Item Search

NameAudit NamePluginCategory
2.02 Version/Patches - 'Ensure the latest version of Oracle software and patches have been applied'CIS v1.1.0 Oracle 11g OS Windows Level 1Windows
3.1.12 Ensure syslog messages are not lost due to sizeCIS PostgreSQL 17 v1.0.0 L1 PostgreSQLPostgreSQLDB

AUDIT AND ACCOUNTABILITY

9.24 Find Un-owned Files and DirectoriesCIS Solaris 11.1 L1 v1.0.0Unix

ACCESS CONTROL

12.18 Location of development database - 'Separate server from production database'CIS v1.1.0 Oracle 11g OS Windows Level 1Windows
12.18 Location of development database - 'Separate server from production database'CIS v1.1.0 Oracle 11g OS L1Unix
12.32 Distribution of tnsnames.ora files to clients - 'Include only tnsnames.ora when distributing to clients'CIS v1.1.0 Oracle 11g OS L1Unix
12.32 Distribution of tnsnames.ora files to clients - 'Include only tnsnames.ora when distributing to clients'CIS v1.1.0 Oracle 11g OS Windows Level 1Windows
Audit system file permissions - dpkgTenable Cisco Firepower Management Center OS Best Practices AuditUnix

SYSTEM AND INFORMATION INTEGRITY

Audit system file permissions - zypperTenable Cisco Firepower Management Center OS Best Practices AuditUnix

SYSTEM AND INFORMATION INTEGRITY

Ensure /etc/hosts.allow is configuredTenable Cisco Firepower Management Center OS Best Practices AuditUnix

SYSTEM AND COMMUNICATIONS PROTECTION

Ensure AIDE is installed - zypperTenable Cisco Firepower Management Center OS Best Practices AuditUnix

AUDIT AND ACCOUNTABILITY

Ensure authentication required for single user modeTenable Cisco Firepower Management Center OS Best Practices AuditUnix

ACCESS CONTROL

Ensure changes to system administration scope (sudoers) is collected - /etc/sudoersTenable Cisco Firepower Management Center OS Best Practices AuditUnix

AUDIT AND ACCOUNTABILITY

Ensure core dumps are restricted - sysctl.confTenable Cisco Firepower Management Center OS Best Practices AuditUnix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

Ensure discretionary access control permission modification events are collected - auditctl b64 setxattrTenable Cisco Firepower Management Center OS Best Practices AuditUnix

AUDIT AND ACCOUNTABILITY

Ensure discretionary access control permission modification events are collected - b64 chown fchownTenable Cisco Firepower Management Center OS Best Practices AuditUnix

AUDIT AND ACCOUNTABILITY

Ensure events that modify the system's network environment are collected - auditctl /etc/issueTenable Cisco Firepower Management Center OS Best Practices AuditUnix

AUDIT AND ACCOUNTABILITY

Ensure events that modify the system's network environment are collected - auditctl /etc/issue.netTenable Cisco Firepower Management Center OS Best Practices AuditUnix

AUDIT AND ACCOUNTABILITY

Ensure events that modify the system's network environment are collected - auditctl b64 sethostnameTenable Cisco Firepower Management Center OS Best Practices AuditUnix

AUDIT AND ACCOUNTABILITY

Ensure events that modify user/group information are collected - auditctl /etc/security/opasswdTenable Cisco Firepower Management Center OS Best Practices AuditUnix

AUDIT AND ACCOUNTABILITY

Ensure events that modify user/group information are collected - auditctl /etc/shadowTenable Cisco Firepower Management Center OS Best Practices AuditUnix

AUDIT AND ACCOUNTABILITY

Ensure file deletion events by users are collected - auditctl b64 unlinkTenable Cisco Firepower Management Center OS Best Practices AuditUnix

AUDIT AND ACCOUNTABILITY

Ensure GDM login banner is configured - system-dbTenable Cisco Firepower Management Center OS Best Practices AuditUnix

ACCESS CONTROL

Ensure HTTP server is not enabledTenable Cisco Firepower Management Center OS Best Practices AuditUnix

CONFIGURATION MANAGEMENT

Ensure ICMP redirects are not accepted - /etc/sysctl ipv4 all acceptTenable Cisco Firepower Management Center OS Best Practices AuditUnix

