1.2 Ensure Single-Function Member Servers are Used | CIS SQL Server 2008 R2 DB Engine L1 v1.7.0 | MS_SQLDB | SYSTEM AND COMMUNICATIONS PROTECTION |
1.2 Ensure Single-Function Member Servers are Used | CIS SQL Server 2014 Database L1 AWS RDS v1.5.0 | MS_SQLDB | SYSTEM AND COMMUNICATIONS PROTECTION |
1.2 Ensure Single-Function Member Servers are Used | CIS SQL Server 2014 Database L1 DB v1.5.0 | MS_SQLDB | SYSTEM AND COMMUNICATIONS PROTECTION |
1.2 Ensure Single-Function Member Servers are Used | CIS Microsoft SQL Server 2019 v1.5.0 L1 Database Engine | MS_SQLDB | SYSTEM AND COMMUNICATIONS PROTECTION |
1.2 Ensure Single-Function Member Servers are Used | CIS Microsoft SQL Server 2019 v1.5.0 L1 AWS RDS | MS_SQLDB | SYSTEM AND COMMUNICATIONS PROTECTION |
2.16 Ensure 'AUTO_CLOSE' is set to 'OFF' on contained databases | CIS SQL Server 2012 Database L1 DB v1.6.0 | MS_SQLDB | CONFIGURATION MANAGEMENT |
2.16 Ensure 'AUTO_CLOSE' is set to 'OFF' on contained databases | CIS SQL Server 2012 Database L1 AWS RDS v1.6.0 | MS_SQLDB | CONFIGURATION MANAGEMENT |
3.1 Ensure 'Server Authentication' Property is set to 'Windows Authentication Mode' | CIS SQL Server 2012 Database L1 DB v1.6.0 | MS_SQLDB | IDENTIFICATION AND AUTHENTICATION |
3.1 Ensure 'Server Authentication' Property is set to 'Windows Authentication Mode' | CIS SQL Server 2012 Database L1 AWS RDS v1.6.0 | MS_SQLDB | IDENTIFICATION AND AUTHENTICATION |
3.2 Ensure CONNECT permissions on the 'guest user' is Revoked within all SQL Server databases excluding the master, msdb and tempdb | CIS SQL Server 2008 R2 DB Engine L1 v1.7.0 | MS_SQLDB | ACCESS CONTROL |
3.2 Ensure CONNECT permissions on the 'guest user' is Revoked within all SQL Server databases excluding the master, msdb and tempdb | CIS SQL Server 2014 Database L1 AWS RDS v1.5.0 | MS_SQLDB | ACCESS CONTROL |
3.2 Ensure CONNECT permissions on the 'guest user' is Revoked within all SQL Server databases excluding the master, msdb and tempdb | CIS SQL Server 2014 Database L1 DB v1.5.0 | MS_SQLDB | ACCESS CONTROL |
3.2 Ensure CONNECT permissions on the 'guest user' is Revoked within all SQL Server databases excluding the master, msdb and tempdb | CIS SQL Server 2012 Database L1 DB v1.6.0 | MS_SQLDB | ACCESS CONTROL |
3.2 Ensure CONNECT permissions on the 'guest user' is Revoked within all SQL Server databases excluding the master, msdb and tempdb | CIS SQL Server 2012 Database L1 AWS RDS v1.6.0 | MS_SQLDB | ACCESS CONTROL |
3.2 Ensure CONNECT permissions on the 'guest' user is Revoked within all SQL Server databases | CIS Microsoft SQL Server 2019 v1.5.0 L1 AWS RDS | MS_SQLDB | ACCESS CONTROL, MEDIA PROTECTION |
3.10 Ensure Windows local groups are not SQL Logins | CIS Microsoft SQL Server 2019 v1.5.0 L1 AWS RDS | MS_SQLDB | ACCESS CONTROL, MEDIA PROTECTION |
3.10 Ensure Windows local groups are not SQL Logins | CIS Microsoft SQL Server 2019 v1.5.0 L1 Database Engine | MS_SQLDB | ACCESS CONTROL, MEDIA PROTECTION |
3.10 Ensure Windows local groups are not SQL Logins | CIS SQL Server 2012 Database L1 AWS RDS v1.6.0 | MS_SQLDB | ACCESS CONTROL |
5.1.1.2 Ensure 'EXECUTE' is revoked from 'PUBLIC' on 'File System' Packages | CIS Oracle Server 12c DB Unified Auditing v3.0.0 | OracleDB | ACCESS CONTROL |
5.1.1.2 Ensure 'EXECUTE' is revoked from 'PUBLIC' on 'File System' Packages | CIS Oracle Server 12c DB Traditional Auditing v3.0.0 | OracleDB | ACCESS CONTROL |
5.1.1.2 Ensure 'EXECUTE' is revoked from 'PUBLIC' on 'File System' Packages - File System Packages | CIS Oracle Server 18c DB Unified Auditing v1.1.0 | OracleDB | ACCESS CONTROL |
5.1.1.2 Ensure 'EXECUTE' is revoked from 'PUBLIC' on 'File System' Packages - File System Packages | CIS Oracle Server 18c DB Traditional Auditing v1.1.0 | OracleDB | ACCESS CONTROL |
6.3.4 Ensure 'user options' database flag for Cloud SQL SQL Server instance is not configured | CIS Google Cloud Platform v3.0.0 L1 | GCP | CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION |
DISA_Microsoft_Windows_11_STIG_v2r3.audit from DISA Microsoft Windows 11 STIG v2r3 | DISA Microsoft Windows 11 STIG v2r3 | Windows | |
