Item Search

NameAudit NamePluginCategory
1 - Application specific logging - ${jetty.base}/start.ini --module=loggingTNS Best Practice Jetty 9 LinuxUnix
1 - Remove or Disable Example Content - ExampleDSTNS Best Practice JBoss 7 LinuxUnix

CONFIGURATION MANAGEMENT

2 - Specify file handler in jetty-logging.properties files - org.eclipse.jetty.websocket.LEVEL=DEBUGTNS Best Practice Jetty 9 LinuxUnix

AUDIT AND ACCOUNTABILITY

3 - Audit Logging - HandlerTNS Best Practice JBoss 7 LinuxUnix

AUDIT AND ACCOUNTABILITY

4.4 Ensure images are scanned and rebuilt to include security patchesCIS Docker Community Edition v1.1.0 L1 DockerUnix

CONFIGURATION MANAGEMENT

5 - Granular Log LevelsTNS Best Practice JBoss 7 LinuxUnix

AUDIT AND ACCOUNTABILITY

7 - File system permissions of log filesTNS Best Practice JBoss 7 LinuxUnix

CONFIGURATION MANAGEMENT

9 - Deployment ScannerTNS Best Practice JBoss 7 LinuxUnix

CONFIGURATION MANAGEMENT

9.1.4.1 Ensure That Microsoft Defender for Containers Is Set To 'On'CIS Microsoft Azure Foundations v4.0.0 L2microsoft_azure

RISK ASSESSMENT

9.6 Ensure root PATH Integrity - writeable dir in pathCIS Solaris 11.1 L1 v1.0.0Unix

ACCESS CONTROL

12 - Remove and mask informational headers - JSP ConfigurationTNS Best Practice JBoss 7 LinuxUnix

SYSTEM AND COMMUNICATIONS PROTECTION

13 - Restrict access to temp directory - modeTNS Best Practice Jetty 9 LinuxUnix

ACCESS CONTROL

14 - Restrict access to binaries directory - modeTNS Best Practice Jetty 9 LinuxUnix

ACCESS CONTROL

15 - Restrict access to web application directory - modeTNS Best Practice Jetty 9 LinuxUnix

ACCESS CONTROL

17 - Restrict access to JETTY.properties - ownerTNS Best Practice Jetty 9 LinuxUnix

ACCESS CONTROL

17 - Setup a security domainTNS Best Practice JBoss 7 LinuxUnix

CONFIGURATION MANAGEMENT

18 - Role Based Authentication per queueTNS Best Practice JBoss 7 LinuxUnix

ACCESS CONTROL

24 - Remove extraneous files and directories - $JETTY_BASE/webapps/balancerTNS Best Practice Jetty 9 LinuxUnix

CONFIGURATION MANAGEMENT

24 - Remove extraneous files and directories - $JETTY_BASE/webapps/webdavTNS Best Practice Jetty 9 LinuxUnix

CONFIGURATION MANAGEMENT

29 - Ensure secure is set to true only for SSL-enabled ConnectorsTNS Best Practice Jetty 9 LinuxUnix

SYSTEM AND COMMUNICATIONS PROTECTION

31 - Starting with Security ManagerTNS Best Practice Jetty 9 LinuxUnix

SYSTEM AND COMMUNICATIONS PROTECTION

32 - Disabling auto deployment of applicationsTNS Best Practice Jetty 9 LinuxUnix

CONFIGURATION MANAGEMENT

33 - Disable deploy on startup of applicationsTNS Best Practice Jetty 9 LinuxUnix

CONFIGURATION MANAGEMENT

40 - Do not allow symbolic linkingTNS Best Practice Jetty 9 LinuxUnix

ACCESS CONTROL

42 - Do not allow cross context requestsTNS Best Practice Jetty 9 LinuxUnix

ACCESS CONTROL

43 - Do not resolve hosts on logging valves - SERVER_XMLTNS Best Practice Jetty 9 LinuxUnix

CONFIGURATION MANAGEMENT

Adtran : Disable SSLv2TNS Adtran AOS Best Practice AuditAdtran

CONFIGURATION MANAGEMENT

Adtran : Enable NTPTNS Adtran AOS Best Practice AuditAdtran
Adtran : Enable service password-encryptionTNS Adtran AOS Best Practice AuditAdtran

IDENTIFICATION AND AUTHENTICATION

Adtran : Encrypt enable passwordTNS Adtran AOS Best Practice AuditAdtran

IDENTIFICATION AND AUTHENTICATION

Adtran : Ensure DHCP is Disabled unless neededTNS Adtran AOS Best Practice AuditAdtran

CONFIGURATION MANAGEMENT

Adtran : Ensure the log level is set at an appropriate settingTNS Adtran AOS Best Practice AuditAdtran

AUDIT AND ACCOUNTABILITY

Adtran : Set 'login' BannerTNS Adtran AOS Best Practice AuditAdtran

ACCESS CONTROL

Adtran : SNMP 'PUBLIC' community string not usedTNS Adtran AOS Best Practice AuditAdtran

IDENTIFICATION AND AUTHENTICATION

Adtran : Web Session Timeout <= 900 secsTNS Adtran AOS Best Practice AuditAdtran

ACCESS CONTROL

CD12-00-011800 - PostgreSQL must map the PKI-authenticated identity to an associated user account.DISA STIG Crunchy Data PostgreSQL OS v3r1Unix

IDENTIFICATION AND AUTHENTICATION

Ensure that the 'local-infile' database flag for a Cloud Databases Mysql instance is set to '0'Tenable Best Practices RackSpace v2.0.0Rackspace

SYSTEM AND COMMUNICATIONS PROTECTION

Ensure that the 'max_allowed_packet' database flag for a Cloud Databases Mysql instance is setTenable Best Practices RackSpace v2.0.0Rackspace

SYSTEM AND COMMUNICATIONS PROTECTION

Ensure that the 'max_connections' database flag for a Cloud Databases Mysql instance is setTenable Best Practices RackSpace v2.0.0Rackspace

SYSTEM AND COMMUNICATIONS PROTECTION

Ensure that the 'max_user_connections' database flag for a Cloud Databases Mysql instance is setTenable Best Practices RackSpace v2.0.0Rackspace

SYSTEM AND COMMUNICATIONS PROTECTION

Ensure that the 'sql_mode' database flag for a Cloud Databases Mysql instance is setTenable Best Practices RackSpace v2.0.0Rackspace

SYSTEM AND COMMUNICATIONS PROTECTION

Ensure that the 'wait_timeout' database flag for a Cloud Databases Mysql instance is setTenable Best Practices RackSpace v2.0.0Rackspace

SYSTEM AND COMMUNICATIONS PROTECTION

EPAS-00-001100 - The EDB Postgres Advanced Server must allow only the ISSM (or individuals or roles appointed by the ISSM) to select which auditable events are to be audited.EnterpriseDB PostgreSQL Advanced Server OS Linux v2r1Unix

AUDIT AND ACCOUNTABILITY

EPAS-00-004600 - The EDB Postgres Advanced Server must enforce authorized access to all PKI private keys stored/used by the EDB Postgres Advanced Server.EnterpriseDB PostgreSQL Advanced Server OS Linux v2r1Unix

IDENTIFICATION AND AUTHENTICATION

EPAS-00-006100 - Access to database files must be limited to relevant processes and to authorized, administrative users.EnterpriseDB PostgreSQL Advanced Server OS Linux v2r1Unix

SYSTEM AND COMMUNICATIONS PROTECTION

PPS9-00-002600 - The audit information produced by the EDB Postgres Advanced Server must be protected from unauthorized read access.EDB PostgreSQL Advanced Server OS Linux Audit v2r3Unix

AUDIT AND ACCOUNTABILITY

PPS9-00-009500 - The EDB Postgres Advanced Server must maintain the confidentiality and integrity of information during preparation for transmission.EDB PostgreSQL Advanced Server OS Linux Audit v2r3Unix

SYSTEM AND COMMUNICATIONS PROTECTION

Review the list of Database BackupsTenable Best Practices RackSpace v2.0.0Rackspace

CONTINGENCY PLANNING

WN16-DC-000290 - Domain Controller PKI certificates must be issued by the DoD PKI or an approved External Certificate Authority (ECA).DISA Microsoft Windows Server 2016 STIG v2r10Windows

IDENTIFICATION AND AUTHENTICATION

WN19-DC-000290 - Windows Server 2019 domain Controller PKI certificates must be issued by the DoD PKI or an approved External Certificate Authority (ECA).DISA Microsoft Windows Server 2019 STIG v3r4Windows

IDENTIFICATION AND AUTHENTICATION