Item Search

NameAudit NamePluginCategory
1.2 Ensure systemd Service Files Are EnabledCIS PostgreSQL 12 OS v1.1.0Unix

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

1.3 Ensure systemd Service Files Are EnabledCIS PostgreSQL 13 OS v1.2.0Unix

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

1.3 Ensure systemd Service Files Are EnabledCIS PostgreSQL 14 OS v 1.2.0Unix

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

1.4 Ensure systemd Service Files Are EnabledCIS PostgreSQL 10 OS v1.0.0Unix

SYSTEM AND SERVICES ACQUISITION

1.4 Ensure systemd Service Files Are EnabledCIS PostgreSQL 11 OS v1.0.0Unix

CONFIGURATION MANAGEMENT

1.10.11 Ensure 'logging trap severity ' is greater than or equal to '5'Tenable Cisco Firepower Best Practices AuditCisco

AUDIT AND ACCOUNTABILITY

2.02 Version/Patches - 'Ensure the latest version of Oracle software is being used, and the latest patches are from Metalink are applied'CIS v1.1.0 Oracle 11g OS L1Unix
3.1.12 Ensure syslog messages are not lost due to sizeCIS PostgreSQL 13 DB v1.2.0PostgreSQLDB

AUDIT AND ACCOUNTABILITY

3.1.12 Ensure syslog messages are not lost due to sizeCIS PostgreSQL 14 DB v 1.2.0PostgreSQLDB

AUDIT AND ACCOUNTABILITY

3.1.12 Ensure syslog messages are not lost due to sizeCIS PostgreSQL 12 DB v1.1.0PostgreSQLDB

AUDIT AND ACCOUNTABILITY

3.1.34 Ensure 'log_statement_stats' is disabledCIS PostgreSQL 9.5 DB v1.1.0PostgreSQLDB

AUDIT AND ACCOUNTABILITY

3.8 Ensure 'INACTIVE_ACCOUNT_TIME' Is Less than or Equal to '120'CIS Oracle Database 23ai v1.1.0 L1 RDBMSOracleDB

ACCESS CONTROL

3.9 Ensure Windows BUILTIN groups are not SQL LoginsCIS SQL Server 2016 Database L1 AWS RDS v1.4.0MS_SQLDB

ACCESS CONTROL, MEDIA PROTECTION

3.9 Ensure Windows BUILTIN groups are not SQL LoginsCIS SQL Server 2016 Database L1 DB v1.4.0MS_SQLDB

ACCESS CONTROL, MEDIA PROTECTION

3.9 Ensure Windows BUILTIN groups are not SQL LoginsCIS SQL Server 2017 Database L1 AWS RDS v1.3.0MS_SQLDB

ACCESS CONTROL, MEDIA PROTECTION

3.9 Ensure Windows BUILTIN groups are not SQL LoginsCIS SQL Server 2017 Database L1 DB v1.3.0MS_SQLDB

ACCESS CONTROL, MEDIA PROTECTION

3.10 Ensure the public role in the msdb database is not granted access to SQL Agent proxiesCIS SQL Server 2008 R2 DB Engine L1 v1.7.0MS_SQLDB

ACCESS CONTROL

3.11 Ensure the public role in the msdb database is not granted access to SQL Agent proxiesCIS SQL Server 2012 Database L1 DB v1.6.0MS_SQLDB

ACCESS CONTROL

4.1 Ensure Interactive Login is DisabledCIS PostgreSQL 13 OS v1.2.0Unix

ACCESS CONTROL

4.1 Ensure Interactive Login is DisabledCIS PostgreSQL 14 OS v 1.2.0Unix

ACCESS CONTROL

4.1 Ensure Interactive Login is DisabledCIS PostgreSQL 17 v1.0.0 L1 PostgreSQLUnix

ACCESS CONTROL

5.16 Ensure AWS Security Hub is enabledCIS Amazon Web Services Foundations v6.0.0 L2amazon_aws

RISK ASSESSMENT

9.1.11 Ensure that Microsoft Cloud Security Benchmark policies are not set to 'Disabled'CIS Microsoft Azure Foundations v4.0.0 L1microsoft_azure

ACCESS CONTROL, CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

9.6 Ensure Password Fields are Not EmptyCIS Oracle Solaris 11.4 L1 v1.1.0Unix

IDENTIFICATION AND AUTHENTICATION

9.24 Find Un-owned Files and DirectoriesCIS Solaris 11.1 L1 v1.0.0Unix

ACCESS CONTROL

12.19 Network location of production and development databases - 'Separate'CIS v1.1.0 Oracle 11g OS L1Unix
12.19 Network location of production and development databases - 'Separate'CIS v1.1.0 Oracle 11g OS Windows Level 1Windows
Ensure 'logging buffered severity ' is greater than or equal to '3'Tenable Cisco Firepower Best Practices AuditCisco

AUDIT AND ACCOUNTABILITY

Ensure 'logging to Serial console' is disabledTenable Cisco Firepower Best Practices AuditCisco

AUDIT AND ACCOUNTABILITY

Ensure 'logging with timestamps' is enabledTenable Cisco Firepower Best Practices AuditCisco

AUDIT AND ACCOUNTABILITY

Ensure 'RIP authentication' is enabledTenable Cisco Firepower Best Practices AuditCisco

CONFIGURATION MANAGEMENT

Ensure 'syslog hosts' is configured correctlyTenable Cisco Firepower Best Practices AuditCisco

AUDIT AND ACCOUNTABILITY

Ensure DHCP services are disabled for untrusted interfaces - dhcpdTenable Cisco Firepower Best Practices AuditCisco

CONFIGURATION MANAGEMENT

Ensure DNS services are configured correctly - name-serverTenable Cisco Firepower Best Practices AuditCisco

SYSTEM AND COMMUNICATIONS PROTECTION

Ensure ICMP is restricted for untrusted interfacesTenable Cisco Firepower Best Practices AuditCisco

CONFIGURATION MANAGEMENT

Ensure that logins for Cloud Databases Mysql instance are restricted from the internetTenable Best Practices RackSpace v2.0.0Rackspace

SYSTEM AND COMMUNICATIONS PROTECTION

OpenStack Server FlavorsTenable Best Practices OpenStack v2.0.0OpenStack

CONFIGURATION MANAGEMENT

OpenStack Subnet DetailsTenable Best Practices OpenStack v2.0.0OpenStack

CONFIGURATION MANAGEMENT

PPS9-00-001100 - The EDB Postgres Advanced Server must allow only the ISSM (or individuals or roles appointed by the ISSM) to select which auditable events are to be audited.EDB PostgreSQL Advanced Server OS Linux Audit v2r3Unix

AUDIT AND ACCOUNTABILITY

PPS9-00-004900 - The EDB Postgres Advanced Server must use NIST FIPS 140-2 or 140-3 validated cryptographic modules for cryptographic operations.EDB PostgreSQL Advanced Server OS Linux Audit v2r3Unix

IDENTIFICATION AND AUTHENTICATION

PPS9-00-009200 - The EDB Postgres Advanced Server must implement cryptographic mechanisms to prevent unauthorized modification of organization-defined information at rest (to include, at a minimum, PII and classified information) on organization-defined information system components.EDB PostgreSQL Advanced Server OS Linux Audit v2r3Unix

SYSTEM AND COMMUNICATIONS PROTECTION

PPS9-00-009300 - The EDB Postgres Advanced Server must implement cryptographic mechanisms preventing the unauthorized disclosure of organization-defined information at rest on organization-defined information system components.EDB PostgreSQL Advanced Server OS Linux Audit v2r3Unix

SYSTEM AND COMMUNICATIONS PROTECTION

Review the list of Ports and their detailsTenable Best Practices OpenStack v2.0.0OpenStack

CONFIGURATION MANAGEMENT

Review the List of Users with ROLE_NAMETenable Best Practices RackSpace v2.0.0Rackspace

ACCESS CONTROL

Tenable_Best_Practices_Cisco_Firepower_Management_Center_OS.auditTenable Cisco Firepower Management Center OS Best Practices AuditUnix
WBSP-AS-000920 - The WebSphere Application Server files must be owned by the non-root WebSphere user ID.DISA IBM WebSphere Traditional 9 Windows STIG v1r1Windows

CONFIGURATION MANAGEMENT

WBSP-AS-000920 - The WebSphere Application Server files must be owned by the non-root WebSphere user ID.DISA IBM WebSphere Traditional 9 STIG v1r1Unix

CONFIGURATION MANAGEMENT

WBSP-AS-000920 - The WebSphere Application Server files must be owned by the non-root WebSphere user ID.DISA IBM WebSphere Traditional 9 STIG v1r1 MiddlewareUnix

CONFIGURATION MANAGEMENT

WN16-DC-000300 - PKI certificates associated with user accounts must be issued by the DoD PKI or an approved External Certificate Authority (ECA).DISA Microsoft Windows Server 2016 STIG v2r10Windows

IDENTIFICATION AND AUTHENTICATION

WN19-DC-000300 - Windows Server 2019 PKI certificates associated with user accounts must be issued by a DoD PKI or an approved External Certificate Authority (ECA).DISA Microsoft Windows Server 2019 STIG v3r5Windows

IDENTIFICATION AND AUTHENTICATION