Item Search

NameAudit NamePluginCategory
1.1 Ensure the appropriate MongoDB software version/patches are installedCIS MongoDB 3.6 Database Audit L1 v1.1.0MongoDB

SYSTEM AND SERVICES ACQUISITION

1.1 Ensure the appropriate MongoDB software version/patches are installedCIS MongoDB 6 v1.2.0 L1 MongoDBUnix

CONFIGURATION MANAGEMENT

1.1 Ensure the appropriate MongoDB software version/patches are installedCIS MongoDB 6 v1.2.0 L1 MongoDBWindows

CONFIGURATION MANAGEMENT

1.1 Ensure the appropriate MongoDB software version/patches are installedCIS MongoDB 8 v1.0.0 L1 WindowsWindows

CONFIGURATION MANAGEMENT

2.2 Ensure that MongoDB does not bypass authentication via the localhost exceptionCIS MongoDB 3.6 L1 Unix Audit v1.1.0Unix

IDENTIFICATION AND AUTHENTICATION

2.2 Ensure that MongoDB does not bypass authentication via the localhost exceptionCIS MongoDB 4 L1 OS Linux v1.0.0Unix

IDENTIFICATION AND AUTHENTICATION

2.3 Ensure authentication is enabled in the sharded clusterCIS MongoDB 3.6 L2 Windows Audit v1.1.0Windows

CONFIGURATION MANAGEMENT

2.3 Ensure authentication is enabled in the sharded cluster - authenticationMechanismsCIS MongoDB 5 L2 OS Linux v1.2.0Unix

CONFIGURATION MANAGEMENT

2.3 Ensure authentication is enabled in the sharded cluster - clusterFileCIS MongoDB 5 L2 OS Linux v1.2.0Unix

CONFIGURATION MANAGEMENT

2.3 Ensure authentication is enabled in the sharded cluster - PEMKeyFileCIS MongoDB 5 L2 OS Linux v1.2.0Unix

CONFIGURATION MANAGEMENT

3.2 Configure Security Auditing Flags per local organizational requirements - 'audit successful/failed administrative events'CIS Apple macOS 10.13 L2 v1.1.0Unix

AUDIT AND ACCOUNTABILITY

3.2 Configure Security Auditing Flags per local organizational requirements - 'audit successful/failed file attribute modification events'CIS Apple macOS 10.13 L2 v1.1.0Unix

AUDIT AND ACCOUNTABILITY

3.2 Configure Security Auditing Flags per local organizational requirements - 'audit successful/failed login/logout events'CIS Apple macOS 10.13 L2 v1.1.0Unix

AUDIT AND ACCOUNTABILITY

3.2 Ensure that MongoDB only listens for network connections on authorized interfacesCIS MongoDB L1 Unix Audit v1.0.0Unix

CONFIGURATION MANAGEMENT

3.2 Ensure that MongoDB only listens for network connections on authorized interfacesCIS MongoDB 3.4 L1 Windows Audit v1.0.0Windows

CONFIGURATION MANAGEMENT

3.8 Ensure Windows BUILTIN groups are not SQL LoginsCIS SQL Server 2008 R2 DB Engine L1 v1.7.0MS_SQLDB

ACCESS CONTROL

3.9 Ensure Windows BUILTIN groups are not SQL LoginsCIS SQL Server 2012 Database L1 DB v1.6.0MS_SQLDB

ACCESS CONTROL

3.9 Ensure Windows BUILTIN groups are not SQL LoginsCIS SQL Server 2012 Database L1 AWS RDS v1.6.0MS_SQLDB

ACCESS CONTROL

4.1 Ensure Encryption of Data in Transit TLS/SSL (Transport Encryption)CIS MongoDB 3.6 L1 Windows Audit v1.1.0Windows

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

4.1 Ensure Encryption of Data in Transit TLS/SSL (Transport Encryption)CIS MongoDB 3.6 L1 Unix Audit v1.1.0Unix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

4.1 Ensure TLS or SSL protects all network communicationsCIS MongoDB 3.4 L1 Windows Audit v1.0.0Windows

SYSTEM AND COMMUNICATIONS PROTECTION

4.1 Ensure TLS or SSL protects all network communicationsCIS MongoDB L1 Unix Audit v1.0.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION

4.1 Ensure TLS or SSL protects all network communicationsCIS MongoDB 3.2 L1 Unix Audit v1.0.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION

4.1 Ensure TLS or SSL protects all network communicationsCIS MongoDB 3.2 L1 Windows Audit v1.0.0Windows

SYSTEM AND COMMUNICATIONS PROTECTION

4.1 Ensure TLS or SSL protects all network communicationsCIS MongoDB 3.4 L1 Unix Audit v1.0.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION

4.1 Ensure TLS or SSL protects all network communicationsCIS MongoDB L1 Windows Audit v1.0.0Windows

SYSTEM AND COMMUNICATIONS PROTECTION

4.3 Ensure Encryption of Data in Transit TLS or SSL (Transport Encryption)CIS MongoDB 8 v1.0.0 L1 UnixUnix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

4.3 Ensure Encryption of Data in Transit TLS or SSL (Transport Encryption)CIS MongoDB 5 L1 OS Linux v1.2.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION

4.6 (L1) Host must enable audit record loggingCIS VMware ESXi 8.0 v1.3.0 L1 VMwareVMware

AUDIT AND ACCOUNTABILITY

6.1 Perform regular security audits of your host system and containersCIS Docker 1.6 v1.0.0 L1 DockerUnix
6.1 Perform regular security audits of your host system and containersCIS Docker 1.11.0 v1.0.0 L1 DockerUnix
6.1 Perform regular security audits of your host system and containersCIS Docker 1.12.0 v1.0.0 L1 DockerUnix
7.2 Ensure Asymmetric Key Size is set to 'greater than or equal to 2048' in non-system databasesCIS SQL Server 2016 Database L1 DB v1.4.0MS_SQLDB

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

7.2 Ensure Asymmetric Key Size is set to 'greater than or equal to 2048' in non-system databasesCIS SQL Server 2016 Database L1 AWS RDS v1.4.0MS_SQLDB

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

7.2 Ensure Asymmetric Key Size is set to 'greater than or equal to 2048' in non-system databasesCIS SQL Server 2017 Database L1 DB v1.3.0MS_SQLDB

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

7.2 Ensure Asymmetric Key Size is set to 'greater than or equal to 2048' in non-system databasesCIS SQL Server 2017 Database L1 AWS RDS v1.3.0MS_SQLDB

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

12.20 Monitor for development on production databases - 'Prevent development on production databases'CIS v1.1.0 Oracle 11g OS L1Unix
12.20 Monitor for development on production databases - 'Prevent development on production databases'CIS v1.1.0 Oracle 11g OS Windows Level 1Windows
13 - Restrict access to temp directory - modeTNS Best Practice Jetty 9 LinuxUnix

ACCESS CONTROL

14 - SSL Encryption - WSDL Secure PortTNS Best Practice JBoss 7 LinuxUnix

SYSTEM AND COMMUNICATIONS PROTECTION

19 - Cluster AuthenticationTNS Best Practice JBoss 7 LinuxUnix

ACCESS CONTROL

AS24-U1-000020 - The Apache web server must perform server-side session managementDISA STIG Apache Server 2.4 Unix Server v3r2 MiddlewareUnix

ACCESS CONTROL

AS24-U1-000020 - The Apache web server must perform server-side session management.DISA STIG Apache Server 2.4 Unix Server v3r2Unix

ACCESS CONTROL

AS24-U2-000020 - The Apache web server must perform server-side session management.DISA STIG Apache Server 2.4 Unix Site v2r6Unix

ACCESS CONTROL

AS24-U2-000020 - The Apache web server must perform server-side session management.DISA STIG Apache Server 2.4 Unix Site v2r6 MiddlewareUnix

ACCESS CONTROL

DG0102-ORACLE11 - DBMS processes or services should run under custom, dedicated OS accounts - 'tns services are using correct service account'DISA STIG Oracle 11 Instance v9r1 OS UnixUnix

ACCESS CONTROL

DKER-EE-001830 - The userland proxy capability in the Docker Engine - Enterprise component of Docker Enterprise must be disabled.DISA STIG Docker Enterprise 2.x Linux/Unix v2r2Unix

CONFIGURATION MANAGEMENT

MD7X-00-007300 MongoDB must provide a warning to appropriate support staff when allocated audit record storage volume reaches 75 percent of maximum audit record storage capacity.DISA MongoDB Enterprise Advanced 7.x STIG v1r1Unix

AUDIT AND ACCOUNTABILITY

OL07-00-030211 - The Oracle Linux operating system must label all off-loaded audit logs before sending them to the central log server.DISA Oracle Linux 7 STIG v3r5Unix

AUDIT AND ACCOUNTABILITY

RHEL-07-030211 - The Red Hat Enterprise Linux operating system must label all off-loaded audit logs before sending them to the central log server.DISA Red Hat Enterprise Linux 7 STIG v3r15Unix

AUDIT AND ACCOUNTABILITY