Item Search

NameAudit NamePluginCategory
1.1 Ensure packages are obtained from authorized repositoriesCIS PostgreSQL 11 OS v1.0.0Unix

CONFIGURATION MANAGEMENT

3.1.31 Ensure 'log_parser_stats' is disabledCIS PostgreSQL 9.5 DB v1.1.0PostgreSQLDB

AUDIT AND ACCOUNTABILITY

3.1.33 Ensure 'log_executor_stats' is disabledCIS PostgreSQL 9.5 DB v1.1.0PostgreSQLDB

AUDIT AND ACCOUNTABILITY

5.2.2.3 (L1) Enable Conditional Access policies to block legacy authenticationCIS Microsoft 365 Foundations v5.0.0 L1 E5microsoft_azure

CONFIGURATION MANAGEMENT

5.10.5 Enable Security PostureCIS Google Kubernetes Engine (GKE) v1.7.0 L2GCP

CONFIGURATION MANAGEMENT

7.2 Ensure Asymmetric Key Size is set to 'greater than or equal to 2048' in non-system databasesCIS SQL Server 2016 Database L1 AWS RDS v1.4.0MS_SQLDB

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

7.2 Ensure Asymmetric Key Size is set to 'greater than or equal to 2048' in non-system databasesCIS SQL Server 2017 Database L1 AWS RDS v1.3.0MS_SQLDB

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

Big Sur - Disable Unix-to-Unix Copy Protocol ServiceNIST macOS Big Sur v1.4.0 - 800-53r4 HighUnix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

Big Sur - Disable Unix-to-Unix Copy Protocol ServiceNIST macOS Big Sur v1.4.0 - 800-53r5 ModerateUnix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

Brocade - Bottleneck alerts must be enabledTenable Best Practices Brocade FabricOSBrocade

AUDIT AND ACCOUNTABILITY

Brocade - Disable HTTP IPv4Tenable Best Practices Brocade FabricOSBrocade

CONFIGURATION MANAGEMENT

Brocade - Disable TFTP IPv6Tenable Best Practices Brocade FabricOSBrocade

CONFIGURATION MANAGEMENT

Brocade - Enable SSH IPv6Tenable Best Practices Brocade FabricOSBrocade

SYSTEM AND COMMUNICATIONS PROTECTION

Brocade - Enforce signature validation for firmwareTenable Best Practices Brocade FabricOSBrocade

SYSTEM AND INFORMATION INTEGRITY

Brocade - FIPS Mode is enabledTenable Best Practices Brocade FabricOSBrocade

SYSTEM AND COMMUNICATIONS PROTECTION

Brocade - Forward all error logs to syslog daemonTenable Best Practices Brocade FabricOSBrocade

AUDIT AND ACCOUNTABILITY

Brocade - lockout threshold set to 3Tenable Best Practices Brocade FabricOSBrocade

ACCESS CONTROL

Brocade - minimum number of numeric digits set to 1Tenable Best Practices Brocade FabricOSBrocade

IDENTIFICATION AND AUTHENTICATION

Brocade - MOTD TextTenable Best Practices Brocade FabricOSBrocade

ACCESS CONTROL

Brocade - Review Enabled AccountsTenable Best Practices Brocade FabricOSBrocade

ACCESS CONTROL

Brocade - SNMPv3 trap targets are configured properlyTenable Best Practices Brocade FabricOSBrocade

AUDIT AND ACCOUNTABILITY

CIS_PostgreSQL_16_v1.1.0_L1_OS_Linux_Unix.audit from CIS PostgreSQL 16 Benchmark v1.1.0CIS PostgreSQL 16 v1.1.0 L1 OS Linux UnixUnix
Ensure rsh server is not enabled - rexecTenable Cisco Firepower Management Center OS Best Practices AuditUnix

CONFIGURATION MANAGEMENT

Ensure rsh server is not enabled - rloginTenable Cisco Firepower Management Center OS Best Practices AuditUnix

CONFIGURATION MANAGEMENT

Ensure rsh server is not enabled - rshTenable Cisco Firepower Management Center OS Best Practices AuditUnix

CONFIGURATION MANAGEMENT

Ensure secure ICMP redirects are not accepted - /etc/sysctl ipv4 all secureTenable Cisco Firepower Management Center OS Best Practices AuditUnix