SYSTEM AND COMMUNICATIONS PROTECTION

Ensure IPv6 redirects are not accepted - sysctl ipv6 all acceptTenable Cisco Firepower Management Center OS Best Practices AuditUnix

SYSTEM AND COMMUNICATIONS PROTECTION

Ensure kernel module loading and unloading is collected - rmmodTenable Cisco Firepower Management Center OS Best Practices AuditUnix

AUDIT AND ACCOUNTABILITY

Ensure local login warning banner is configured properlyTenable Cisco Firepower Management Center OS Best Practices AuditUnix

CONFIGURATION MANAGEMENT

Ensure mounting of FAT filesystems is disabled - modprobeTenable Cisco Firepower Management Center OS Best Practices AuditUnix

CONFIGURATION MANAGEMENT

Ensure mounting of udf filesystems is disabled - lsmodTenable Cisco Firepower Management Center OS Best Practices AuditUnix

CONFIGURATION MANAGEMENT

Ensure mounting of udf filesystems is disabled - modprobeTenable Cisco Firepower Management Center OS Best Practices AuditUnix

CONFIGURATION MANAGEMENT

Ensure no duplicate user names existTenable Cisco Firepower Management Center OS Best Practices AuditUnix

IDENTIFICATION AND AUTHENTICATION

Ensure no legacy '+' entries exist in /etc/passwdTenable Cisco Firepower Management Center OS Best Practices AuditUnix

IDENTIFICATION AND AUTHENTICATION

Ensure no legacy '+' entries exist in /etc/shadowTenable Cisco Firepower Management Center OS Best Practices AuditUnix

IDENTIFICATION AND AUTHENTICATION

Ensure nodev option set on /home partitionTenable Cisco Firepower Management Center OS Best Practices AuditUnix

ACCESS CONTROL

Ensure noexec option set on /dev/shm partitionTenable Cisco Firepower Management Center OS Best Practices AuditUnix

ACCESS CONTROL

Ensure RDS is disabledTenable Cisco Firepower Management Center OS Best Practices AuditUnix

CONFIGURATION MANAGEMENT

Ensure SSH Idle Timeout Interval is configured - ClientAliveCountMaxTenable Cisco Firepower Management Center OS Best Practices AuditUnix

ACCESS CONTROL

Ensure SSH IgnoreRhosts is enabledTenable Cisco Firepower Management Center OS Best Practices AuditUnix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

Ensure SSH LoginGraceTime is set to one minute or lessTenable Cisco Firepower Management Center OS Best Practices AuditUnix

ACCESS CONTROL

Ensure SSH PermitEmptyPasswords is disabledTenable Cisco Firepower Management Center OS Best Practices AuditUnix

IDENTIFICATION AND AUTHENTICATION

Ensure talk client is not installed - zypperTenable Cisco Firepower Management Center OS Best Practices AuditUnix

CONFIGURATION MANAGEMENT

Ensure TCP Wrappers is installed - dpkgTenable Cisco Firepower Management Center OS Best Practices AuditUnix

SYSTEM AND COMMUNICATIONS PROTECTION

Ensure tftp server is not enabledTenable Cisco Firepower Management Center OS Best Practices AuditUnix

CONFIGURATION MANAGEMENT

Ensure time services are not enabledTenable Cisco Firepower Management Center OS Best Practices AuditUnix

CONFIGURATION MANAGEMENT

Ensure unsuccessful unauthorized file access attempts are collected - auditctl b64 EACCESTenable Cisco Firepower Management Center OS Best Practices AuditUnix

AUDIT AND ACCOUNTABILITY

Ensure updates, patches, and additional security software are installed - yumTenable Cisco Firepower Management Center OS Best Practices AuditUnix

SYSTEM AND INFORMATION INTEGRITY

Ensure updates, patches, and additional security software are installed - zypperTenable Cisco Firepower Management Center OS Best Practices AuditUnix

SYSTEM AND INFORMATION INTEGRITY

Ensure wireless interfaces are disabledTenable Cisco Firepower Management Center OS Best Practices AuditUnix

ACCESS CONTROL

Lockout for failed password attempts - 'auth [default=die] pam_faillock.so authfail audit deny=5 unlock_time=900'Tenable Cisco Firepower Management Center OS Best Practices AuditUnix

ACCESS CONTROL