing FIPS 140-2 approved cryptographic hash algorithms - MACs employing FIPS 140-2 approved cryptographic hash algorithms.DISA Oracle Linux 7 STIG v3r5Unix

ACCESS CONTROL

SQL6-D0-008700 - SQL Server must use NIST FIPS 140-2/140-3-validated cryptographic operations for encryption, hashing, and signing.DISA MS SQL Server 2016 Instance STIG v3r6 WindowsWindows

IDENTIFICATION AND AUTHENTICATION

SQL6-D0-015600 - SQL Server must implement NIST FIPS 140-2 or 140-3 validated cryptographic modules to provision digital signatures.DISA MS SQL Server 2016 Instance STIG v3r6 WindowsWindows

SYSTEM AND COMMUNICATIONS PROTECTION

Word 2 and earlier binary documents and templatesMSCT Office 365 ProPlus 1908 v1.0.0Windows

SYSTEM AND INFORMATION INTEGRITY

Word 2 and earlier binary documents and templatesMicrosoft 365 Apps for Enterprise 2306 v1.0.0Windows

SYSTEM AND INFORMATION INTEGRITY

Word 2 and earlier binary documents and templatesMSCT M365 Apps for enterprise 2412 v1.0.0Windows

SYSTEM AND INFORMATION INTEGRITY