Item Search

NameAudit NamePluginCategory
1.65 WN19-AU-000090CIS Microsoft Windows Server 2019 STIG v4.0.0 MS CAT IIWindows

AUDIT AND ACCOUNTABILITY

1.74 WN19-AU-000190CIS Microsoft Windows Server 2019 STIG v4.0.0 MS CAT IIWindows

AUDIT AND ACCOUNTABILITY

1.74 WN19-AU-000190CIS Microsoft Windows Server 2019 STIG v4.0.0 DC CAT IIWindows

AUDIT AND ACCOUNTABILITY

1.75 WN19-AU-000200CIS Microsoft Windows Server 2019 STIG v4.0.0 DC CAT IIWindows

AUDIT AND ACCOUNTABILITY

1.75 WN19-AU-000200CIS Microsoft Windows Server 2019 STIG v4.0.0 MS CAT IIWindows

AUDIT AND ACCOUNTABILITY

1.85 WN19-AU-000300CIS Microsoft Windows Server 2019 STIG v4.0.0 MS CAT IIWindows

AUDIT AND ACCOUNTABILITY

1.101 WN19-CC-000070CIS Microsoft Windows Server 2019 STIG v4.0.0 MS CAT IIWindows

IDENTIFICATION AND AUTHENTICATION

1.134 WN19-CC-000410CIS Microsoft Windows Server 2019 STIG v4.0.0 DC CAT IIWindows

CONFIGURATION MANAGEMENT

1.155 WN19-DC-000090CIS Microsoft Windows Server 2019 STIG v4.0.0 DC CAT IWindows

ACCESS CONTROL

2.8 Ensure 'Scan For Startup Procs' Server Configuration Option is set to '0'CIS SQL Server 2012 Database L1 AWS RDS v1.6.0MS_SQLDB

CONFIGURATION MANAGEMENT

2.8 Ensure 'Scan for Startup Procs' Server Configuration Option is set to '0'CIS SQL Server 2008 R2 DB Engine L1 v1.7.0MS_SQLDB

CONFIGURATION MANAGEMENT

2.8 Ensure 'Scan for Startup Procs' Server Configuration Option is set to '0'CIS SQL Server 2012 Database L1 DB v1.6.0MS_SQLDB

CONFIGURATION MANAGEMENT

2.16 Ensure 'AUTO_CLOSE' is set to 'OFF' on contained databasesCIS SQL Server 2016 Database L1 AWS RDS v1.4.0MS_SQLDB

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

3.13 Ensure no admin role membership in MSDB databaseCIS Microsoft SQL Server 2022 v1.2.1 L1 Database EngineMS_SQLDB

ACCESS CONTROL

5.3.1 Ensure 'DELETE_CATALOG_ROLE' Is Revoked from Unauthorized 'GRANTEE'CIS Oracle Server 12c DB Unified Auditing v3.0.0OracleDB

ACCESS CONTROL

6.1.6 Ensure the 'PUBLIC DATABASE LINK' Audit Option Is EnabledCIS Oracle Server 18c DB Traditional Auditing v1.1.0OracleDB

AUDIT AND ACCOUNTABILITY

6.2.13 Ensure 'SQL_FIREWALL_ADMIN' Is Revoked From Unauthorized 'GRANTEE'CIS Oracle Database 23ai v1.1.0 L1 RDBMSOracleDB

ACCESS CONTROL, MEDIA PROTECTION

6.30 Ensure RDS Database is not publically accessibleCIS Amazon Web Services Three-tier Web Architecture L2 1.0.0amazon_aws

SYSTEM AND COMMUNICATIONS PROTECTION

6.34 Ensure RDS Database is configured to use the Data Tier Security GroupCIS Amazon Web Services Three-tier Web Architecture L1 1.0.0amazon_aws

ACCESS CONTROL

18.9.31.1 (L1) Ensure 'Allow Clipboard synchronization across devices' is set to 'Disabled'CIS Microsoft Windows 10 EMS Gateway v3.0.0 L1Windows

CONFIGURATION MANAGEMENT

CIS_Azure_Compute_Microsoft_Windows_Server_2019_v1.0.0_L1_DC.audit from CIS Azure Compute Microsoft Windows Server 2019 Benchmark v1.0.0CIS Azure Compute Microsoft Windows Server 2019 v1.0.0 L1 DCWindows
CIS_Azure_Compute_Microsoft_Windows_Server_2019_v1.0.0_L1_MS.audit from CIS Azure Compute Microsoft Windows Server 2019 Benchmark v1.0.0CIS Azure Compute Microsoft Windows Server 2019 v1.0.0 L1 MSWindows
CIS_Microsoft_Windows_Server_2019_Stand-alone_v3.0.0_L2_MS.audit from CIS Microsoft Windows Server 2019 Stand-alone v3.0.0CIS Microsoft Windows Server 2019 Stand-alone v3.0.0 L2 MSWindows
CIS_Microsoft_Windows_Server_2019_Stand-alone_v3.0.0_NG_MS.audit from CIS Microsoft Windows Server 2019 Stand-alone v3.0.0CIS Microsoft Windows Server 2019 Stand-alone v3.0.0 NG MSWindows
DG0085-ORACLE11 - The DBA role should not be assigned excessive or unauthorized privileges.DISA STIG Oracle 11 Instance v9r1 DatabaseOracleDB

ACCESS CONTROL

DO0250-ORACLE11 - Fixed user and public database links should be authorized for use - 'Database links are documented'DISA STIG Oracle 11 Instance v9r1 DatabaseOracleDB
JUSX-IP-000016 - To protect against unauthorized data mining, the Juniper Networks SRX Series Gateway IDPS must detect SQL injection attacks launched against data storage objects, including, at a minimum, databases, database records, and database fields.DISA Juniper SRX Services Gateway IDPS v2r1Juniper