DISA_Oracle_Linux_8_STIG_v2r4.audit from DISA Oracle Linux 8 STIG v2r4 | DISA Oracle Linux 8 STIG v2r4 | Unix | |
DISA_STIG_Cisco_ASA_FW_v2r1.audit from DISA Cisco ASA Firewall v2r1 STIG | DISA STIG Cisco ASA FW v2r1 | Cisco | |
DISA_STIG_Cisco_ASA_NDM_v2r2.audit from DISA Cisco ASA NDM v2r2 STIG | DISA STIG Cisco ASA NDM v2r2 | Cisco | |
DISA_STIG_Cisco_ASA_VPN_v2r2.audit from DISA Cisco ASA VPN v2r2 STIG | DISA STIG Cisco ASA VPN v2r2 | Cisco | |
DISA_STIG_EnterpriseDB_Postgres_Advanced_Server_v2r1_OS_Linux.audit from DISA EnterpriseDB Postgres Advanced Server (EPAS) v2r1 STIG | EnterpriseDB PostgreSQL Advanced Server OS Linux v2r1 | Unix | |
DISA_STIG_Microsoft_Access_2010_v1r11.audit from DISA Microsoft Access 2010 v1r11 STIG | DISA STIG Office 2010 Access v1r11 | Windows | |
DISA_STIG_Microsoft_Defender_Antivirus_v2r4.audit from DISA Microsoft Defender Antivirus v2r4 STIG | DISA STIG Microsoft Defender Antivirus v2r4 | Windows | |
DISA_STIG_Microsoft_Groove_2013_v1r4.audit from DISA Microsoft Groove 2013 v1r4 STIG | DISA STIG Microsoft Groove 2013 v1r4 | Windows | |
DISA_STIG_Microsoft_InfoPath_2010_v1r12.audit from DISA Microsoft InfoPath 2010 v1r12 STIG | DISA STIG Office 2010 InfoPath v1r12 | Windows | |
DISA_STIG_Microsoft_Lync_2013_v1r5.audit from DISA Microsoft Lync 2013 v1r5 STIG | DISA STIG Microsoft Lync 2013 v1r5 | Windows | |
DISA_STIG_Microsoft_OneNote_2013_v1r4.audit from DISA Microsoft OneNote 2013 v1r4 STIG | DISA STIG Microsoft OneNote 2013 v1r4 | Windows | |
DISA_STIG_Microsoft_Outlook_2010_v1r14.audit from DISA Microsoft Outlook 2010 v1r14 STIG | DISA STIG Office 2010 Outlook v1r14 | Windows | |
DISA_STIG_Microsoft_Outlook_2013_v1r14.audit from DISA Microsoft Outlook 2013 v1r14 STIG | DISA STIG Microsoft Outlook 2013 v1r14 | Windows | |
DISA_STIG_Microsoft_Outlook_2016_v2r3.audit from DISA Microsoft Outlook 2016 v2r3 STIG | DISA STIG Microsoft Outlook 2016 v2r3 | Windows | |
DISA_STIG_Microsoft_Visio_2013_v1r5.audit from DISA Microsoft Visio 2013 v1r5 STIG | DISA STIG Microsoft Visio 2013 v1r5 | Windows | |
DISA_STIG_MS_Windows_Privileged_Access_Workstation_v3r1.audit from DISA Microsoft Windows PAW v3r1 STIG | DISA MS Windows Privileged Access Workstation v3r1 | Windows | |
DISA_STIG_SharePoint_2013_v2r4.audit from DISA Microsoft SharePoint 2013 v2r4 STIG | DISA STIG SharePoint 2013 v2r4 | Windows | |
DISA_STIG_Solaris_10_x86_v2r4.audit from DISA Solaris 10 X86 v2r4 STIG | DISA STIG Solaris 10 X86 v2r4 | Unix | |
DISA_STIG_Solaris_11_SPARC_v3r1.audit from DISA Solaris 11 SPARC v3r1 STIG | DISA STIG Solaris 11 SPARC v3r1 | Unix | |
DISA_STIG_Solaris_11_v3r1.audit from DISA Solaris 11 X86 v3r1 STIG | DISA STIG Solaris 11 X86 v3r1 | Unix | |
O19C-00-011300 - Changes to configuration options must be audited. | DISA Oracle Database 19c STIG v1r1 Database | OracleDB | CONFIGURATION MANAGEMENT |
O112-C2-006800 - The DBMS must provide audit record generation capability for organization-defined auditable events within the database. | DISA STIG Oracle 11.2g v2r5 Database | OracleDB | AUDIT AND ACCOUNTABILITY |
SQL6-D0-005600 - SQL Server must by default shut down upon audit failure, to include the unavailability of space for more audit log records; or must be configurable to shut down upon audit failure. | DISA STIG SQL Server 2016 Instance DB Audit v3r4 | MS_SQLDB | AUDIT AND ACCOUNTABILITY |
VCTR-67-000072 - The vCenter Server services must be ran using a service account instead of a built-in Windows account. | DISA STIG VMware vSphere 6.7 vCenter v1r4 | VMware | CONFIGURATION MANAGEMENT |
VCWN-06-000022 - The vCenter Server services must be ran using a service account instead of a built-in Windows account. | DISA STIG VMware vSphere vCenter 6.x v1r4 | VMware | CONFIGURATION MANAGEMENT |
VCWN-65-000022 - The vCenter Server for Windows services must be ran using a service account instead of a built-in Windows account. | DISA STIG VMware vSphere vCenter 6.5 v2r3 | VMware | CONFIGURATION MANAGEMENT |