Item Search

NameAudit NamePluginCategory
1.2 Ensure systemd Service Files Are EnabledCIS PostgreSQL 12 OS v1.1.0Unix

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

1.3 Ensure systemd Service Files Are EnabledCIS PostgreSQL 13 v1.3.0 L1 OS Linux UnixUnix

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

1.3 Ensure systemd Service Files Are EnabledCIS PostgreSQL 15 v1.2.0 L1 OS Linux UnixUnix

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

1.3 Ensure systemd Service Files Are EnabledCIS PostgreSQL 16 v1.1.0 L1 OS Linux UnixUnix

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

1.3 Ensure systemd Service Files Are EnabledCIS PostgreSQL 14 OS v 1.3.0Unix

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

1.3 Ensure systemd Service Files Are EnabledCIS PostgreSQL 17 v1.0.0 L1 PostgreSQLUnix

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

1.4 Ensure systemd Service Files Are EnabledCIS PostgreSQL 11 OS v1.0.0Unix

CONFIGURATION MANAGEMENT

1.4 Ensure systemd Service Files Are EnabledCIS PostgreSQL 10 OS v1.0.0Unix

SYSTEM AND SERVICES ACQUISITION

2.1.6 Ensure that usage is restricted and expiry is enforced for Databricks personal access tokensCIS Microsoft Azure Foundations v5.0.0 L1microsoft_azure

ACCESS CONTROL

2.3 Disable PostgreSQL Command HistoryCIS PostgreSQL 13 v1.3.0 L1 Database UnixUnix

MEDIA PROTECTION

2.3 Disable PostgreSQL Command HistoryCIS PostgreSQL 15 v1.2.0 L1 OS Linux UnixUnix

MEDIA PROTECTION

3.1.12 Ensure syslog messages are not lost due to sizeCIS PostgreSQL 12 DB v1.1.0PostgreSQLDB

AUDIT AND ACCOUNTABILITY

3.1.12 Ensure syslog messages are not lost due to sizeCIS PostgreSQL 14 DB v 1.3.0PostgreSQLDB

AUDIT AND ACCOUNTABILITY

3.10 Ensure the public role in the msdb database is not granted access to SQL Agent proxiesCIS SQL Server 2008 R2 DB Engine L1 v1.7.0MS_SQLDB

ACCESS CONTROL

3.11 Ensure the public role in the msdb database is not granted access to SQL Agent proxiesCIS SQL Server 2012 Database L1 DB v1.6.0MS_SQLDB

ACCESS CONTROL

4.1 Ensure Interactive Login is DisabledCIS PostgreSQL 14 OS v 1.3.0Unix

ACCESS CONTROL

4.1 Ensure Interactive Login is DisabledCIS PostgreSQL 13 v1.3.0 L1 Database UnixUnix

ACCESS CONTROL

4.1 Ensure Interactive Login is DisabledCIS PostgreSQL 17 v1.0.0 L1 PostgreSQLUnix

ACCESS CONTROL

4.4 Rebuild the images to include security patchesCIS Docker 1.11.0 v1.0.0 L1 DockerUnix

CONFIGURATION MANAGEMENT

5.16 Ensure AWS Security Hub is enabledCIS Amazon Web Services Foundations v7.0.0 L2amazon_aws

RISK ASSESSMENT

8.1.11 Ensure that Microsoft Cloud Security Benchmark policies are not set to 'Disabled'CIS Microsoft Azure Foundations v5.0.0 L1microsoft_azure

ACCESS CONTROL, CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

8.3 Ensure the backup and restore tool, 'pgBackRest', is installed and configuredCIS PostgreSQL 9.5 OS v1.1.0Unix

CONTINGENCY PLANNING

9.6 Ensure Password Fields are Not EmptyCIS Oracle Solaris 11.4 L1 v1.1.0Unix

IDENTIFICATION AND AUTHENTICATION

9.6 Ensure root PATH Integrity - dot in pathCIS Solaris 11.1 L1 v1.0.0Unix

CONFIGURATION MANAGEMENT

9.23 Find Un-owned Files and DirectoriesCIS Oracle Solaris 11.4 L1 v1.1.0Unix

CONFIGURATION MANAGEMENT

9.23 Find Un-owned Files and DirectoriesCIS Solaris 11.2 L1 v1.1.0Unix

ACCESS CONTROL

9.24 Find Un-owned Files and DirectoriesCIS Solaris 11.1 L1 v1.0.0Unix

ACCESS CONTROL

9.24 Find Un-owned Files and DirectoriesCIS Solaris 11 L1 v1.1.0Unix

ACCESS CONTROL

ALMA-09-045125 - AlmaLinux OS 9 must be a supported release.DISA Cloud Linux AlmaLinux OS 9 STIG v1r5Unix