ACCESS CONTROL

O112-C2-006800 - The DBMS must provide audit record generation capability for organization-defined auditable events within the database.DISA STIG Oracle 11.2g v2r5 DatabaseOracleDB

AUDIT AND ACCOUNTABILITY

O121-BP-021400 - Fixed user and public database links must be authorized for use.DISA Oracle Database 12c STIG v3r5 OracleDBOracleDB

CONFIGURATION MANAGEMENT

O121-BP-025800 - Changes to configuration options must be audited.DISA Oracle Database 12c STIG v3r5 OracleDBOracleDB

CONFIGURATION MANAGEMENT

O121-C2-007600 - The DBMS must produce audit records containing sufficient information to establish where the events occurred.DISA Oracle Database 12c STIG v3r5 OracleDBOracleDB

AUDIT AND ACCOUNTABILITY

O121-C2-007700 - The DBMS must produce audit records containing sufficient information to establish the sources (origins) of the events.DISA Oracle Database 12c STIG v3r5 OracleDBOracleDB

AUDIT AND ACCOUNTABILITY

O121-C2-007800 - The DBMS must produce audit records containing sufficient information to establish the outcome (success or failure) of the events.DISA Oracle Database 12c STIG v3r5 OracleDBOracleDB

AUDIT AND ACCOUNTABILITY

PGS9-00-009100 - Access to external executables must be disabled or restricted - duDISA STIG PostgreSQL 9.x on RHEL OS v2r5Unix

CONFIGURATION MANAGEMENT

SHPT-00-000640 - Applications must support organizational requirements to employ cryptographic mechanisms to protect information in storage.DISA STIG SharePoint 2010 v1r9Windows

SYSTEM AND COMMUNICATIONS PROTECTION

SQL2-00-012000 - SQL Server must produce audit records containing sufficient information to establish where the events occurred - 'Event ID 153'DISA STIG SQL Server 2012 DB Instance Security v1r20MS_SQLDB

AUDIT AND ACCOUNTABILITY

SQL2-00-012000 - SQL Server must produce audit records containing sufficient information to establish where the events occurred - 'Event ID 170'DISA STIG SQL Server 2012 DB Instance Security v1r20MS_SQLDB

AUDIT AND ACCOUNTABILITY

SQL2-00-012000 - SQL Server must produce audit records containing sufficient information to establish where the events occurred - 'Event ID 171'DISA STIG SQL Server 2012 DB Instance Security v1r20MS_SQLDB

AUDIT AND ACCOUNTABILITY

SQL2-00-020300 - SQL Server must protect the integrity of publicly available information and SQL Servers configuration from unauthorized Server Roles access.DISA STIG SQL Server 2012 DB Instance Security v1r20MS_SQLDB

CONFIGURATION MANAGEMENT

SQL2-00-022400 - SQL Server must ensure, if Database Availability Groups are being used and there is a server failure, that none of the potential failover servers would suffer from resource exhaustion.DISA STIG SQL Server 2012 DB Instance Security v1r20MS_SQLDB

SYSTEM AND COMMUNICATIONS PROTECTION

SQL2-00-023500 - SQL Server job/batch queues must be reviewed regularly to detect unauthorized SQL Server job submissions.DISA STIG SQL Server 2012 Database Audit v1r20MS_SQLDB

CONFIGURATION MANAGEMENT

SQL4-00-017200 - Access to xp_cmdshell must be disabled, unless specifically required and approved.DISA STIG SQL Server 2014 Instance DB Audit v2r4MS_SQLDB

CONFIGURATION MANAGEMENT

SQL4-00-036800 - Trace or Audit records must be generated when unsuccessful attempts to create categorized information (e.g., classification levels/security levels) occur - Event ID 83DISA STIG SQL Server 2014 Database Audit v1r7MS_SQLDB

AUDIT AND ACCOUNTABILITY

SQL4-00-036800 - Trace or Audit records must be generated when unsuccessful attempts to create categorized information (e.g., classification levels/security levels) occur - Event ID 86DISA STIG SQL Server 2014 Database Audit v1r7MS_SQLDB

AUDIT AND ACCOUNTABILITY

SQL4-00-036850 - Trace or Audit records must be generated when unsuccessful attempts to modify categorized information (e.g., classification levels/security levels) occur - Event ID 82DISA STIG SQL Server 2014 Database Audit v1r7MS_SQLDB

AUDIT AND ACCOUNTABILITY

SQL4-00-036850 - Trace or Audit records must be generated when unsuccessful attempts to modify categorized information (e.g., classification levels/security levels) occur - Event ID 162DISA STIG SQL Server 2014 Database Audit v1r7MS_SQLDB

AUDIT AND ACCOUNTABILITY

SQL6-D0-003800 - SQL Server must be configured to utilize the most-secure authentication method available.DISA MS SQL Server 2016 Instance STIG v3r6 WindowsWindows

ACCESS CONTROL

SQLD-22-000100 - SQL Server must integrate with an organization-level authentication/access mechanism providing account management and automation for all users, groups, roles, and any other principals.DISA Microsoft SQL Server 2022 Database STIG v1r2MS_SQLDB

ACCESS CONTROL

SQLI-22-004100 - SQL Server must protect against a user falsely repudiating by ensuring the NT AUTHORITY SYSTEM account is not used for administration.DISA Microsoft SQL Server 2022 Instance STIG v1r3 MS_SQLDBMS_SQLDB

AUDIT AND ACCOUNTABILITY

VCWN-65-000033 - The vCenter Server for Windows must use a least-privileges assignment for the vCenter Server database user.DISA VMware vSphere 6.5 vCenter Server for Windows STIG v2r3VMware

CONFIGURATION MANAGEMENT