Item Search

NameAudit NamePluginCategory
1.1.1 Enable 'aaa new-model'CIS Cisco IOS XE 16.x v2.1.0 L1Cisco

ACCESS CONTROL

1.1.1 Ensure 'Logon Password' is setCIS Cisco Firewall v8.x L1 v4.2.0Cisco

IDENTIFICATION AND AUTHENTICATION

1.1.2 Enable 'aaa authentication login'CIS Cisco IOS XE 16.x v2.1.0 L1Cisco

ACCESS CONTROL

1.1.12 - MobileIron - Turn off VPN when not neededMobileIron - CIS Apple iOS 9 v1.0.0 L1MDM

ACCESS CONTROL

1.2.2 Set 'modulus' to greater than or equal to 2048 for 'crypto key generate rsa'CIS Cisco IOS XR 7.x v1.0.1 L1Cisco

IDENTIFICATION AND AUTHENTICATION

1.4.4 Set password length for local credentialsCIS Cisco NX-OS v1.2.0 L1Cisco

IDENTIFICATION AND AUTHENTICATION

2.1.1.1.3 Set 'modulus' to greater than or equal to 2048 for 'crypto key generate rsa'CIS Cisco IOS 12 L1 v4.0.0Cisco

IDENTIFICATION AND AUTHENTICATION

3.1.1 Set 'no ip source-route'CIS Cisco IOS XE 17.x v2.2.1 L1Cisco

SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION

4.12.1 Ensure LLDP is Disabled if not RequiredCIS Juniper OS Benchmark v2.1.0 L2Juniper

CONFIGURATION MANAGEMENT

7.1 (L1) Ensure the vSwitch Forged Transmits policy is set to rejectCIS VMware ESXi 7.0 v1.5.0 L1VMware

SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION

7.3 Ensure the vSwitch Promiscuous Mode policy is set to rejectCIS VMware ESXi 6.7 v1.3.0 Level 1VMware

SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION

AMLS-L3-000210 - The Arista Multilayer Switch must enforce information flow control using explicit security attributes (for example, IP addresses, port numbers, protocol, Autonomous System, or interface) on information, source, and destination objects.DISA STIG Arista MLS DCS-7000 Series RTR v1r4Arista

ACCESS CONTROL, CONFIGURATION MANAGEMENT

AMLS-L3-000330 - The Arista MLS RTR must be using a version supported by the vendor.DISA STIG Arista MLS DCS-7000 Series RTR v1r4Arista

CONFIGURATION MANAGEMENT

AMLS-NM-000240 - The Arista Multilayer Switch must terminate all network connections associated with a device management session at the end of the session, or the session must be terminated after 10 minutes of inactivity except to fulfill documented and validated mission requirements.DISA STIG Arista MLS DCS-7000 Series NDM v1r4Arista

SYSTEM AND COMMUNICATIONS PROTECTION

ARST-L2-000030 - The Arista MLS layer 2 switch must be configured for Storm Control to limit the effects of packet flooding types of denial-of-service (DoS) attacks.DISA STIG Arista MLS EOS 4.x L2S v2r2Arista

SYSTEM AND COMMUNICATIONS PROTECTION

ARST-L2-000030 - The Arista MLS layer 2 switch must be configured for Storm Control to limit the effects of packet flooding types of denial-of-service (DoS) attacks.DISA STIG Arista MLS EOS 4.2x L2S v2r1Arista

SYSTEM AND COMMUNICATIONS PROTECTION

ARST-L2-000110 - The Arista MLS layer 2 switch must have Dynamic Address Resolution Protocol (ARP) Inspection (DAI) enabled on all user VLANs.DISA STIG Arista MLS EOS 4.2x L2S v2r1Arista

SYSTEM AND COMMUNICATIONS PROTECTION

ARST-ND-000840 - The Arista network device must obtain its public key certificates from an appropriate certificate policy through an approved service provider.DISA STIG Arista MLS EOS 4.x NDM v2r2Arista

SYSTEM AND COMMUNICATIONS PROTECTION

ARST-ND-000840 - The Arista network device must obtain its public key certificates from an appropriate certificate policy through an approved service provider.DISA STIG Arista MLS EOS 4.2x NDM v2r1Arista

SYSTEM AND COMMUNICATIONS PROTECTION

ARST-RT-000330 - The Arista perimeter router must be configured to deny network traffic by default and allow network traffic by exception.DISA STIG Arista MLS EOS 4.x Router v2r2Arista

SYSTEM AND COMMUNICATIONS PROTECTION

ARST-RT-000330 - The Arista perimeter router must be configured to deny network traffic by default and allow network traffic by exception.DISA STIG Arista MLS EOS 4.2x Router v2r1Arista

SYSTEM AND COMMUNICATIONS PROTECTION

CISC-RT-000240 - The Cisco perimeter router must be configured to deny network traffic by default and allow network traffic by exception.DISA Cisco IOS Router RTR STIG v3r3Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

CISC-RT-000240 - The Cisco perimeter router must be configured to deny network traffic by default and allow network traffic by exception.DISA Cisco IOS XR Router RTR STIG v3r2Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

CISC-RT-000240 - The Cisco perimeter router must be configured to deny network traffic by default and allow network traffic by exception.DISA Cisco IOS XE Router RTR STIG v3r3Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

CISC-RT-000270 - The Cisco perimeter router must be configured to block inbound packets with source Bogon IP address prefixes.DISA Cisco IOS XE Router RTR STIG v3r3Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

CISC-RT-000391 - The Cisco perimeter router must be configured to suppress Router Advertisements on all external IPv6-enabled interfaces.DISA Cisco IOS Router RTR STIG v3r3Cisco

CONFIGURATION MANAGEMENT

CISC-RT-000391 - The Cisco perimeter router must be configured to suppress Router Advertisements on all external IPv6-enabled interfaces.DISA Cisco IOS XR Router RTR STIG v3r2Cisco

CONFIGURATION MANAGEMENT

CISC-RT-000391 - The Cisco perimeter router must be configured to suppress Router Advertisements on all external IPv6-enabled interfaces.DISA Cisco IOS XE Router RTR STIG v3r3Cisco

CONFIGURATION MANAGEMENT

DHCP snooping - globalArubaOS Switch 16.x Hardening Guide v1.0.0ArubaOS

SYSTEM AND COMMUNICATIONS PROTECTION

DHCP snooping - port trust and vlansArubaOS Switch 16.x Hardening Guide v1.0.0ArubaOS

SYSTEM AND COMMUNICATIONS PROTECTION

Enhanced secure modeArubaOS Switch 16.x Hardening Guide v1.0.0ArubaOS

CONFIGURATION MANAGEMENT

ESXI-06-000061 - The virtual switch Promiscuous Mode policy must be set to reject.DISA STIG VMware vSphere 6.x ESXi v1r5VMware

CONFIGURATION MANAGEMENT

ESXI-65-000061 - The virtual switch Promiscuous Mode policy must be set to reject on the ESXi host.DISA STIG VMware vSphere ESXi 6.5 v2r4VMware

CONFIGURATION MANAGEMENT

ESXI-67-000061 - The virtual switch Promiscuous Mode policy must be set to reject on the ESXi host.DISA STIG VMware vSphere 6.7 ESXi v1r3VMware

CONFIGURATION MANAGEMENT

ESXi: esxi-8.network-bpduVMware vSphere Security Configuration and Hardening GuideVMware

CONFIGURATION MANAGEMENT

ESXI5-VMNET-000025 - Spanning tree protocol must be enabled and BPDU guard and Portfast must be disabled on the upstream physical switch port for virtual machines that route or bridge traffic.DISA STIG VMWare ESXi Server 5 STIG v2r1VMware

CONFIGURATION MANAGEMENT

Fabric Security - Policy - FIPS ModeTenable Cisco ACICisco_ACI

SYSTEM AND COMMUNICATIONS PROTECTION

Front panel securityArubaOS Switch 16.x Hardening Guide v1.0.0ArubaOS

SYSTEM AND COMMUNICATIONS PROTECTION

HP ProCurve - 'Enable HTTPS'TNS HP ProCurveHPProCurve

SYSTEM AND COMMUNICATIONS PROTECTION

JUEX-RT-000370 - The Juniper perimeter router must be configured to deny network traffic by default and allow network traffic by exception.DISA Juniper EX Series Router v2r1Juniper

SYSTEM AND COMMUNICATIONS PROTECTION

Local password complexity - password configuration historyArubaOS Switch 16.x Hardening Guide v1.0.0ArubaOS

IDENTIFICATION AND AUTHENTICATION

Management VLANArubaOS Switch 16.x Hardening Guide v1.0.0ArubaOS

CONFIGURATION MANAGEMENT

Network Security - Configure LLDP only on required network ports - LLDP-MEDJuniper Hardening JunOS 12 Devices ChecklistJuniper

CONFIGURATION MANAGEMENT

USB portArubaOS CX 10.x Hardening Guide v1.0.0ArubaOS

SYSTEM AND COMMUNICATIONS PROTECTION

VCSA-70-000271 - The vCenter Server must only send NetFlow traffic to authorized collectors.DISA STIG VMware vSphere 7.0 vCenter v1r3VMware

CONFIGURATION MANAGEMENT

VCSA-80-000271 - The vCenter Server must only send NetFlow traffic to authorized collectors.DISA VMware vSphere 8.0 vCenter STIG v2r2VMware

CONFIGURATION MANAGEMENT

VCTR-67-000016 - The vCenter Server must only send NetFlow traffic to authorized collectors.DISA STIG VMware vSphere 6.7 vCenter v1r4VMware

CONFIGURATION MANAGEMENT

VCWN-06-000016 - The system must only send NetFlow traffic to authorized collectors.DISA STIG VMware vSphere vCenter 6.x v1r4VMware

CONFIGURATION MANAGEMENT

VCWN-65-000016 - The vCenter Server for Windows must only send NetFlow traffic to authorized collectors.DISA STIG VMware vSphere vCenter 6.5 v2r3VMware

CONFIGURATION MANAGEMENT

vNetwork : label-vswitchesVMWare vSphere 5.X Hardening GuideVMware