| 1.3.1 Ensure AIDE is installed | CIS Amazon Linux 2023 v1.0.0 L1 Server | Unix | ACCESS CONTROL, AUDIT AND ACCOUNTABILITY |
| 1.3.1 Ensure AIDE is installed | CIS Fedora 28 Family Linux Server L1 v2.0.0 | Unix | ACCESS CONTROL, AUDIT AND ACCOUNTABILITY |
| 2.6 Ensure monitoring and alerting exist for changes to network policies and associated objects | CIS Snowflake Foundations v1.0.0 L1 | Snowflake | AUDIT AND ACCOUNTABILITY |
| 2.38 (L2) Ensure 'Controls the mode of DNS-over-HTTPS' is set to 'Enabled: DNS-over-HTTPS without insecure fallback' | CIS Google Chrome Group Policy v1.0.0 L2 | Windows | ACCESS CONTROL, AWARENESS AND TRAINING, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION |
| 5.3.1 Ensure AIDE is installed | CIS Oracle Linux 7 v4.0.0 L1 Server | Unix | ACCESS CONTROL, AUDIT AND ACCOUNTABILITY |
| 5.3.1 Ensure AIDE is installed | CIS CentOS Linux 7 v4.0.0 L1 Server | Unix | ACCESS CONTROL, AUDIT AND ACCOUNTABILITY |
| 5.3.1 Ensure AIDE is installed | CIS Oracle Linux 7 v4.0.0 L1 Workstation | Unix | ACCESS CONTROL, AUDIT AND ACCOUNTABILITY |
| 5.3.1 Ensure AIDE is installed | CIS Red Hat Enterprise Linux 7 v4.0.0 L1 Workstation | Unix | ACCESS CONTROL, AUDIT AND ACCOUNTABILITY |
| 6.1.1 Ensure AIDE is installed | CIS Rocky Linux 10 v1.0.0 L1 Server | Unix | SYSTEM AND INFORMATION INTEGRITY |
| 6.1.1 Ensure AIDE is installed | CIS AlmaLinux OS 8 v4.0.0 L1 Server | Unix | SYSTEM AND INFORMATION INTEGRITY |
| 6.1.1 Ensure AIDE is installed | CIS AlmaLinux OS 9 v2.0.0 L1 Server | Unix | ACCESS CONTROL, AUDIT AND ACCOUNTABILITY |
| 6.1.1 Ensure AIDE is installed | CIS Rocky Linux 8 v3.0.0 L1 Workstation | Unix | SYSTEM AND INFORMATION INTEGRITY |
| 6.1.1 Ensure AIDE is installed | CIS Red Hat Enterprise Linux 8 v4.0.0 L1 Server | Unix | SYSTEM AND INFORMATION INTEGRITY |
| 6.1.1 Ensure AIDE is installed | CIS Rocky Linux 10 v1.0.0 L1 Workstation | Unix | SYSTEM AND INFORMATION INTEGRITY |
| 6.1.1 Ensure AIDE is installed | CIS Rocky Linux 8 v3.0.0 L1 Server | Unix | SYSTEM AND INFORMATION INTEGRITY |
| 6.1.1 Ensure AIDE is installed | CIS Oracle Linux 9 v2.0.0 L1 Workstation | Unix | ACCESS CONTROL, AUDIT AND ACCOUNTABILITY |
| 6.1.1 Ensure AIDE is installed | CIS Oracle Linux 9 v2.0.0 L1 Server | Unix | ACCESS CONTROL, AUDIT AND ACCOUNTABILITY |
| 6.1.1 Ensure AIDE is installed | CIS Red Hat Enterprise Linux 8 STIG v2.0.0 STIG | Unix | ACCESS CONTROL, AUDIT AND ACCOUNTABILITY, SYSTEM AND INFORMATION INTEGRITY |
| 6.1.1 Ensure AIDE is installed | CIS Rocky Linux 9 v2.0.0 L1 Server | Unix | ACCESS CONTROL, AUDIT AND ACCOUNTABILITY |
| 6.1.1 Ensure AIDE is installed | CIS SUSE Linux Enterprise 15 v2.0.1 L1 Server | Unix | ACCESS CONTROL, AUDIT AND ACCOUNTABILITY |
| 6.1.1 Ensure AIDE is installed | CIS Oracle Linux 10 v1.0.0 L1 Workstation | Unix | SYSTEM AND INFORMATION INTEGRITY |
| 6.1.1 Ensure AIDE is installed | CIS AlmaLinux OS 10 v1.0.0 L1 Workstation | Unix | SYSTEM AND INFORMATION INTEGRITY |
| 6.1.1 Ensure AIDE is installed | CIS AlmaLinux OS 9 v2.0.0 L1 Workstation | Unix | ACCESS CONTROL, AUDIT AND ACCOUNTABILITY |
| 6.1.1 Ensure AIDE is installed | CIS Red Hat Enterprise Linux 10 v1.0.1 L1 Server | Unix | SYSTEM AND INFORMATION INTEGRITY |
| 6.1.1 Ensure AIDE is installed | CIS AlmaLinux OS 10 v1.0.0 L1 Server | Unix | SYSTEM AND INFORMATION INTEGRITY |
| 6.1.1 Ensure AIDE is installed | CIS Red Hat Enterprise Linux 8 STIG v2.0.0 L1 Server | Unix | ACCESS CONTROL, AUDIT AND ACCOUNTABILITY, SYSTEM AND INFORMATION INTEGRITY |
| 6.1.1 Ensure AIDE is installed | CIS Red Hat Enterprise Linux 8 STIG v2.0.0 L1 Workstation | Unix | ACCESS CONTROL, AUDIT AND ACCOUNTABILITY, SYSTEM AND INFORMATION INTEGRITY |
| 6.3.1 Ensure AIDE is installed | CIS Amazon Linux 2 v4.0.0 L1 Server | Unix | SYSTEM AND INFORMATION INTEGRITY |
| 6.9 Ensure that PAN-DB URL Filtering is used | CIS Palo Alto Firewall 7 Benchmark L1 v1.0.0 | Palo_Alto | CONFIGURATION MANAGEMENT |
| 6.9 Ensure that PAN-DB URL Filtering is used | CIS Palo Alto Firewall 8 Benchmark L1 v1.0.0 | Palo_Alto | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
