Item Search

NameAudit NamePluginCategory
1.2 Do Not Install a Multi-Use System - chkconfigCIS BIND DNS v3.0.1 Authoritative Name ServerUnix

CONFIGURATION MANAGEMENT

1.2 Do Not Install a Multi-Use System - systemctlCIS BIND DNS v3.0.1 Caching Only Name ServerUnix

CONFIGURATION MANAGEMENT

1.2.4 Disable the rhnsd DaemonCIS Red Hat Enterprise Linux 5 L2 v2.2.1Unix

SYSTEM AND INFORMATION INTEGRITY

1.5 Installing ISC BIND 9 - bind9 installationCIS BIND DNS v3.0.1 Caching Only Name ServerUnix
1.5 Installing ISC BIND 9 - bind9 installationCIS BIND DNS v3.0.1 Authoritative Name ServerUnix
1.5 Installing ISC BIND 9 - bind9 installationCIS BIND DNS v1.0.0 L1 Caching Only Name ServerUnix

CONFIGURATION MANAGEMENT

1.5 Installing ISC BIND 9 - named locationCIS BIND DNS v1.0.0 L1 Caching Only Name ServerUnix

CONFIGURATION MANAGEMENT

1.6.1 Ensure system wide crypto policy is not set to legacyCIS Rocky Linux 10 v1.0.0 L1 WorkstationUnix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

1.6.1 Ensure system wide crypto policy is not set to legacyCIS Oracle Linux 10 v1.0.0 L1 WorkstationUnix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

1.6.1 Ensure system wide crypto policy is not set to legacyCIS Red Hat Enterprise Linux 10 v1.0.1 L1 ServerUnix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

1.6.1 Ensure system wide crypto policy is not set to legacyCIS AlmaLinux OS 10 v1.0.0 L1 ServerUnix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

1.8.13 Ensure GNOME Idle activation is setCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIGUnix

ACCESS CONTROL

3.7 Remove LDAPCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

CONFIGURATION MANAGEMENT

4.3.1 Deactivate Wireless InterfacesCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

CONFIGURATION MANAGEMENT

5.2 Verify SELinux security options, if applicableCIS Docker 1.13.0 v1.0.0 L2 DockerUnix

ACCESS CONTROL

6.3.4 Upgrade Password Hashing Algorithm to SHA-512CIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

IDENTIFICATION AND AUTHENTICATION

7.1 Ensure mod_ssl and/or mod_nss Is InstalledCIS Apache HTTP Server 2.2 L2 v3.6.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION

7.1 Ensure mod_ssl and/or mod_nss Is Installed - 'mod_ssl is loaded'CIS Apache HTTP Server 2.2 L1 v3.6.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION

7.1 Ensure mod_ssl and/or mod_nss Is Installed - 'mod_ssl is loaded'CIS Apache HTTP Server 2.2 L1 v3.6.0 MiddlewareUnix

SYSTEM AND COMMUNICATIONS PROTECTION

AZLX-23-002610 - Amazon Linux 2023 must implement nonexecutable data to protect its memory from unauthorized code execution.DISA Amazon Linux 2023 STIG v1r2Unix

SYSTEM AND INFORMATION INTEGRITY

CIS_Red_Hat_EL5_v2.2.1_L1.audit from Red Hat Enterprise Linux 5 BenchmarkCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix
CIS_Red_Hat_EL5_v2.2.1_L2.audit from Red Hat Enterprise Linux 5 BenchmarkCIS Red Hat Enterprise Linux 5 L2 v2.2.1Unix
CIS_Red_Hat_Enterprise_Linux_8_v4.0.0_L1_Server.audit from CIS Red Hat Enterprise Linux 8 4.0.0CIS Red Hat Enterprise Linux 8 v4.0.0 L1 ServerUnix
CIS_Red_Hat_Enterprise_Linux_8_v4.0.0_L1_Workstation.audit from CIS Red Hat Enterprise Linux 8 4.0.0CIS Red Hat Enterprise Linux 8 v4.0.0 L1 WorkstationUnix
CIS_Red_Hat_Enterprise_Linux_8_v4.0.0_L2_Server.audit from CIS Red Hat Enterprise Linux 8 4.0.0CIS Red Hat Enterprise Linux 8 v4.0.0 L2 ServerUnix
CIS_Red_Hat_Enterprise_Linux_8_v4.0.0_L2_Workstation.audit from CIS Red Hat Enterprise Linux 8 4.0.0CIS Red Hat Enterprise Linux 8 v4.0.0 L2 WorkstationUnix
CIS_Red_Hat_Enterprise_Linux_9_v2.0.0_L1_Server.audit from CIS Red Hat Enterprise Linux 9 v2.0.0CIS Red Hat Enterprise Linux 9 v2.0.0 L1 ServerUnix
CIS_Red_Hat_Enterprise_Linux_9_v2.0.0_L1_Workstation.audit from CIS Red Hat Enterprise Linux 9 v2.0.0CIS Red Hat Enterprise Linux 9 v2.0.0 L1 WorkstationUnix
CIS_Red_Hat_Enterprise_Linux_9_v2.0.0_L2_Server.audit from CIS Red Hat Enterprise Linux 9 v2.0.0CIS Red Hat Enterprise Linux 9 v2.0.0 L2 ServerUnix
CIS_Red_Hat_Enterprise_Linux_9_v2.0.0_L2_Workstation.audit from CIS Red Hat Enterprise Linux 9 v2.0.0CIS Red Hat Enterprise Linux 9 v2.0.0 L2 WorkstationUnix
CIS_Red_Hat_Enterprise_Linux_10_v1.0.1_L1_Server.audit from CIS Red Hat Enterprise Linux 10 1.0.1CIS Red Hat Enterprise Linux 10 v1.0.1 L1 ServerUnix
CIS_Red_Hat_Enterprise_Linux_10_v1.0.1_L1_Workstation.audit from CIS Red Hat Enterprise Linux 10 1.0.1CIS Red Hat Enterprise Linux 10 v1.0.1 L1 WorkstationUnix
CIS_Red_Hat_Enterprise_Linux_10_v1.0.1_L2_Server.audit from CIS Red Hat Enterprise Linux 10 1.0.1CIS Red Hat Enterprise Linux 10 v1.0.1 L2 ServerUnix
CIS_Red_Hat_Enterprise_Linux_10_v1.0.1_L2_Workstation.audit from CIS Red Hat Enterprise Linux 10 1.0.1CIS Red Hat Enterprise Linux 10 v1.0.1 L2 WorkstationUnix
Ensure system accounts are non-loginTenable Cisco Firepower Management Center OS Best Practices AuditUnix

ACCESS CONTROL

JBOS-AS-000010 - HTTP management session traffic must be encrypted.DISA JBoss Enterprise Application Platform 6.3 STIG v2r6Unix

ACCESS CONTROL

JBOS-AS-000225 - Google Analytics must be disabled in EAP Console.DISA JBoss Enterprise Application Platform 6.3 STIG v2r6Unix

CONFIGURATION MANAGEMENT

JBOS-AS-000685 - The JRE installed on the JBoss server must be kept up to date.DISA JBoss Enterprise Application Platform 6.3 STIG v2r6Unix

SYSTEM AND INFORMATION INTEGRITY

RHEL-06-000504 - The operating system must conduct backups of user-level information contained in the operating system per organization defined frequency to conduct backups consistent with recovery time and recovery point objectives.DISA Red Hat Enterprise Linux 6 STIG v2r2Unix

CONFIGURATION MANAGEMENT

RHEL-06-000505 - The operating system must conduct backups of system-level information contained in the information system per organization defined frequency to conduct backups that are consistent with recovery time and recovery point objectives.DISA Red Hat Enterprise Linux 6 STIG v2r2Unix

CONFIGURATION MANAGEMENT

RHEL-07-020210 - The Red Hat Enterprise Linux operating system must enable SELinux.DISA Red Hat Enterprise Linux 7 STIG v3r15Unix

ACCESS CONTROL, SYSTEM AND INFORMATION INTEGRITY

RHEL-08-020090 - RHEL 8 must map the authenticated identity to the user or group account for PKI-based authentication.DISA Red Hat Enterprise Linux 8 STIG v2r7Unix

IDENTIFICATION AND AUTHENTICATION

RHEL-10-000500 - RHEL 10 must enable FIPS mode.DISA Red Hat Enterprise Linux 10 STIG v1r1Unix

ACCESS CONTROL, MAINTENANCE, SYSTEM AND COMMUNICATIONS PROTECTION

RHEL-10-700010 - RHEL 10 must display the Standard Mandatory DOD Notice and Consent Banner before granting local or remote access to the system via a Secure Shell (SSH) login.DISA Red Hat Enterprise Linux 10 STIG v1r1Unix

ACCESS CONTROL

RHEL-10-700510 - RHEL 10 must be configured so that the Secure Shell (SSH) daemon does not allow Generic Security Service Application Program Interface (GSSAPI) authentication.DISA Red Hat Enterprise Linux 10 STIG v1r1Unix

CONFIGURATION MANAGEMENT

RHEL-10-700520 - RHEL 10 must be configured so that the Secure Shell (SSH) daemon does not allow Kerberos authentication.DISA Red Hat Enterprise Linux 10 STIG v1r1Unix

CONFIGURATION MANAGEMENT

RHEL-10-700540 - RHEL 10 must be configured so that the Secure Shell (SSH) daemon does not allow known hosts authentication.DISA Red Hat Enterprise Linux 10 STIG v1r1Unix

SYSTEM AND INFORMATION INTEGRITY

RHEL-10-700590 - RHEL 10 must be configured so that Secure Shell (SSH) server configuration files' permissions are not modified.DISA Red Hat Enterprise Linux 10 STIG v1r1Unix

ACCESS CONTROL

RHEL-10-700610 - RHEL 10 must be configured so that SSHD does not allow blank passwords.DISA Red Hat Enterprise Linux 10 STIG v1r1Unix

IDENTIFICATION AND AUTHENTICATION

RHEL-10-700900 - RHEL 10 must implement nonexecutable data to protect its memory from unauthorized code execution.DISA Red Hat Enterprise Linux 10 STIG v1r1Unix

SYSTEM AND INFORMATION INTEGRITY