Item Search

NameAudit NamePluginCategory
4.9 (L1) Host must transmit audit records to a remote log collectorCIS VMware ESXi 8.0 v1.2.0 L1VMware

AUDIT AND ACCOUNTABILITY

5.4 CIFS - 'CIFS protocol is disabled'TNS NetApp Data ONTAP 7GNetApp

CONFIGURATION MANAGEMENT

5.4 CIFS - 'cifs.audit.autosave.file.extension has been configured'TNS NetApp Data ONTAP 7GNetApp

AUDIT AND ACCOUNTABILITY

5.4 CIFS - 'cifs.audit.enable = on'TNS NetApp Data ONTAP 7GNetApp

AUDIT AND ACCOUNTABILITY

5.4 CIFS - 'cifs.audit.logon_events.enable = on'TNS NetApp Data ONTAP 7GNetApp

AUDIT AND ACCOUNTABILITY

5.4 CIFS - 'cifs.smb2.client.enable = on'TNS NetApp Data ONTAP 7GNetApp

SYSTEM AND INFORMATION INTEGRITY

5.4 CIFS - 'ldap.enable = on'TNS NetApp Data ONTAP 7GNetApp

IDENTIFICATION AND AUTHENTICATION

5.4 CIFS - 'timed.enable = on'TNS NetApp Data ONTAP 7GNetApp

AUDIT AND ACCOUNTABILITY

5.5 NFS - 'nfs.kerberos.enable = on'TNS NetApp Data ONTAP 7GNetApp

SYSTEM AND COMMUNICATIONS PROTECTION

5.5 NFS - 'nfs.kerberos.realm has been configured'TNS NetApp Data ONTAP 7GNetApp

SYSTEM AND COMMUNICATIONS PROTECTION

5.5 NFS - 'nfs.v3.enable = off'TNS NetApp Data ONTAP 7GNetApp

CONFIGURATION MANAGEMENT

5.5 NFS - 'nfs.v4.acl.enable = on'TNS NetApp Data ONTAP 7GNetApp

ACCESS CONTROL

5.5 NFS - 'nfs.v4.enable = off'TNS NetApp Data ONTAP 7GNetApp

CONFIGURATION MANAGEMENT

5.5 NFS - 'wafl.default_nt_user has been configured'TNS NetApp Data ONTAP 7GNetApp

ACCESS CONTROL

5.5 NFS - 'wafl.wcc_minutes_valid has been configured'TNS NetApp Data ONTAP 7GNetApp

IDENTIFICATION AND AUTHENTICATION

7.1.1.7 Ensure that virtual network flow logs are captured and sent to Log AnalyticsCIS Microsoft Azure Foundations v4.0.0 L2microsoft_azure

SYSTEM AND INFORMATION INTEGRITY

9.2.1 Ensure That Microsoft Defender for IoT Hub Is Set To 'On'CIS Microsoft Azure Foundations v4.0.0 L2microsoft_azure

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

ARST-L2-000020 - The Arista MLS layer 2 switch must uniquely identify all network-connected endpoint devices before establishing any connection.DISA STIG Arista MLS EOS 4.2x L2S v2r1Arista

IDENTIFICATION AND AUTHENTICATION

CASA-VN-000230 - The Cisco ASA must be configured to use FIPS-validated SHA-2 at 384 bits or higher for Internet Key Exchange (IKE) Phase 1 - IKE Phase 1.DISA STIG Cisco ASA VPN v2r2Cisco

IDENTIFICATION AND AUTHENTICATION

GEN006560 - The system vulnerability assessment, host-based intrusion detection, and file integrity tools must notify of a security breach.DISA STIG AIX 6.1 v1r14Unix

CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY

JUSX-IP-000005 - The Juniper Networks SRX Series Gateway IDPS must block outbound traffic containing known and unknown DoS attacks by ensuring that rules are applied to outbound communications traffic.DISA Juniper SRX Services Gateway IDPS v2r1Juniper

SYSTEM AND COMMUNICATIONS PROTECTION

List bonded NIC groupsTNS Citrix HypervisorUnix

CONFIGURATION MANAGEMENT

List networksTNS Citrix HypervisorUnix

CONFIGURATION MANAGEMENT

List patchesTNS Citrix HypervisorUnix

SYSTEM AND INFORMATION INTEGRITY

List physical storage locationsTNS Citrix HypervisorUnix

CONFIGURATION MANAGEMENT

List usersTNS Citrix HypervisorUnix

ACCESS CONTROL

OL07-00-010020 - The Oracle Linux operating system must be configured so that the cryptographic hash of system files and commands matches vendor values.DISA Oracle Linux 7 STIG v3r2Unix

CONFIGURATION MANAGEMENT

Only allow access to required network servicesTNS Citrix HypervisorUnix

SYSTEM AND COMMUNICATIONS PROTECTION

PANW-IP-000018 - The Palo Alto Networks security platform must have a denial-of-service (DoS) Protection Profile for outbound traffic applied to a policy for traffic originating from the internal zone going to the external zone.DISA STIG Palo Alto IDPS v3r1Palo_Alto

SYSTEM AND COMMUNICATIONS PROTECTION

PANW-IP-000053 - The Palo Alto Networks security platform must generate an alert to, at a minimum, the ISSO and ISSM when rootkits or other malicious software which allows unauthorized privileged or non-privileged access is detected.DISA STIG Palo Alto IDPS v3r1Palo_Alto

SYSTEM AND INFORMATION INTEGRITY

PANW-IP-000055 - The Palo Alto Networks security platform must send an alert to, at a minimum, the ISSO and ISSM when denial of service incidents are detected.DISA STIG Palo Alto IDPS v3r1Palo_Alto

SYSTEM AND INFORMATION INTEGRITY

RHEL-09-212040 - RHEL 9 must clear the page allocator to prevent use-after-free attacks.DISA Red Hat Enterprise Linux 9 STIG v2r4Unix

SYSTEM AND COMMUNICATIONS PROTECTION

SLES-12-010500 - Advanced Intrusion Detection Environment (AIDE) must verify the baseline SUSE operating system configuration at least weekly.DISA SLES 12 STIG v3r2Unix

CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY

SLES-12-030270 - The SUSE operating system SSH server must be configured to use only FIPS-validated key exchange algorithms.DISA SLES 12 STIG v3r2Unix

ACCESS CONTROL

SLES-15-040450 - The SUSE operating system SSH server must be configured to use only FIPS-validated key exchange algorithms.DISA SUSE Linux Enterprise Server 15 STIG v2r4Unix

ACCESS CONTROL

SYMP-AG-000230 - Symantec ProxySG must provide an alert to, at a minimum, the SCA and ISSO of all audit failure events where the detection and/or prevention function is unable to write events to either local storage or the centralized server - EnabledDISA Symantec ProxySG Benchmark ALG v1r3BlueCoat

AUDIT AND ACCOUNTABILITY

SYMP-AG-000260 - Symantec ProxySG providing intermediary services for HTTP must inspect inbound HTTP traffic for protocol compliance and protocol anomalies - ExplicitDISA Symantec ProxySG Benchmark ALG v1r3BlueCoat

CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

SYMP-AG-000260 - Symantec ProxySG providing intermediary services for HTTP must inspect inbound HTTP traffic for protocol compliance and protocol anomalies - ExternalDISA Symantec ProxySG Benchmark ALG v1r3BlueCoat

CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

SYMP-AG-000260 - Symantec ProxySG providing intermediary services for HTTP must inspect inbound HTTP traffic for protocol compliance and protocol anomalies - InternalDISA Symantec ProxySG Benchmark ALG v1r3BlueCoat

CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

The hosts.allow file limits access to the local networkTNS Citrix HypervisorUnix

SYSTEM AND COMMUNICATIONS PROTECTION

UBTU-18-010421 - The Ubuntu operating system SSH server must be configured to use only FIPS-validated key exchange algorithms.DISA STIG Ubuntu 18.04 LTS v2r15Unix

ACCESS CONTROL

UBTU-20-010045 - The Ubuntu operating system SSH server must be configured to use only FIPS-validated key exchange algorithms.DISA Canonical Ubuntu 20.04 LTS STIG v2r2Unix

ACCESS CONTROL

UBTU-22-255060 - Ubuntu 22.04 LTS SSH server must be configured to use only FIPS-validated key exchange algorithms.DISA Canonical Ubuntu 22.04 LTS STIG v2r4Unix

ACCESS CONTROL

XenServer - Host versionTNS Citrix XenServerUnix

CONFIGURATION MANAGEMENT

XenServer - List networksTNS Citrix XenServerUnix

CONFIGURATION MANAGEMENT

XenServer - List physical storage locationsTNS Citrix XenServerUnix

CONFIGURATION MANAGEMENT

XenServer - List running VMsTNS Citrix XenServerUnix

CONFIGURATION MANAGEMENT

XenServer - Only allow access to required network servicesTNS Citrix XenServerUnix

SYSTEM AND COMMUNICATIONS PROTECTION

XenServer - The hosts.deny file blocks access by defaultTNS Citrix XenServerUnix

SYSTEM AND COMMUNICATIONS PROTECTION

XenServer - XAPI SSL certificate is in default locationTNS Citrix XenServerUnix

CONFIGURATION MANAGEMENT