Item Search

NameAudit NamePluginCategory
2.6 Ensure Password Complexity is Configured - validate_password_dictionary_fileCIS MySQL 5.6 Community Database L1 v2.0.0MySQLDB

IDENTIFICATION AND AUTHENTICATION

2.6 Ensure Password Complexity is Configured - validate_password_lengthCIS MySQL 5.6 Enterprise Database L1 v2.0.0MySQLDB

IDENTIFICATION AND AUTHENTICATION

2.6 Ensure Password Complexity is Configured - validate_password_lengthCIS MySQL 5.6 Community Database L1 v2.0.0MySQLDB

IDENTIFICATION AND AUTHENTICATION

2.6 Ensure Password Complexity is Configured - validate_password_mixed_case_countCIS MySQL 5.6 Enterprise Database L1 v2.0.0MySQLDB

IDENTIFICATION AND AUTHENTICATION

2.6 Ensure Password Complexity is Configured - validate_password_mixed_case_countCIS MySQL 5.6 Community Database L1 v2.0.0MySQLDB

IDENTIFICATION AND AUTHENTICATION

2.6 Ensure Password Complexity is Configured - validate_password_policyCIS MySQL 5.6 Community Database L1 v2.0.0MySQLDB

IDENTIFICATION AND AUTHENTICATION

2.6 Ensure Password Complexity is Configured - validate_password_special_char_countCIS MySQL 5.6 Enterprise Database L1 v2.0.0MySQLDB

IDENTIFICATION AND AUTHENTICATION

2.7 Ensure Password Complexity is Configured - validate_password_dictionary_fileCIS MySQL 5.7 Enterprise Database L1 v2.0.0MySQLDB

IDENTIFICATION AND AUTHENTICATION

2.7 Ensure Password Complexity is Configured - validate_password_dictionary_fileCIS MySQL 5.7 Community Database L1 v2.0.0MySQLDB

IDENTIFICATION AND AUTHENTICATION

2.7 Ensure Password Complexity is Configured - validate_password_lengthCIS MySQL 5.7 Enterprise Database L1 v2.0.0MySQLDB

IDENTIFICATION AND AUTHENTICATION

2.7 Ensure Password Complexity is Configured - validate_password_mixed_case_countCIS MySQL 5.7 Community Database L1 v2.0.0MySQLDB

IDENTIFICATION AND AUTHENTICATION

2.7 Ensure Password Complexity is Configured - validate_password_number_countCIS MySQL 5.7 Community Database L1 v2.0.0MySQLDB

IDENTIFICATION AND AUTHENTICATION

2.7 Ensure Password Complexity is Configured - validate_password_number_countCIS MySQL 5.7 Enterprise Database L1 v2.0.0MySQLDB

IDENTIFICATION AND AUTHENTICATION

2.7 Ensure Password Complexity is Configured - validate_password_policyCIS MySQL 5.7 Enterprise Database L1 v2.0.0MySQLDB

