Item Search

NameAudit NamePluginCategory
1 - Application specific logging - start.jar --module=loggingTNS Best Practice Jetty 9 LinuxUnix
1.1 Ensure the appropriate MongoDB software version/patches are installedCIS MongoDB 6 v1.2.0 L1 MongoDBUnix

CONFIGURATION MANAGEMENT

2 - Remove or Disable Example Content - enable-welcome-rootTNS Best Practice JBoss 7 LinuxUnix

CONFIGURATION MANAGEMENT

2 - Specify file handler in jetty-logging.properties files - org.eclipse.jetty.LEVEL=INFOTNS Best Practice Jetty 9 LinuxUnix

AUDIT AND ACCOUNTABILITY

2 - Specify file handler in jetty-logging.properties files - org.eclipse.jetty.util.log.class=org.eclipse.jetty.util.log.StrErrLogTNS Best Practice Jetty 9 LinuxUnix

AUDIT AND ACCOUNTABILITY

3 - Audit Logging - LoggerTNS Best Practice JBoss 7 LinuxUnix

AUDIT AND ACCOUNTABILITY

3 - Configure log file size limit - SettingsTNS Best Practice Jetty 9 LinuxUnix

AUDIT AND ACCOUNTABILITY

3.2 Ensure that MongoDB only listens for network connections on authorized interfacesCIS MongoDB 3.2 L1 Unix Audit v1.0.0Unix

CONFIGURATION MANAGEMENT

3.2 Ensure that MongoDB only listens for network connections on authorized interfacesCIS MongoDB 3.4 L1 Unix Audit v1.0.0Unix

CONFIGURATION MANAGEMENT

4.1 Ensure Encryption of Data in Transit TLS/SSL (Transport Encryption)CIS MongoDB 3.6 L1 Unix Audit v1.1.0Unix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

4.1 Ensure TLS or SSL protects all network communicationsCIS MongoDB L1 Unix Audit v1.0.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION

4.1 Ensure TLS or SSL protects all network communicationsCIS MongoDB 3.4 L1 Unix Audit v1.0.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION

5.2.2.3 (L1) Enable Conditional Access policies to block legacy authenticationCIS Microsoft 365 Foundations v5.0.0 L1 E3microsoft_azure

CONFIGURATION MANAGEMENT

5.10 (L1) Ensure 'LxssManager (LxssManager)' is set to 'Disabled' or 'Not Installed'CIS Microsoft Windows 11 Enterprise v4.0.0 L1Windows

CONFIGURATION MANAGEMENT

5.11 (L1) Ensure 'LxssManager (LxssManager)' is set to 'Disabled' or 'Not Installed'CIS Microsoft Windows 10 Stand-alone v4.0.0 L1 BL NGWindows

CONFIGURATION MANAGEMENT

6 - Run your Instance as non privileged userTNS Best Practice JBoss 7 LinuxUnix

ACCESS CONTROL

7 - SSL implementation - start.ini --module=httpTNS Best Practice Jetty 9 LinuxUnix

SYSTEM AND COMMUNICATIONS PROTECTION

7 - SSL implementation - start.ini --module=httpsTNS Best Practice Jetty 9 LinuxUnix

SYSTEM AND COMMUNICATIONS PROTECTION

7.2 Ensure Asymmetric Key Size is set to 'greater than or equal to 2048' in non-system databasesCIS SQL Server 2016 Database L1 DB v1.4.0MS_SQLDB

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

11 - JSP RegenerationTNS Best Practice JBoss 7 LinuxUnix

CONFIGURATION MANAGEMENT

12 - Restrict access to logs directory - modeTNS Best Practice Jetty 9 LinuxUnix

ACCESS CONTROL

12 - Restrict access to logs directory - ownerTNS Best Practice Jetty 9 LinuxUnix

ACCESS CONTROL

14 - Restrict access to binaries directory - ownerTNS Best Practice Jetty 9 LinuxUnix

ACCESS CONTROL

14 - SSL Encryption - Modify WSDL AddressTNS Best Practice JBoss 7 LinuxUnix

SYSTEM AND COMMUNICATIONS PROTECTION

15 - AuthenticationTNS Best Practice JBoss 7 LinuxUnix

IDENTIFICATION AND AUTHENTICATION

15 - Restrict access to web application directory - ownerTNS Best Practice Jetty 9 LinuxUnix

