Item Search

NameAudit NamePluginCategory
1.2 Do Not Install a Multi-Use System - chkconfigCIS BIND DNS v3.0.1 Authoritative Name ServerUnix

CONFIGURATION MANAGEMENT

1.2 Do Not Install a Multi-Use System - chkconfigCIS BIND DNS v3.0.1 Caching Only Name ServerUnix

CONFIGURATION MANAGEMENT

1.2 Do Not Install a Multi-Use System - systemctlCIS BIND DNS v3.0.1 Authoritative Name ServerUnix

CONFIGURATION MANAGEMENT

1.2 Do Not Install a Multi-Use System - systemctlCIS BIND DNS v3.0.1 Caching Only Name ServerUnix

CONFIGURATION MANAGEMENT

1.2.4 Disable the rhnsd DaemonCIS Red Hat Enterprise Linux 5 L2 v2.2.1Unix

SYSTEM AND INFORMATION INTEGRITY

1.2.5 Disable the rhnsd DaemonCIS Red Hat Enterprise Linux 7 STIG v2.0.0 L2 ServerUnix

CONFIGURATION MANAGEMENT

1.2.5 Disable the rhnsd DaemonCIS Red Hat Enterprise Linux 7 STIG v2.0.0 L1 ServerUnix

CONFIGURATION MANAGEMENT

1.2.5 Disable the rhnsd DaemonCIS Red Hat 6 Server L2 v3.0.0Unix

CONFIGURATION MANAGEMENT

1.2.5 Disable the rhnsd DaemonCIS Red Hat 6 Workstation L2 v3.0.0Unix

CONFIGURATION MANAGEMENT

1.5 Installing ISC BIND 9 - bind9 installationCIS BIND DNS v1.0.0 L1 Authoritative Name ServerUnix

CONFIGURATION MANAGEMENT

1.5 Installing ISC BIND 9 - bind9 installationCIS BIND DNS v1.0.0 L1 Caching Only Name ServerUnix

CONFIGURATION MANAGEMENT

1.5 Installing ISC BIND 9 - named locationCIS BIND DNS v3.0.1 Authoritative Name ServerUnix

CONFIGURATION MANAGEMENT

1.5 Installing ISC BIND 9 - named locationCIS BIND DNS v3.0.1 Caching Only Name ServerUnix

CONFIGURATION MANAGEMENT

1.5 Installing ISC BIND 9 - named locationCIS BIND DNS v1.0.0 L1 Caching Only Name ServerUnix

CONFIGURATION MANAGEMENT

1.5 Installing ISC BIND 9 - named locationCIS BIND DNS v1.0.0 L1 Authoritative Name ServerUnix

CONFIGURATION MANAGEMENT

1.8.3 Ensure GDM session lock is enabledCIS Amazon Linux 2 STIG v2.0.0 STIGUnix

ACCESS CONTROL

1.8.6 Ensure GDM session lock is enabledCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIGUnix

ACCESS CONTROL

2.1.4 Ensure 'SECURE_REGISTER_' Is Set to 'TCPS' or 'IPC'CIS Oracle Server 18c Linux v1.1.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION

2.1.4 Ensure 'SECURE_REGISTER_' Is Set to 'TCPS' or 'IPC'CIS Oracle Server 18c Windows v1.1.0Windows

SYSTEM AND COMMUNICATIONS PROTECTION

2.1.4 Ensure 'SECURE_REGISTER_' Is Set to 'TCPS' or 'IPC'CIS Oracle Server 12c Linux v3.0.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION

3.6 Configure Network Time Protocol (NTP) - OPTIONS=-u ntp:ntp -p /var/run/ntpd.pidCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

AUDIT AND ACCOUNTABILITY

3.6 Configure Network Time Protocol (NTP) - restrict -6 default kod nomodify nopeer notrap noqueryCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

AUDIT AND ACCOUNTABILITY

3.6 Configure Network Time Protocol (NTP) - restrict default kod nomodify nopeer notrap noqueryCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

AUDIT AND ACCOUNTABILITY

3.6 Configure Network Time Protocol (NTP) - server aaa.bbb.ccc.dddCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

AUDIT AND ACCOUNTABILITY

5.2 Ensure SELinux security options are set, if applicableCIS Docker Community Edition v1.1.0 L2 DockerUnix

ACCESS CONTROL

5.2 Verify SELinux security options, if applicableCIS Docker 1.12.0 v1.0.0 L2 DockerUnix

ACCESS CONTROL

5.2 Verify SELinux security options, if applicable (Scored)CIS Docker 1.6 v1.0.0 L2 DockerUnix

ACCESS CONTROL

5.3 Ensure that, if applicable, SELinux security options are setCIS Docker v1.7.0 L2 Docker - LinuxUnix

SYSTEM AND INFORMATION INTEGRITY

5.5.2 Ensure system accounts are secured - non-login shellCIS Red Hat 6 Workstation L1 v3.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

5.5.2 Ensure system accounts are secured - non-login shellCIS CentOS 6 Workstation L1 v3.0.0Unix

ACCESS CONTROL

5.5.2 Ensure system accounts are secured - non-login shellCIS CentOS 6 Server L1 v3.0.0Unix

ACCESS CONTROL

5.5.2 Ensure system accounts are secured - non-login shellCIS Oracle Linux 6 Workstation L1 v2.0.0Unix

ACCESS CONTROL

5.5.2 Ensure system accounts are secured - unlocked non-rootCIS Red Hat 6 Server L1 v3.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

5.5.2 Ensure system accounts are secured - unlocked non-rootCIS CentOS 6 Server L1 v3.0.0Unix

ACCESS CONTROL

5.5.2 Ensure system accounts are secured - unlocked non-rootCIS CentOS 6 Workstation L1 v3.0.0Unix

ACCESS CONTROL

5.5.2 Ensure system accounts are secured - unlocked non-rootCIS Oracle Linux 6 Server L1 v2.0.0Unix

ACCESS CONTROL

5.5.2 Ensure system accounts are secured - unlocked non-rootCIS Oracle Linux 6 Workstation L1 v2.0.0Unix

ACCESS CONTROL

JBOS-AS-000650 - JBoss must be configured to use an approved TLS version.DISA JBoss EAP 6.3 STIG v2r6Unix

SYSTEM AND COMMUNICATIONS PROTECTION

JBOS-AS-000655 - JBoss must be configured to use an approved cryptographic algorithm in conjunction with TLS.DISA JBoss EAP 6.3 STIG v2r6Unix

SYSTEM AND COMMUNICATIONS PROTECTION

JBOS-AS-000685 - The JRE installed on the JBoss server must be kept up to date.DISA JBoss EAP 6.3 STIG v2r6Unix

SYSTEM AND INFORMATION INTEGRITY

RHEL-06-000275 - The operating system must employ cryptographic mechanisms to protect information in storage.DISA Red Hat Enterprise Linux 6 STIG v2r2Unix

CONFIGURATION MANAGEMENT

RHEL-06-000276 - The operating system must protect the confidentiality and integrity of data at rest.DISA Red Hat Enterprise Linux 6 STIG v2r2Unix

SYSTEM AND COMMUNICATIONS PROTECTION

RHEL-06-000277 - The operating system must employ cryptographic mechanisms to prevent unauthorized disclosure of data at rest unless otherwise protected by alternative physical measures.DISA Red Hat Enterprise Linux 6 STIG v2r2Unix

CONFIGURATION MANAGEMENT

RHEL-06-000504 - The operating system must conduct backups of user-level information contained in the operating system per organization defined frequency to conduct backups consistent with recovery time and recovery point objectives.DISA Red Hat Enterprise Linux 6 STIG v2r2Unix

CONFIGURATION MANAGEMENT

RHEL-06-000505 - The operating system must conduct backups of system-level information contained in the information system per organization defined frequency to conduct backups that are consistent with recovery time and recovery point objectives.DISA Red Hat Enterprise Linux 6 STIG v2r2Unix

CONFIGURATION MANAGEMENT

RHEL-07-020029 - The Red Hat Enterprise Linux operating system must use a file integrity tool to verify correct operation of all security functions.DISA Red Hat Enterprise Linux 7 STIG v3r15Unix

SYSTEM AND INFORMATION INTEGRITY

RHEL-07-030201 - The Red Hat Enterprise Linux operating system must be configured to off-load audit logs onto a different system or storage media from the system being audited.DISA Red Hat Enterprise Linux 7 STIG v3r15Unix

AUDIT AND ACCOUNTABILITY

RHEL-07-030210 - The Red Hat Enterprise Linux operating system must take appropriate action when the remote logging buffer is full.DISA Red Hat Enterprise Linux 7 STIG v3r15Unix

AUDIT AND ACCOUNTABILITY

RHEL-07-030211 - The Red Hat Enterprise Linux operating system must label all off-loaded audit logs before sending them to the central log server.DISA Red Hat Enterprise Linux 7 STIG v3r15Unix

AUDIT AND ACCOUNTABILITY

RHEL-09-213110 - RHEL 9 must implement nonexecutable data to protect its memory from unauthorized code execution.DISA Red Hat Enterprise Linux 9 STIG v2r4Unix

SYSTEM AND INFORMATION INTEGRITY