SYSTEM AND COMMUNICATIONS PROTECTION

Ensure separate partition exists for /varTenable Cisco Firepower Management Center OS Best Practices AuditUnix

CONFIGURATION MANAGEMENT

Ensure session initiation information is collected - auditctl btmpTenable Cisco Firepower Management Center OS Best Practices AuditUnix

AUDIT AND ACCOUNTABILITY

Ensure session initiation information is collected - btmpTenable Cisco Firepower Management Center OS Best Practices AuditUnix

AUDIT AND ACCOUNTABILITY

Ensure source routed packets are not accepted - /etc/sysctl ipv4 all accceptTenable Cisco Firepower Management Center OS Best Practices AuditUnix

SYSTEM AND COMMUNICATIONS PROTECTION

Ensure source routed packets are not accepted - sysctl ipv4 all accceptTenable Cisco Firepower Management Center OS Best Practices AuditUnix

SYSTEM AND COMMUNICATIONS PROTECTION

Ensure source routed packets are not accepted - sysctl ipv4 default acceptTenable Cisco Firepower Management Center OS Best Practices AuditUnix

SYSTEM AND COMMUNICATIONS PROTECTION

Ensure successful file system mounts are collected - auditctl b64Tenable Cisco Firepower Management Center OS Best Practices AuditUnix

AUDIT AND ACCOUNTABILITY

Ensure suspicious packets are logged - /etc/sysctl ipv4 default log_martiansTenable Cisco Firepower Management Center OS Best Practices AuditUnix

AUDIT AND ACCOUNTABILITY

Ensure suspicious packets are logged - sysctl ipv4 all log_martiansTenable Cisco Firepower Management Center OS Best Practices AuditUnix

AUDIT AND ACCOUNTABILITY

Ensure talk client is not installed - dpkgTenable Cisco Firepower Management Center OS Best Practices AuditUnix

CONFIGURATION MANAGEMENT

Ensure talk server is not enabled - ntalkTenable Cisco Firepower Management Center OS Best Practices AuditUnix

CONFIGURATION MANAGEMENT

Ensure telnet client is not installed - rpmTenable Cisco Firepower Management Center OS Best Practices AuditUnix

CONFIGURATION MANAGEMENT

Ensure telnet client is not installed - zypperTenable Cisco Firepower Management Center OS Best Practices AuditUnix

CONFIGURATION MANAGEMENT

Ensure that database instances do not allow root accessTenable Best Practices RackSpace v2.0.0Rackspace

ACCESS CONTROL

Ensure the MCS Translation Service (mcstrans) is not installed - rpmTenable Cisco Firepower Management Center OS Best Practices AuditUnix

CONFIGURATION MANAGEMENT

Ensure the MCS Translation Service (mcstrans) is not installed - zypperTenable Cisco Firepower Management Center OS Best Practices AuditUnix

CONFIGURATION MANAGEMENT

Ensure unsuccessful unauthorized file access attempts are collected - b32 EACCESTenable Cisco Firepower Management Center OS Best Practices AuditUnix

AUDIT AND ACCOUNTABILITY

Ensure unsuccessful unauthorized file access attempts are collected - b64 EACCESTenable Cisco Firepower Management Center OS Best Practices AuditUnix

AUDIT AND ACCOUNTABILITY

Lockout for failed password attempts - 'auth sufficient pam_unix.so'Tenable Cisco Firepower Management Center OS Best Practices AuditUnix

ACCESS CONTROL

Lockout for failed password attempts - password-auth 'auth sufficient pam_faillock.so authsucc audit deny=5 unlock_time=900'Tenable Cisco Firepower Management Center OS Best Practices AuditUnix

ACCESS CONTROL

Rackspace Active ServersTenable Best Practices RackSpace v2.0.0Rackspace

CONFIGURATION MANAGEMENT

Rackspace Inactive ServersTenable Best Practices RackSpace v2.0.0Rackspace

CONFIGURATION MANAGEMENT

Rackspace Server ImagesTenable Best Practices RackSpace v2.0.0Rackspace

CONFIGURATION MANAGEMENT

Review the list of Current Rackspace UsersTenable Best Practices RackSpace v2.0.0Rackspace

ACCESS CONTROL