ACCESS CONTROL

16 - ORB Subsystem - Initializers OnTNS Best Practice JBoss 7 LinuxUnix

SYSTEM AND COMMUNICATIONS PROTECTION

16 - Restrict access to JETTY.policy - modeTNS Best Practice Jetty 9 LinuxUnix

ACCESS CONTROL

17 - Restrict access to JETTY.properties - modeTNS Best Practice Jetty 9 LinuxUnix

ACCESS CONTROL

19 - Restrict access to logging.properties - modeTNS Best Practice Jetty 9 LinuxUnix

ACCESS CONTROL

19 - Restrict access to logging.properties - ownerTNS Best Practice Jetty 9 LinuxUnix

ACCESS CONTROL

20 - Enable EncryptionTNS Best Practice JBoss 7 LinuxUnix

SYSTEM AND COMMUNICATIONS PROTECTION

20 - Restrict access to server.xml - modeTNS Best Practice Jetty 9 LinuxUnix

ACCESS CONTROL

20 - Restrict access to server.xml - ownerTNS Best Practice Jetty 9 LinuxUnix

ACCESS CONTROL

23 - Strong password policy must be establishedTNS Best Practice Jetty 9 LinuxUnix
24 - Remove extraneous files and directories - $JETTY_BASE/webapps/docTNS Best Practice Jetty 9 LinuxUnix

CONFIGURATION MANAGEMENT

24 - Remove extraneous files and directories - $JETTY_BASE/webapps/examplesTNS Best Practice Jetty 9 LinuxUnix

CONFIGURATION MANAGEMENT

24 - Remove extraneous files and directories - $JETTY_BASE/webapps/ROOT/adminTNS Best Practice Jetty 9 LinuxUnix

CONFIGURATION MANAGEMENT

24 - Remove extraneous files and directories - $JETTY_BASE/webapps/servlet-exampleTNS Best Practice Jetty 9 LinuxUnix

CONFIGURATION MANAGEMENT

25 - Disable Unused ConnectorsTNS Best Practice Jetty 9 LinuxUnix
27 - Ensure SSLEnabled is set to True for Sensitive Connectors - SSLEnabledTNS Best Practice Jetty 9 LinuxUnix

SYSTEM AND COMMUNICATIONS PROTECTION

27 - Ensure SSLEnabled is set to True for Sensitive Connectors - SSLEngineTNS Best Practice Jetty 9 LinuxUnix

SYSTEM AND COMMUNICATIONS PROTECTION

34 - Ensure Web content directory is on a separate partition from the system filesTNS Best Practice Jetty 9 LinuxUnix
35 - Do not allow custom header status messagesTNS Best Practice Jetty 9 LinuxUnix

SYSTEM AND INFORMATION INTEGRITY

36 - Configure connectionTimeoutTNS Best Practice Jetty 9 LinuxUnix

SYSTEM AND COMMUNICATIONS PROTECTION

38 - Force SSL for all applicationsTNS Best Practice Jetty 9 LinuxUnix

SYSTEM AND COMMUNICATIONS PROTECTION

39 - Increase the entropy in session identifiersTNS Best Practice Jetty 9 LinuxUnix

SYSTEM AND COMMUNICATIONS PROTECTION

MD7X-00-007300 MongoDB must provide a warning to appropriate support staff when allocated audit record storage volume reaches 75 percent of maximum audit record storage capacity.DISA MongoDB Enterprise Advanced 7.x STIG v1r1Unix

AUDIT AND ACCOUNTABILITY

OL07-00-030211 - The Oracle Linux operating system must label all off-loaded audit logs before sending them to the central log server.DISA Oracle Linux 7 STIG v3r3Unix

AUDIT AND ACCOUNTABILITY

RHEL-07-030211 - The Red Hat Enterprise Linux operating system must label all off-loaded audit logs before sending them to the central log server.DISA Red Hat Enterprise Linux 7 STIG v3r15Unix

AUDIT AND ACCOUNTABILITY