SYSTEM AND INFORMATION INTEGRITY

Brocade - enable administrator account lockoutTenable Best Practices Brocade FabricOSBrocade

ACCESS CONTROL

Brocade - minimum number of numeric digits set to 1Tenable Best Practices Brocade FabricOSBrocade

IDENTIFICATION AND AUTHENTICATION

Brocade - repeat characters must be set to 1Tenable Best Practices Brocade FabricOSBrocade

IDENTIFICATION AND AUTHENTICATION

Brocade - sequential characters must be set to 2Tenable Best Practices Brocade FabricOSBrocade

IDENTIFICATION AND AUTHENTICATION

Brocade - SNMPv3 trap targets are configured properlyTenable Best Practices Brocade FabricOSBrocade

AUDIT AND ACCOUNTABILITY

Brocade - SupportFTP parameters are set to SCPTenable Best Practices Brocade FabricOSBrocade

SYSTEM AND COMMUNICATIONS PROTECTION

Brocade - Switch Connection Control policy must be rejectedTenable Best Practices Brocade FabricOSBrocade

SYSTEM AND COMMUNICATIONS PROTECTION

Ensure that multi-factor authentication is enabled for all accountsTenable Best Practices RackSpace v2.0.0Rackspace

IDENTIFICATION AND AUTHENTICATION

OpenStack Server ImagesTenable Best Practices OpenStack v2.0.0OpenStack

CONFIGURATION MANAGEMENT

PPS9-00-001100 - The EDB Postgres Advanced Server must allow only the ISSM (or individuals or roles appointed by the ISSM) to select which auditable events are to be audited.EDB PostgreSQL Advanced Server OS Linux Audit v2r3Unix

AUDIT AND ACCOUNTABILITY

PPS9-00-004900 - The EDB Postgres Advanced Server must use NIST FIPS 140-2 or 140-3 validated cryptographic modules for cryptographic operations.EDB PostgreSQL Advanced Server OS Linux Audit v2r3Unix

IDENTIFICATION AND AUTHENTICATION

PPS9-00-009200 - The EDB Postgres Advanced Server must implement cryptographic mechanisms to prevent unauthorized modification of organization-defined information at rest (to include, at a minimum, PII and classified information) on organization-defined information system components.EDB PostgreSQL Advanced Server OS Linux Audit v2r3Unix

SYSTEM AND COMMUNICATIONS PROTECTION

PPS9-00-009300 - The EDB Postgres Advanced Server must implement cryptographic mechanisms preventing the unauthorized disclosure of organization-defined information at rest on organization-defined information system components.EDB PostgreSQL Advanced Server OS Linux Audit v2r3Unix

SYSTEM AND COMMUNICATIONS PROTECTION

Rackspace Active ServersTenable Best Practices RackSpace v2.0.0Rackspace

CONFIGURATION MANAGEMENT

Rackspace Database Backups - Every DB instance backed up since the last scan.Tenable Best Practices RackSpace v2.0.0Rackspace

CONTINGENCY PLANNING

Review the list of all Domains updated since the last scanTenable Best Practices RackSpace v2.0.0Rackspace

CONFIGURATION MANAGEMENT

Review the list of Current Rackspace UsersTenable Best Practices RackSpace v2.0.0Rackspace

ACCESS CONTROL

Review the list of DomainsTenable Best Practices RackSpace v2.0.0Rackspace

CONFIGURATION MANAGEMENT

Review the list of OpenStack TenantsTenable Best Practices OpenStack v2.0.0OpenStack

ACCESS CONTROL

Review the list of Ports and their detailsTenable Best Practices RackSpace v2.0.0Rackspace

CONFIGURATION MANAGEMENT

Review the List of Rackspace Users with Admin RolesTenable Best Practices RackSpace v2.0.0Rackspace

ACCESS CONTROL