Item Search

NameAudit NamePluginCategory
1.1 Select an appropriate authentication mechanism - LDAP User AuthCIS Sybase 15.0 L1 DB v1.1.0SybaseDB
1.1 Select an appropriate authentication mechanism - PAM User AuthCIS Sybase 15.0 L1 DB v1.1.0SybaseDB
1.1 Select an appropriate authentication mechanism - use security servicesCIS Sybase 15.0 L1 DB v1.1.0SybaseDB
1.1.4 - AirWatch - Set Auto-lock - 'Inactivity Timeout <= 2'AirWatch - CIS Apple iOS 8 v1.0.0 L1MDM

ACCESS CONTROL

1.1.4 - MobileIron - Set Auto-lock - 'Inactivity Timeout <= 2'MobileIron - CIS Apple iOS 8 v1.0.0 L1MDM

ACCESS CONTROL

1.1.10 Ensure separate partition exists for /varCIS Amazon Linux 2 STIG v2.0.0 L2 WorkstationUnix

CONFIGURATION MANAGEMENT

1.1.16 Ensure separate partition exists for /var/log/auditCIS Amazon Linux 2 STIG v2.0.0 L2 WorkstationUnix

CONFIGURATION MANAGEMENT

2.1.1.2 Set version 2 for 'ip ssh version'CIS Cisco IOS 12 L1 v4.0.0Cisco

CONFIGURATION MANAGEMENT

2.1.1.2 Set version 2 for 'ip ssh version'CIS Cisco IOS XE 16.x v2.2.0 L1Cisco

CONFIGURATION MANAGEMENT

3.1.1 Disable IPv6CIS Amazon Linux 2 STIG v2.0.0 L2 WorkstationUnix

CONFIGURATION MANAGEMENT

3.9 Verify that TLS CA certificate file ownership is set to root:rootCIS Docker 1.11.0 v1.0.0 L1 DockerUnix

CONFIGURATION MANAGEMENT

3.10 Verify that TLS CA certificate file permissions are set to 444 or more restrictiveCIS Docker 1.12.0 v1.0.0 L1 DockerUnix

CONFIGURATION MANAGEMENT

4.1.2.7 Ensure audit_backlog_limit is sufficientCIS Amazon Linux 2 STIG v2.0.0 L2 WorkstationUnix

AUDIT AND ACCOUNTABILITY

4.1.3.4 Ensure events that modify the system's Mandatory Access Controls are collectedCIS Amazon Linux 2 STIG v2.0.0 L2 WorkstationUnix

AUDIT AND ACCOUNTABILITY

4.1.3.8 Ensure changes to system administration scope (sudoers) is collectedCIS Amazon Linux 2 STIG v2.0.0 L2 WorkstationUnix

AUDIT AND ACCOUNTABILITY, MAINTENANCE

4.1.3.9 Ensure file deletion events by users are collectedCIS Amazon Linux 2 STIG v2.0.0 L2 WorkstationUnix

AUDIT AND ACCOUNTABILITY, MAINTENANCE

4.1.3.11 Ensure unsuccessful unauthorized file access attempts are collectedCIS Amazon Linux 2 STIG v2.0.0 L2 WorkstationUnix

AUDIT AND ACCOUNTABILITY, MAINTENANCE

4.1.3.41 Ensure the audit configuration is immutableCIS Amazon Linux 2 STIG v2.0.0 L2 WorkstationUnix

ACCESS CONTROL, MEDIA PROTECTION

5.2.2 Ensure SSH Protocol is set to 2CIS Amazon Linux v2.1.0 L1Unix

CONFIGURATION MANAGEMENT

5.2.2 Ensure SSH Protocol is set to 2CIS SUSE Linux Enterprise Workstation 11 L1 v2.1.1Unix

CONFIGURATION MANAGEMENT

5.2.2 Ensure SSH Protocol is set to 2CIS Ubuntu Linux 14.04 LTS Server L1 v2.1.0Unix

CONFIGURATION MANAGEMENT

5.2.4 Ensure SSH Protocol is set to 2CIS Debian 8 Server L1 v2.0.2Unix

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

5.2.4 Ensure SSH Protocol is set to 2CIS Debian 8 Workstation L1 v2.0.2Unix

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

5.2.4 Ensure SSH Protocol is set to 2CIS Debian 9 Server L1 v1.0.1Unix

SYSTEM AND COMMUNICATIONS PROTECTION

5.2.4 Ensure SSH Protocol is set to 2CIS Distribution Independent Linux Server L1 v2.0.0Unix

IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

5.3.4 Ensure SSH Protocol is set to 2CIS Red Hat 6 Server L1 v3.0.0Unix

CONFIGURATION MANAGEMENT

5.3.19 Make the Audit Configuration Immutable - -e 2CIS Red Hat Enterprise Linux 5 L2 v2.2.1Unix

AUDIT AND ACCOUNTABILITY

5.3.29 Ensure SSH Protocol is set to 2CIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIGUnix

CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION

5.3.29 Ensure SSH Protocol is set to 2CIS Amazon Linux 2 STIG v2.0.0 STIGUnix

CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION

7.2 Set Strong Password Creation Policies - MINALPHA = 2CIS Solaris 11.1 L1 v1.0.0Unix

IDENTIFICATION AND AUTHENTICATION

18.6.4.2 Ensure 'Configure NetBIOS settings' is set to 'Enabled: Disable NetBIOS name resolution on public networks'CIS Microsoft Windows Server 2025 v2.0.0 L1 DCWindows

