Item Search

NameAudit NamePluginCategory
1.2 Ensure Installation of Binary PackagesCIS PostgreSQL 11 OS v1.0.0Unix

CONFIGURATION MANAGEMENT

2.9 Ensure the default ulimit is configured appropriatelyCIS Docker v1.8.0 L1 OS LinuxUnix

CONFIGURATION MANAGEMENT

3.1.17 Reserve the desired port number or name for incoming connection requestsCIS IBM DB2 9 Benchmark v3.0.1 Level 2 OS WindowsWindows

CONFIGURATION MANAGEMENT

3.4.1.3 Ensure nftables either not installed or masked with firewalldCIS Fedora 28 Family Linux Server L1 v2.0.0Unix

SECURITY ASSESSMENT AND AUTHORIZATION, CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

6.1 Setup Client-cert AuthenticationCIS Apache Tomcat 10 L2 v1.1.0 MiddlewareUnix

IDENTIFICATION AND AUTHENTICATION

DKER-EE-001810 - On Linux, a non-AUFS storage driver in the Docker Engine - Enterprise component of Docker Enterprise must be used.DISA STIG Docker Enterprise 2.x Linux/Unix v2r2Unix

CONFIGURATION MANAGEMENT

DTAVSEL-016 - The McAfee VirusScan Enterprise for Linux 1.9.x/2.0.x On-Access scanner must be configured to Quarantine if first action fails when programs and jokes are found.McAfee Virus Scan Enterprise for Linux 1.9x/2.0x Local Client v1r6Unix

SYSTEM AND INFORMATION INTEGRITY

Enable IKE Version 1/2 - groupTenable Cisco Viptela SD-WAN - vEdgeCisco_Viptela

SYSTEM AND COMMUNICATIONS PROTECTION

Enable IKE Version 1/2 - rekeyTenable Cisco Viptela SD-WAN - vEdgeCisco_Viptela

ACCESS CONTROL

FFOX-00-000003 - Firefox must be configured to ask which certificate to present to a website when a certificate is required.DISA STIG Mozilla Firefox MacOS v6r6Unix

IDENTIFICATION AND AUTHENTICATION

GEN002730 - The audit system must alert the SA when the audit storage volume approaches its capacity - minfreeDISA STIG Solaris 10 X86 v2r4Unix

AUDIT AND ACCOUNTABILITY

OL09-00-002370 - OL 9 must disable the use of user namespaces.DISA Oracle Linux 9 STIG v1r2Unix

CONFIGURATION MANAGEMENT

RHEL-06-000004 - The system must use a separate file system for the system audit data path.DISA Red Hat Enterprise Linux 6 STIG v2r2Unix

CONFIGURATION MANAGEMENT

RHEL-06-000016 - A file integrity tool must be installed.DISA Red Hat Enterprise Linux 6 STIG v2r2Unix

CONFIGURATION MANAGEMENT

RHEL-06-000037 - The /etc/gshadow file must be group-owned by root.DISA Red Hat Enterprise Linux 6 STIG v2r2Unix

CONFIGURATION MANAGEMENT

RHEL-06-000043 - The /etc/group file must be group-owned by root.DISA Red Hat Enterprise Linux 6 STIG v2r2Unix

CONFIGURATION MANAGEMENT

RHEL-06-000045 - Library files must have mode 0755 or less permissive - '/lib64/*'.DISA Red Hat Enterprise Linux 6 STIG v2r2Unix

CONFIGURATION MANAGEMENT

RHEL-06-000046 - Library files must be owned by a system account - '/usr/lib/*'.DISA Red Hat Enterprise Linux 6 STIG v2r2Unix

CONFIGURATION MANAGEMENT

RHEL-06-000046 - Library files must be owned by a system account - '/usr/local/lib/*'.DISA Red Hat Enterprise Linux 6 STIG v2r2Unix

CONFIGURATION MANAGEMENT

RHEL-06-000047 - All system command files must have mode 755 or less permissive - '/usr/local/bin/*'DISA Red Hat Enterprise Linux 6 STIG v2r2Unix

CONFIGURATION MANAGEMENT

RHEL-06-000047 - All system command files must have mode 755 or less permissive - '/usr/sbin/*'DISA Red Hat Enterprise Linux 6 STIG v2r2Unix

CONFIGURATION MANAGEMENT

RHEL-06-000050 - The system must require passwords to contain a minimum of 15 characters.DISA Red Hat Enterprise Linux 6 STIG v2r2Unix

IDENTIFICATION AND AUTHENTICATION

RHEL-06-000051 - Users must not be able to change passwords more than once every 24 hours.DISA Red Hat Enterprise Linux 6 STIG v2r2Unix

IDENTIFICATION AND AUTHENTICATION

RHEL-06-000055 - System and Application account passwords must be changed at least annually.DISA Red Hat Enterprise Linux 6 STIG v2r2Unix

IDENTIFICATION AND AUTHENTICATION

RHEL-06-000057 - The system must require passwords to contain at least one uppercase alphabetic character - password-auth.DISA Red Hat Enterprise Linux 6 STIG v2r2Unix

IDENTIFICATION AND AUTHENTICATION

RHEL-06-000058 - The system must require passwords to contain at least one special character - password-auth.DISA Red Hat Enterprise Linux 6 STIG v2r2Unix

IDENTIFICATION AND AUTHENTICATION

RHEL-06-000059 - The system must require passwords to contain at least one lower-case alphabetic character - password-auth.DISA Red Hat Enterprise Linux 6 STIG v2r2Unix

IDENTIFICATION AND AUTHENTICATION

RHEL-06-000066 - The system boot loader configuration file(s) must be group-owned by root.DISA Red Hat Enterprise Linux 6 STIG v2r2Unix

CONFIGURATION MANAGEMENT

RHEL-06-000067 - The system boot loader configuration file(s) must have mode 0600 or less permissive.DISA Red Hat Enterprise Linux 6 STIG v2r2Unix

CONFIGURATION MANAGEMENT

RHEL-06-000068 - The system boot loader must require authentication - BIOSDISA Red Hat Enterprise Linux 6 STIG v2r2Unix

ACCESS CONTROL

RHEL-06-000068 - The system boot loader must require authentication - UEFIDISA Red Hat Enterprise Linux 6 STIG v2r2Unix

ACCESS CONTROL

RHEL-06-000080 - The system must not send ICMPv4 redirects by default - configDISA Red Hat Enterprise Linux 6 STIG v2r2Unix

CONFIGURATION MANAGEMENT

RHEL-06-000089 - The system must not accept IPv4 source-routed packets by default - syslogDISA Red Hat Enterprise Linux 6 STIG v2r2Unix

CONFIGURATION MANAGEMENT

RHEL-06-000099 - The system must ignore ICMPv6 redirects by default - configDISA Red Hat Enterprise Linux 6 STIG v2r2Unix

CONFIGURATION MANAGEMENT

RHEL-06-000117 - The operating system must prevent public IPv4 access into an organizations internal networks, except as appropriately mediated by managed interfaces employing boundary protection devices - CHKCONFIGDISA Red Hat Enterprise Linux 6 STIG v2r2Unix

CONFIGURATION MANAGEMENT

RHEL-06-000117 - The operating system must prevent public IPv4 access into an organizations internal networks, except as appropriately mediated by managed interfaces employing boundary protection devices - iptables runningDISA Red Hat Enterprise Linux 6 STIG v2r2Unix

CONFIGURATION MANAGEMENT

RHEL-06-000127 - The Transparent Inter-Process Communication (TIPC) protocol must be disabled unless required.DISA Red Hat Enterprise Linux 6 STIG v2r2Unix

CONFIGURATION MANAGEMENT

RHEL-06-000133 - All rsyslog-generated log files must be owned by root.DISA Red Hat Enterprise Linux 6 STIG v2r2Unix

SYSTEM AND INFORMATION INTEGRITY

RHEL-06-000137 - The operating system must support the requirement to centrally manage the content of audit records generated by organization defined information system components.DISA Red Hat Enterprise Linux 6 STIG v2r2Unix

AUDIT AND ACCOUNTABILITY

RHEL-06-000145 - The operating system must produce audit records containing sufficient information to establish the identity of any user/subject associated with the event - 'CHKCONFIG'.DISA Red Hat Enterprise Linux 6 STIG v2r2Unix

AUDIT AND ACCOUNTABILITY

RHEL-06-000166 - The audit system must be configured to audit all attempts to alter system time through adjtimex - 64 bitDISA Red Hat Enterprise Linux 6 STIG v2r2Unix

AUDIT AND ACCOUNTABILITY

RHEL-06-000177 - The operating system must automatically audit account termination - /etc/security/opasswd.DISA Red Hat Enterprise Linux 6 STIG v2r2Unix

ACCESS CONTROL

RHEL-06-000182 - The audit system must be configured to audit modifications to the systems network configuration - /etc/hostsDISA Red Hat Enterprise Linux 6 STIG v2r2Unix

CONFIGURATION MANAGEMENT

RHEL-06-000182 - The audit system must be configured to audit modifications to the systems network configuration - /etc/sysconfig/networkDISA Red Hat Enterprise Linux 6 STIG v2r2Unix

CONFIGURATION MANAGEMENT

RHEL-06-000183 - The audit system must be configured to audit modifications to the systems Mandatory Access Control (MAC) configuration (SELinux).DISA Red Hat Enterprise Linux 6 STIG v2r2Unix

CONFIGURATION MANAGEMENT

RHEL-06-000185 - The audit system must be configured to audit all discretionary access control permission modifications using chown - auid>=500 32 bitDISA Red Hat Enterprise Linux 6 STIG v2r2Unix

AUDIT AND ACCOUNTABILITY

RHEL-06-000187 - The audit system must be configured to audit all discretionary access control permission modifications using fchmodat - auid>=500 64 bitDISA Red Hat Enterprise Linux 6 STIG v2r2Unix

AUDIT AND ACCOUNTABILITY

RHEL-06-000188 - The audit system must be configured to audit all discretionary access control permission modifications using fchown - auid>=500 64 bitDISA Red Hat Enterprise Linux 6 STIG v2r2Unix

AUDIT AND ACCOUNTABILITY

RHEL-07-021350 - The Red Hat Enterprise Linux operating system must implement NIST FIPS-validated cryptography for the following: to provision digital signatures, to generate cryptographic hashes, and to protect data requiring data-at-rest protections in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, and standards.DISA Red Hat Enterprise Linux 7 STIG v3r15Unix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

XenServer - Enable QoS on all VM guestsTNS Citrix XenServerUnix