Item Search

NameAudit NamePluginCategory
1.1 Ensure the Pre-Installation Planning Checklist Has Been ImplementedCIS Apache HTTP Server 2.4 v2.2.0 L1Unix

CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY

1.12 Ensure host-based intrusion detection tool is usedCIS Amazon Linux 2 STIG v2.0.0 STIGUnix

SYSTEM AND INFORMATION INTEGRITY

2.2.6 Ensure 'REMOTE_LISTENER' Is EmptyCIS Oracle Server 12c DB Traditional Auditing v3.0.0OracleDB

ACCESS CONTROL, SYSTEM AND INFORMATION INTEGRITY

2.2.6 Ensure 'REMOTE_LISTENER' Is EmptyCIS Oracle Server 12c DB Unified Auditing v3.0.0OracleDB

ACCESS CONTROL, SYSTEM AND INFORMATION INTEGRITY

2.4.2 (L1) Ensure Priority accounts have 'Strict protection' presets appliedCIS Microsoft 365 Foundations v5.0.0 L1 E5microsoft_azure

SYSTEM AND INFORMATION INTEGRITY

2.6.8 Disable sending diagnostic and usage data to AppleCIS Apple macOS 10.12 L2 v1.2.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY

2.7 Ensure internal sources are blocked on external networksCIS Juniper OS Benchmark v2.1.0 L2Juniper

SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY

3.1.3 Forbid Dial in AccessCIS Juniper OS Benchmark v2.1.0 L2Juniper

IDENTIFICATION AND AUTHENTICATION, SYSTEM AND INFORMATION INTEGRITY

3.2 Ensure intrusion prevention is enabled for untrusted interfacesCIS Cisco ASA 9.x Firewall L1 v1.1.0Cisco

CONFIGURATION MANAGEMENT, CONTINGENCY PLANNING, PLANNING, PROGRAM MANAGEMENT, SYSTEM AND SERVICES ACQUISITION, SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY

3.3.2 Configure Storm ControlCIS Cisco NX-OS v1.2.0 L2Cisco

AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT, CONTINGENCY PLANNING, INCIDENT RESPONSE, PLANNING, PROGRAM MANAGEMENT, SYSTEM AND SERVICES ACQUISITION, SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY

3.5.1.3 NIS - remove NIS markers from password and group files - /etc/groupCIS IBM AIX 7.1 L2 v2.1.0Unix

AUDIT AND ACCOUNTABILITY, SYSTEM AND INFORMATION INTEGRITY

3.5.1.3 NIS - remove NIS markers from password and group files - /etc/passwdCIS IBM AIX 7.1 L2 v2.1.0Unix

AUDIT AND ACCOUNTABILITY, SYSTEM AND INFORMATION INTEGRITY

3.8 Ensure that VPC Flow Logs is Enabled for Every Subnet in a VPC NetworkCIS Google Cloud Platform Foundation v4.0.0 L2GCP

AUDIT AND ACCOUNTABILITY, SYSTEM AND INFORMATION INTEGRITY

3.12 Ensure Anti-Spoofing is enabled and action is set to Prevent for all InterfacesCIS Check Point Firewall L2 v1.1.0CheckPoint

CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY

3.14 Ensure Accept RIP is not enabledCIS Check Point Firewall L2 v1.1.0CheckPoint

CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY

4.7 Ensure VPC flow logging is enabled in all VPCsCIS Amazon Web Services Foundations v6.0.0 L2amazon_aws

AUDIT AND ACCOUNTABILITY, SYSTEM AND INFORMATION INTEGRITY

5.3.21 Ensure SSH AllowTcpForwarding is disabledCIS Ubuntu Linux 16.04 LTS Server L2 v2.0.0Unix

SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND INFORMATION INTEGRITY

5.3.21 Ensure SSH AllowTcpForwarding is disabledCIS Ubuntu Linux 16.04 LTS Workstation L2 v2.0.0Unix

SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND INFORMATION INTEGRITY

5.3.21 Ensure SSH AllowTcpForwarding is disabled - sshdCIS Red Hat 6 Workstation L2 v3.0.0Unix

SECURITY ASSESSMENT AND AUTHORIZATION, CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY

5.3.21 Ensure SSH AllowTcpForwarding is disabled - sshdCIS CentOS 6 Server L2 v3.0.0Unix

SECURITY ASSESSMENT AND AUTHORIZATION, CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY

5.3.21 Ensure SSH AllowTcpForwarding is disabled - sshdCIS Oracle Linux 6 Server L2 v2.0.0Unix

SECURITY ASSESSMENT AND AUTHORIZATION, CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY

5.3.21 Ensure SSH AllowTcpForwarding is disabled - sshdCIS Oracle Linux 6 Workstation L2 v2.0.0Unix

SECURITY ASSESSMENT AND AUTHORIZATION, CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY

5.3.21 Ensure SSH AllowTcpForwarding is disabled - sshdCIS CentOS 6 Workstation L2 v3.0.0Unix

SECURITY ASSESSMENT AND AUTHORIZATION, CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY

5.3.21 Ensure SSH AllowTcpForwarding is disabled - sshdCIS Red Hat 6 Server L2 v3.0.0Unix

SECURITY ASSESSMENT AND AUTHORIZATION, CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY

5.3.21 Ensure SSH AllowTcpForwarding is disabled - sshd_configCIS CentOS 6 Server L2 v3.0.0Unix

SECURITY ASSESSMENT AND AUTHORIZATION, CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY

5.3.21 Ensure SSH AllowTcpForwarding is disabled - sshd_configCIS CentOS 6 Workstation L2 v3.0.0Unix

SECURITY ASSESSMENT AND AUTHORIZATION, CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY

5.3.21 Ensure SSH AllowTcpForwarding is disabled - sshd_configCIS Red Hat 6 Workstation L2 v3.0.0Unix

SECURITY ASSESSMENT AND AUTHORIZATION, CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY

5.3.21 Ensure SSH AllowTcpForwarding is disabled - sshd_configCIS Oracle Linux 6 Server L2 v2.0.0Unix

SECURITY ASSESSMENT AND AUTHORIZATION, CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY

5.3.21 Ensure SSH AllowTcpForwarding is disabled - sshd_configCIS Oracle Linux 6 Workstation L2 v2.0.0Unix

SECURITY ASSESSMENT AND AUTHORIZATION, CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY

5.3.21 Ensure SSH AllowTcpForwarding is disabled - sshd_configCIS Red Hat 6 Server L2 v3.0.0Unix

SECURITY ASSESSMENT AND AUTHORIZATION, CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY

5.4 Ensure forwarding of decrypted content to WildFire is enabledCIS Palo Alto Firewall 8 Benchmark L1 v1.0.0Palo_Alto

SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY

6.3 Ensure storage area network (SAN) resources are segregated properlyCIS VMware ESXi 6.5 v1.0.0 Level 1VMware

SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY

6.8 Ensure a secure Vulnerability Protection Profile is applied to all security rules allowing trafficCIS Palo Alto Firewall 8 Benchmark L1 v1.0.0Palo_Alto

SYSTEM AND INFORMATION INTEGRITY

6.10.6 Ensure Telnet is Not SetCIS Juniper OS Benchmark v2.1.0 L1Juniper

IDENTIFICATION AND AUTHENTICATION, SYSTEM AND INFORMATION INTEGRITY

6.10.7 Ensure Reverse Telnet is Not SetCIS Juniper OS Benchmark v2.1.0 L1Juniper

IDENTIFICATION AND AUTHENTICATION, SYSTEM AND INFORMATION INTEGRITY

6.10.9 Ensure Finger Service is Not SetCIS Juniper OS Benchmark v2.1.0 L1Juniper

CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY

6.11.2 Ensure Auxiliary Port is Set as Insecure If UsedCIS Juniper OS Benchmark v2.1.0 L2Juniper

CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY

6.13 Ensure Autoinstallation is Set to DisabledCIS Juniper OS Benchmark v2.1.0 L1Juniper

CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY

7.5 Ensure that port groups are not configured to VLAN values reserved by upstream physical switchesCIS VMware ESXi 6.5 v1.0.0 Level 1VMware

SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY

8.1 Ensure 'SSL Forward Proxy Policy' for traffic destined to the Internet is configured - Invalid CategoriesCIS Palo Alto Firewall 8 Benchmark L1 v1.0.0Palo_Alto

SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY

8.1 Ensure 'SSL Forward Proxy Policy' for traffic destined to the Internet is configured - PoliciesCIS Palo Alto Firewall 8 Benchmark L1 v1.0.0Palo_Alto

SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY

8.1.15 Set 'Launching programs and unsafe files' to 'Enabled:Disable'CIS IE 10 v1.1.0Windows

SYSTEM AND INFORMATION INTEGRITY

8.3 Ensure that the Certificate used for Decryption is TrustedCIS Palo Alto Firewall 8 Benchmark L1 v1.0.0Palo_Alto

SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY

8.3 Ensure that the Certificate used for Decryption is TrustedCIS Palo Alto Firewall 8 Benchmark L2 v1.0.0Palo_Alto

SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY

8.3.12 Set 'Launching programs and unsafe files' to 'Enabled:Prompt'CIS IE 10 v1.1.0Windows

SYSTEM AND INFORMATION INTEGRITY

8.4.1 Ensure access to VMs through the dvfilter network APIs is configured correctlyCIS VMware ESXi 6.5 v1.0.0 Level 1VMware

SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY

9.1.3.3 Ensure that 'Endpoint protection' component status is set to 'On'CIS Microsoft Azure Foundations v4.0.0 L2microsoft_azure

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

DTBI015 - The IE warning about certificate address mismatch must be enforced.DISA STIG Microsoft Internet Explorer 9 v1r15Windows

SYSTEM AND INFORMATION INTEGRITY

DTBI820 - Launching programs and unsafe files property must be set to prompt (Internet zone).DISA STIG Microsoft Internet Explorer 9 v1r15Windows

SYSTEM AND INFORMATION INTEGRITY

WG440 W22 - Monitoring software must include CGI or equivalent programs in its scope.DISA STIG Apache Server 2.2 Windows v1r13Windows

SYSTEM AND INFORMATION INTEGRITY