CONFIGURATION MANAGEMENT

18.6.7.4 Ensure 'Enable authentication rate limiter' is set to 'Enabled'CIS Microsoft Windows 11 Stand-alone v5.0.0 L1 BLWindows

SYSTEM AND COMMUNICATIONS PROTECTION

18.6.7.4 Ensure 'Enable authentication rate limiter' is set to 'Enabled'CIS Microsoft Windows 11 Enterprise v5.0.1 L1 BLWindows

SYSTEM AND COMMUNICATIONS PROTECTION

18.6.7.7 Ensure 'Set authentication rate limiter delay (milliseconds)' is set to 'Enabled: 2000' or moreCIS Microsoft Windows Server 2025 v2.0.0 L1 DCWindows

SYSTEM AND COMMUNICATIONS PROTECTION

18.6.7.7 Ensure 'Set authentication rate limiter delay (milliseconds)' is set to 'Enabled: 2000' or moreCIS Microsoft Windows 11 Enterprise v5.0.1 L1 BLWindows

SYSTEM AND COMMUNICATIONS PROTECTION

18.6.7.7 Ensure 'Set authentication rate limiter delay (milliseconds)' is set to 'Enabled: 2000' or moreCIS Microsoft Windows 11 Stand-alone v5.0.0 L1 BLWindows

SYSTEM AND COMMUNICATIONS PROTECTION

18.7.9 (L1) Ensure 'Manage processing of Queue-specific files' is set to 'Enabled: Limit Queue-specific files to Color profiles'CIS Microsoft Windows 10 EMS Gateway v3.0.0 L1Windows

SYSTEM AND INFORMATION INTEGRITY

18.7.10 Ensure 'Manage processing of Queue-specific files' is set to 'Enabled: Limit Queue-specific files to Color profiles'CIS Microsoft Windows Server 2022 v5.0.0 L1 DCWindows

SYSTEM AND INFORMATION INTEGRITY

18.10.80.1 Ensure 'Enable ESS with Supported Peripherals' is set to 'Enabled: 1'CIS Microsoft Windows 11 Stand-alone v5.0.0 L1 BLWindows

SYSTEM AND INFORMATION INTEGRITY

18.10.80.1 Ensure 'Enable ESS with Supported Peripherals' is set to 'Enabled: 1'CIS Microsoft Windows 11 Enterprise v5.0.1 L1Windows

SYSTEM AND INFORMATION INTEGRITY

Allow users to demote attachments to Level 2MSCT Microsoft 365 Apps for Enterprise 2206 v1.0.0Windows

CONFIGURATION MANAGEMENT

Allow users to demote attachments to Level 2Microsoft 365 Apps for Enterprise 2306 v1.0.0Windows

CONFIGURATION MANAGEMENT

Allow users to demote attachments to Level 2MSCT Office 365 ProPlus 1908 v1.0.0Windows

CONFIGURATION MANAGEMENT

Allow users to demote attachments to Level 2MSCT Microsoft 365 Apps for Enterprise 2112 v1.0.0Windows

CONFIGURATION MANAGEMENT

Salesforce.com : Setting Session Security - 'Session Timeout <= 2 hours'TNS Salesforce Best Practices Audit v1.2.0Salesforce.com

ACCESS CONTROL

SonicWALL - Review the NTP server configurationTNS SonicWALL v5.9SonicWALL

AUDIT AND ACCOUNTABILITY

SQLI-22-008700 - SQL Server must use NIST FIPS 140-2 or 140-3 validated cryptographic operations for encryption, hashing, and signing.DISA Microsoft SQL Server 2022 Instance STIG v1r4 WindowsWindows

IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

Word 2 and earlier binary documents and templatesMSCT Microsoft 365 Apps for Enterprise 2112 v1.0.0Windows

SYSTEM AND INFORMATION INTEGRITY

Word 2 and earlier binary documents and templatesMSCT M365 Apps for enterprise 2312 v1.0.0Windows

SYSTEM AND INFORMATION INTEGRITY

Word 2 and earlier binary documents and templatesMSCT Office 2016 v1.0.0Windows

SYSTEM AND INFORMATION INTEGRITY