| 6.17 Ensure that a Zone Prot Profile with tuned Flood Protection settings enabled | CIS Palo Alto Firewall 8 Benchmark L2 v1.0.0 | Palo_Alto | SYSTEM AND COMMUNICATIONS PROTECTION |
| Big Sur - Disable Accounts after 35 Days of Inactivity | NIST macOS Big Sur v1.4.0 - 800-53r4 Low | Unix | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION |
| Big Sur - Disable Accounts after 35 Days of Inactivity | NIST macOS Big Sur v1.4.0 - 800-53r5 Moderate | Unix | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION |
| Big Sur - Disable Accounts after 35 Days of Inactivity | NIST macOS Big Sur v1.4.0 - All Profiles | Unix | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION |
| Big Sur - Disable Accounts after 35 Days of Inactivity | NIST macOS Big Sur v1.4.0 - 800-53r5 High | Unix | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION |
| Catalina - Disable Accounts after 35 Days of Inactivity | NIST macOS Catalina v1.5.0 - 800-53r4 Low | Unix | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION |
| Catalina - Disable Accounts after 35 Days of Inactivity | NIST macOS Catalina v1.5.0 - CNSSI 1253 | Unix | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION |
| EX19-ED-000122 - Active hyperlinks in messages from non .mil domains must be rendered unclickable. | DISA Microsoft Exchange 2019 Edge Server STIG v2r2 | Windows | SYSTEM AND INFORMATION INTEGRITY |
| EX19-ED-000238 - Exchange must render hyperlinks from email sources from non-.mil domains as unclickable. | DISA Microsoft Exchange 2019 Edge Server STIG v2r2 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
| JRE8-UX-000090 - Oracle JRE 8 must lock the dialog enabling users to grant permissions - deployment.security.askgrantdialog.show | DISA STIG Oracle JRE 8 Unix v1r3 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
| Monterey - Disable Accounts after 35 Days of Inactivity | NIST macOS Monterey v1.0.0 - 800-53r4 Low | Unix | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION |
| Monterey - Disable Accounts after 35 Days of Inactivity | NIST macOS Monterey v1.0.0 - 800-171 | Unix | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION |
| Monterey - Disable Accounts after 35 Days of Inactivity | NIST macOS Monterey v1.0.0 - 800-53r5 Moderate | Unix | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION |
| PANW-AG-000062 - The Palo Alto Networks security platform must drop malicious code upon detection. | DISA Palo Alto Networks ALG STIG v3r4 | Palo_Alto | SYSTEM AND INFORMATION INTEGRITY |
| RHEL-06-000285 - The system must have a host-based intrusion detection tool installed - MFEhiplsm | DISA Red Hat Enterprise Linux 6 STIG v2r2 | Unix | CONFIGURATION MANAGEMENT |
| SYMP-AG-000240 - The reverse proxy Symantec ProxySG providing intermediary services for FTP must inspect inbound FTP communications traffic for protocol compliance and protocol anomalies - Review Proxies | DISA Symantec ProxySG Benchmark ALG v1r3 | BlueCoat | CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION |
| SYMP-AG-000660 - Symantec ProxySG providing content filtering must send an alert to, at a minimum, the ISSO and ISSM when detection events occur. | DISA Symantec ProxySG Benchmark ALG v1r3 | BlueCoat | SYSTEM AND INFORMATION INTEGRITY |
| WG237 W22 - Remote authors or content providers must have all files scanned for malware before uploading files to the Document Root directory. | DISA STIG Apache Server 2.2 Windows v1r13 | Windows | SYSTEM AND INFORMATION INTEGRITY |
| WNDF-AV-000004 - Microsoft Defender AV must be configured to run and scan for malware and other potentially unwanted software. | DISA Microsoft Defender Antivirus STIG v2r8 | Windows | SYSTEM AND INFORMATION INTEGRITY |
| WNDF-AV-000068 - Microsoft Defender AV must enable network protection to be configured into block or audit mode on Windows Server. | DISA Microsoft Defender Antivirus STIG v2r8 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |