Item Search

NameAudit NamePluginCategory
3.10 (L1) Host must not suppress warnings that the shell is enabledCIS VMware ESXi 8.0 v1.2.0 L1VMware

SYSTEM AND INFORMATION INTEGRITY

4.2.2 Restrict Access to SYSCAT.AUDITUSECIS IBM DB2 11 v1.1.0 Database Level 1IBM_DB2DB

ACCESS CONTROL, MEDIA PROTECTION

4.9 (L1) Host must transmit audit records to a remote log collectorCIS VMware ESXi 8.0 v1.2.0 L1VMware

AUDIT AND ACCOUNTABILITY

7.1.1.10 Ensure that Intune logs are captured and sent to Log AnalyticsCIS Microsoft Azure Foundations v4.0.0 L2microsoft_azure

AUDIT AND ACCOUNTABILITY

9.2.1 Ensure That Microsoft Defender for IoT Hub Is Set To 'On'CIS Microsoft Azure Foundations v4.0.0 L2microsoft_azure

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

AIX7-00-002141 - The AIX /etc/hosts file must be group-owned by system.DISA STIG AIX 7.x v3r1Unix

CONFIGURATION MANAGEMENT

AIX7-00-002142 - The AIX /etc/hosts file must have a mode of 0640 or less permissive.DISA STIG AIX 7.x v3r1Unix

CONFIGURATION MANAGEMENT

ARST-L2-000020 - The Arista MLS layer 2 switch must uniquely identify all network-connected endpoint devices before establishing any connection.DISA STIG Arista MLS EOS 4.2x L2S v2r1Arista

IDENTIFICATION AND AUTHENTICATION

CASA-VN-000230 - The Cisco ASA must be configured to use FIPS-validated SHA-2 at 384 bits or higher for Internet Key Exchange (IKE) Phase 1 - IKE Phase 1.DISA STIG Cisco ASA VPN v2r2Cisco

IDENTIFICATION AND AUTHENTICATION

CISC-L2-000190 - The Cisco switch must enable Unidirectional Link Detection (UDLD) to protect against one-way connections.DISA STIG Cisco IOS Switch L2S v3r1Cisco

CONFIGURATION MANAGEMENT

F5BI-AS-000165 - To protect against data mining, The BIG-IP ASM module must be configured to detect SQL injection attacks launched against data storage objects, including, at a minimum, databases, database records, and database fields when providing content filtering to virtual servers.DISA F5 BIG-IP Application Security Manager STIG v2r2F5

ACCESS CONTROL

JUSX-IP-000005 - The Juniper Networks SRX Series Gateway IDPS must block outbound traffic containing known and unknown DoS attacks by ensuring that rules are applied to outbound communications traffic.DISA Juniper SRX Services Gateway IDPS v2r1Juniper

SYSTEM AND COMMUNICATIONS PROTECTION

List bonded NIC groupsTNS Citrix HypervisorUnix

CONFIGURATION MANAGEMENT

List networksTNS Citrix HypervisorUnix

CONFIGURATION MANAGEMENT

List patchesTNS Citrix HypervisorUnix

SYSTEM AND INFORMATION INTEGRITY

List physical storage locationsTNS Citrix HypervisorUnix

CONFIGURATION MANAGEMENT

List usersTNS Citrix HypervisorUnix

ACCESS CONTROL

List virtual disksTNS Citrix HypervisorUnix

CONFIGURATION MANAGEMENT

List VLANsTNS Citrix HypervisorUnix

CONFIGURATION MANAGEMENT

OL07-00-010020 - The Oracle Linux operating system must be configured so that the cryptographic hash of system files and commands matches vendor values.DISA Oracle Linux 7 STIG v3r2Unix

CONFIGURATION MANAGEMENT

OL07-00-040180 - The Oracle Linux operating system must implement cryptography to protect the integrity of Lightweight Directory Access Protocol (LDAP) authentication communications - LDAP authentication communications.DISA Oracle Linux 7 STIG v3r2Unix

ACCESS CONTROL

Only allow access to required network servicesTNS Citrix HypervisorUnix

SYSTEM AND COMMUNICATIONS PROTECTION

PANW-IP-000018 - The Palo Alto Networks security platform must have a denial-of-service (DoS) Protection Profile for outbound traffic applied to a policy for traffic originating from the internal zone going to the external zone.DISA STIG Palo Alto IDPS v3r2Palo_Alto

SYSTEM AND COMMUNICATIONS PROTECTION

PANW-IP-000041 - The Palo Alto Networks security platform must protect against or limit the effects of known and unknown types of denial-of-service (DoS) attacks by employing rate-based attack prevention behavior analysis (traffic thresholds) - traffic thresholdsDISA STIG Palo Alto IDPS v3r2Palo_Alto

SYSTEM AND COMMUNICATIONS PROTECTION

PANW-IP-000053 - The Palo Alto Networks security platform must generate an alert to, at a minimum, the ISSO and ISSM when rootkits or other malicious software which allows unauthorized privileged or non-privileged access is detected.DISA STIG Palo Alto IDPS v3r2Palo_Alto

SYSTEM AND INFORMATION INTEGRITY

PANW-IP-000055 - The Palo Alto Networks security platform must send an alert to, at a minimum, the ISSO and ISSM when denial of service incidents are detected.DISA STIG Palo Alto IDPS v3r2Palo_Alto

SYSTEM AND INFORMATION INTEGRITY

PANW-IP-000056 - The Palo Alto Networks security platform must generate an alert to, at a minimum, the ISSO and ISSM when new active propagation of malware infecting DoD systems or malicious code adversely affecting the operations and/or security of DoD systems is detected.DISA STIG Palo Alto IDPS v3r2Palo_Alto

SYSTEM AND INFORMATION INTEGRITY

RHEL-07-010020 - The Red Hat Enterprise Linux operating system must be configured so that the cryptographic hash of system files and commands matches vendor values.DISA Red Hat Enterprise Linux 7 STIG v3r15Unix

CONFIGURATION MANAGEMENT

RHEL-09-212040 - RHEL 9 must clear the page allocator to prevent use-after-free attacks.DISA Red Hat Enterprise Linux 9 STIG v2r4Unix

SYSTEM AND COMMUNICATIONS PROTECTION

SLES-12-010500 - Advanced Intrusion Detection Environment (AIDE) must verify the baseline SUSE operating system configuration at least weekly.DISA SLES 12 STIG v3r2Unix

CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY

SLES-12-030270 - The SUSE operating system SSH server must be configured to use only FIPS-validated key exchange algorithms.DISA SLES 12 STIG v3r2Unix

ACCESS CONTROL

SLES-15-040450 - The SUSE operating system SSH server must be configured to use only FIPS-validated key exchange algorithms.DISA SUSE Linux Enterprise Server 15 STIG v2r4Unix

ACCESS CONTROL

The hosts.allow file limits access to the local networkTNS Citrix HypervisorUnix

SYSTEM AND COMMUNICATIONS PROTECTION

TNS_BestPractice_Citrix_Hypervisor.auditTNS Citrix HypervisorUnix
UBTU-18-010421 - The Ubuntu operating system SSH server must be configured to use only FIPS-validated key exchange algorithms.DISA STIG Ubuntu 18.04 LTS v2r15Unix

ACCESS CONTROL

UBTU-20-010045 - The Ubuntu operating system SSH server must be configured to use only FIPS-validated key exchange algorithms.DISA Canonical Ubuntu 20.04 LTS STIG v2r2Unix

ACCESS CONTROL

XenServer - Host versionTNS Citrix XenServerUnix

CONFIGURATION MANAGEMENT

XenServer - List halted VMsTNS Citrix XenServerUnix

CONFIGURATION MANAGEMENT

XenServer - List networksTNS Citrix XenServerUnix

CONFIGURATION MANAGEMENT

XenServer - List patchesTNS Citrix XenServerUnix

SYSTEM AND INFORMATION INTEGRITY

XenServer - List physical storage locationsTNS Citrix XenServerUnix

CONFIGURATION MANAGEMENT

XenServer - List running VMsTNS Citrix XenServerUnix

CONFIGURATION MANAGEMENT

XenServer - List security rolesTNS Citrix XenServerUnix

ACCESS CONTROL

XenServer - List usersTNS Citrix XenServerUnix

ACCESS CONTROL

XenServer - List virtual disksTNS Citrix XenServerUnix

CONFIGURATION MANAGEMENT

XenServer - List VM CPU allocationsTNS Citrix XenServerUnix

CONFIGURATION MANAGEMENT

XenServer - Only allow access to required network servicesTNS Citrix XenServerUnix

SYSTEM AND COMMUNICATIONS PROTECTION

XenServer - Review accounts used to mount remote storageTNS Citrix XenServerUnix

CONFIGURATION MANAGEMENT

XenServer - The hosts.deny file blocks access by defaultTNS Citrix XenServerUnix

SYSTEM AND COMMUNICATIONS PROTECTION

XenServer - XAPI SSL certificate is in default locationTNS Citrix XenServerUnix

CONFIGURATION MANAGEMENT