IDENTIFICATION AND AUTHENTICATION

6.1.1.4 Ensure only one logging system is in useCIS Debian Linux 12 v1.1.0 L1 ServerUnix

AUDIT AND ACCOUNTABILITY

6.1.1.4 Ensure only one logging system is in useCIS Ubuntu Linux 24.04 LTS v1.0.0 L1 ServerUnix

AUDIT AND ACCOUNTABILITY

6.1.1.4 Ensure only one logging system is in useCIS Ubuntu Linux 24.04 LTS v1.0.0 L1 WorkstationUnix

AUDIT AND ACCOUNTABILITY

6.1.1.4 Ensure only one logging system is in useCIS Debian Linux 12 v1.1.0 L1 WorkstationUnix

AUDIT AND ACCOUNTABILITY

6.2.1.4 Ensure only one logging system is in useCIS AlmaLinux OS 10 v1.0.0 L1 WorkstationUnix

AUDIT AND ACCOUNTABILITY

6.2.1.4 Ensure only one logging system is in useCIS Oracle Linux 9 v2.0.0 L1 WorkstationUnix

AUDIT AND ACCOUNTABILITY

6.2.1.4 Ensure only one logging system is in useCIS SUSE Linux Enterprise 15 v2.0.1 L1 ServerUnix

AUDIT AND ACCOUNTABILITY

6.2.1.4 Ensure only one logging system is in useCIS Rocky Linux 10 v1.0.0 L1 ServerUnix

AUDIT AND ACCOUNTABILITY

6.2.1.4 Ensure only one logging system is in useCIS Rocky Linux 9 v2.0.0 L1 ServerUnix

AUDIT AND ACCOUNTABILITY

6.2.1.4 Ensure only one logging system is in useCIS Rocky Linux 9 v2.0.0 L1 WorkstationUnix

AUDIT AND ACCOUNTABILITY

6.2.1.4 Ensure only one logging system is in useCIS AlmaLinux OS 9 v2.0.0 L1 ServerUnix

AUDIT AND ACCOUNTABILITY

6.2.1.4 Ensure only one logging system is in useCIS AlmaLinux OS 9 v2.0.0 L1 WorkstationUnix

AUDIT AND ACCOUNTABILITY

6.2.1.4 Ensure only one logging system is in useCIS Red Hat Enterprise Linux 10 v1.0.1 L1 WorkstationUnix

AUDIT AND ACCOUNTABILITY

6.2.1.4 Ensure only one logging system is in useCIS SUSE Linux Enterprise 15 v2.0.1 L1 WorkstationUnix

AUDIT AND ACCOUNTABILITY

6.2.1.4 Ensure only one logging system is in useCIS Oracle Linux 10 v1.0.0 L1 WorkstationUnix

AUDIT AND ACCOUNTABILITY

6.2.1.4 Ensure only one logging system is in useCIS Oracle Linux 9 v2.0.0 L1 ServerUnix

AUDIT AND ACCOUNTABILITY

6.2.1.4 Ensure only one logging system is in useCIS Red Hat Enterprise Linux 9 v2.0.0 L1 WorkstationUnix

AUDIT AND ACCOUNTABILITY

6.2.1.4 Ensure only one logging system is in useCIS Oracle Linux 10 v1.0.0 L1 ServerUnix

AUDIT AND ACCOUNTABILITY

6.2.1.4 Ensure only one logging system is in useCIS Red Hat Enterprise Linux 10 v1.0.1 L1 ServerUnix

AUDIT AND ACCOUNTABILITY

6.2.1.4 Ensure only one logging system is in useCIS Rocky Linux 10 v1.0.0 L1 WorkstationUnix

AUDIT AND ACCOUNTABILITY

6.2.1.4 Ensure only one logging system is in useCIS AlmaLinux OS 10 v1.0.0 L1 ServerUnix

AUDIT AND ACCOUNTABILITY

6.2.1.4 Ensure only one logging system is in useCIS Red Hat Enterprise Linux 9 v2.0.0 L1 ServerUnix

AUDIT AND ACCOUNTABILITY

7.2 Ensure Asymmetric Key Size is set to 'greater than or equal to 2048' in non-system databases - greater than or equal to 2048 in non-system databasesCIS SQL Server 2014 Database L1 AWS RDS v1.5.0MS_SQLDB

SYSTEM AND COMMUNICATIONS PROTECTION

7.2 Ensure Asymmetric Key Size is set to 'greater than or equal to 2048' in non-system databases - greater than or equal to 2048 in non-system databasesCIS SQL Server 2014 Database L1 DB v1.5.0MS_SQLDB

SYSTEM AND COMMUNICATIONS PROTECTION

7.2 Ensure Asymmetric Key Size is set to' greater than or equal to 2048' in non-system databasesCIS SQL Server 2012 Database L1 DB v1.6.0MS_SQLDB

SYSTEM AND COMMUNICATIONS PROTECTION

ALMA-09-046550 - AlmaLinux OS 9 must enable Linux audit logging for the USBGuard daemon.DISA Cloud Linux AlmaLinux OS 9 STIG v1r6Unix

AUDIT AND ACCOUNTABILITY

DKER-EE-001810 - On Linux, a non-AUFS storage driver in the Docker Engine - Enterprise component of Docker Enterprise must be used.DISA STIG Docker Enterprise 2.x Linux/Unix v2r2Unix

CONFIGURATION MANAGEMENT

macOS Device Management - Stealth ModeTenable Best Practices for Microsoft Intune macOS v1.0microsoft_azure

ACCESS CONTROL

MD4X-00-001200 - MongoDB must enforce discretionary access control policies, as defined by the data owner, over defined subjects and objects.DISA STIG MongoDB Enterprise Advanced 4.x v1r4 DBMongoDB

ACCESS CONTROL

MD7X-00-000400 MongoDB must provide audit record generation for DOD-defined auditable events within all DBMS/database components.DISA MongoDB Enterprise Advanced 7.x STIG v1r1Unix

AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT

MD7X-00-004900 MongoDB must maintain the authenticity of communications sessions by guarding against man-in-the-middle attacks that guess at Session ID values.DISA MongoDB Enterprise Advanced 7.x STIG v1r1Unix

SYSTEM AND COMMUNICATIONS PROTECTION

MD7X-00-006100 MongoDB must reveal detailed error messages only to the information system security officer (ISSO), information system security manager (ISSM), system administrator (SA), and database administrator (DBA).DISA MongoDB Enterprise Advanced 7.x STIG v1r1MongoDB

SYSTEM AND INFORMATION INTEGRITY

MD7X-00-006700 MongoDB must enforce discretionary access control (DAC) policies, as defined by the data owner, over defined subjects and objects.DISA MongoDB Enterprise Advanced 7.x STIG v1r1Unix

ACCESS CONTROL

O19C-00-008400 - Oracle Database must be configured in accordance with the security configuration settings based on DOD security configuration and implementation guidance, including STIGs, NSA configuration guides, CTOs, DTMs, and IAVMs.DISA Oracle Database 19c STIG v1r5 OracleDBOracleDB

CONFIGURATION MANAGEMENT

O19C-00-008400 - Oracle Database must be configured in accordance with the security configuration settings based on DOD security configuration and implementation guidance, including STIGs, NSA configuration guides, CTOs, DTMs, and IAVMs.DISA Oracle Database 19c STIG v1r3 OracleDBOracleDB

CONFIGURATION MANAGEMENT

TCAT-AS-001470 - Tomcat server must be patched for security vulnerabilities.DISA STIG Apache Tomcat Application Server 9 v3r3 MiddlewareUnix

SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY