Item Search

NameAudit NamePluginCategory
1.6.1 Ensure 'SSH source restriction' is set to an authorized IP addressCIS Cisco ASA 9.x Firewall L1 v1.1.0Cisco

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY

3.2.1.30 Ensure 'Allow password sharing (supervised only)' is set to 'Disabled'MobileIron - CIS Apple iOS 17 Institution Owned L1MDM

ACCESS CONTROL, AWARENESS AND TRAINING, SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY

3.2.1.30 Ensure 'Allow password sharing (supervised only)' is set to 'Disabled'MobileIron - CIS Apple iPadOS 18 v1.0.0 L1 Institutionally OwnedMDM

ACCESS CONTROL, AWARENESS AND TRAINING, SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY

3.2.1.30 Ensure 'Allow password sharing (supervised only)' is set to 'Disabled'AirWatch - CIS Apple iOS 18 v1.0.0 L1 Institution OwnedMDM

ACCESS CONTROL, AWARENESS AND TRAINING, SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY

3.2.1.30 Ensure 'Allow password sharing (supervised only)' is set to 'Disabled'AirWatch - CIS Apple iPadOS 17 Institutionally Owned L1MDM

ACCESS CONTROL, AWARENESS AND TRAINING, SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY

3.2.1.30 Ensure 'Allow password sharing (supervised only)' is set to 'Disabled'AirWatch - CIS Apple iPadOS 18 v1.0.0 L1 Institutionally OwnedMDM

ACCESS CONTROL, AWARENESS AND TRAINING, SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY

3.2.1.30 Ensure 'Allow password sharing (supervised only)' is set to 'Disabled'MobileIron - CIS Apple iOS 18 v1.0.0 L1 Institution OwnedMDM

ACCESS CONTROL, AWARENESS AND TRAINING, SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY

3.5.3.2.3 Ensure iptables rules exist for all open ports - PPSM CLSA and vulnerability assessments.CIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIGUnix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

5.1.1 Enable Compromised Host QuarantineCIS Fortigate 7.0.x v1.3.0 L1FortiGate

ACCESS CONTROL, CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY

AIOS-17-011000 - Apple iOS/iPadOS 17 must implement the management setting: Disable Allow MailDrop.MobileIron - DISA Apple iOS/iPadOS 17 v2r1MDM

ACCESS CONTROL, CONFIGURATION MANAGEMENT

AIOS-17-011000 - Apple iOS/iPadOS 17 must implement the management setting: Disable Allow MailDrop.AirWatch - DISA Apple iOS/iPadOS 17 v2r1MDM

ACCESS CONTROL, CONFIGURATION MANAGEMENT

AIOS-18-011000 - Apple iOS/iPadOS 18 must implement the management setting: disable Allow MailDrop.AirWatch - DISA Apple iOS/iPadOS 18 v1r1MDM

ACCESS CONTROL, CONFIGURATION MANAGEMENT

AIOS-18-011000 - Apple iOS/iPadOS 18 must implement the management setting: disable Allow MailDrop.MobileIron - DISA Apple iOS/iPadOS 18 v1r1MDM

ACCESS CONTROL, CONFIGURATION MANAGEMENT

AIX7-00-001137 - AIX must be able to control the ability of remote login for users.DISA STIG AIX 7.x v3r1Unix

ACCESS CONTROL

APPL-11-001002 - The macOS system must monitor remote access methods and generate audit records when successful/unsuccessful attempts to access/modify privileges occur.DISA STIG Apple macOS 11 v1r5Unix

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

APPL-11-001002 - The macOS system must monitor remote access methods and generate audit records when successful/unsuccessful attempts to access/modify privileges occur.DISA STIG Apple macOS 11 v1r8Unix

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

APPL-12-001002 - The macOS system must monitor remote access methods and generate audit records when successful/unsuccessful attempts to access/modify privileges occur.DISA STIG Apple macOS 12 v1r9Unix

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

APPL-13-001002 - The macOS system must monitor remote access methods and generate audit records when successful/unsuccessful attempts to access/modify privileges occur.DISA STIG Apple macOS 13 v1r5Unix

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

AS24-U1-000670 - The Apache web server must restrict inbound connections from nonsecure zones.DISA STIG Apache Server 2.4 Unix Server v3r1Unix

ACCESS CONTROL

ESXI-06-000004 - Remote logging for ESXi hosts must be configured.DISA STIG VMware vSphere 6.x ESXi v1r5VMware

ACCESS CONTROL

ESXI-67-000004 - Remote logging for ESXi hosts must be configured.DISA STIG VMware vSphere 6.7 ESXi v1r3VMware

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

GEN001000 - Remote consoles must be disabled or protected from unauthorized access.DISA STIG Solaris 10 SPARC v2r4Unix

ACCESS CONTROL

GEN001000 - Remote consoles must be disabled or protected from unauthorized access.DISA STIG Solaris 10 X86 v2r4Unix

ACCESS CONTROL

GEN008540 - The system's local firewall must implement a deny-all, allow-by-exception policy.DISA STIG Solaris 10 X86 v2r4Unix

ACCESS CONTROL

GEN008540 - The system's local firewall must implement a deny-all, allow-by-exception policy.DISA STIG Solaris 10 SPARC v2r4Unix

ACCESS CONTROL

OH12-1X-000020 - OHS must have the OraLogMode set to Oracle Diagnostic Logging text mode to generate information to be used by external applications or entities to monitor and control remote access.DISA STIG Oracle HTTP Server 12.1.3 v2r3Unix

ACCESS CONTROL

OH12-1X-000023 - OHS must have the log rotation parameter set to allow generated information to be used by external applications or entities to monitor and control remote access.DISA STIG Oracle HTTP Server 12.1.3 v2r3Unix

ACCESS CONTROL

OH12-1X-000026 - OHS must have a log file defined for each site/virtual host to capture information to be used by external applications or entities to monitor and control remote access.DISA STIG Oracle HTTP Server 12.1.3 v2r3Unix

ACCESS CONTROL

OH12-1X-000031 - OHS must have the Order, Allow, and Deny directives set within the Directory directives set to restrict inbound connections from nonsecure zones.DISA STIG Oracle HTTP Server 12.1.3 v2r3Unix

ACCESS CONTROL

RHEL-09-251015 - The firewalld service on RHEL 9 must be active.DISA Red Hat Enterprise Linux 9 STIG v2r4Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

SLES-15-010220 - The SUSE operating system must be configured to prohibit or restrict the use of functions, ports, protocols, and/or services as defined in the Ports, Protocols, and Services Management (PPSM) Category Assignments List (CAL) and vulnerability assessments.DISA SLES 15 STIG v2r2Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

SOL-11.1-010310 - The audit system must be configured to audit login, logout, and session initiation.DISA STIG Solaris 11 SPARC v3r1Unix

ACCESS CONTROL

SOL-11.1-010310 - The audit system must be configured to audit login, logout, and session initiation.DISA STIG Solaris 11 X86 v3r1Unix

ACCESS CONTROL

SP13-00-000025 - SharePoint must ensure remote sessions for accessing security functions and security-relevant information are audited.DISA STIG SharePoint 2013 v2r3Windows

ACCESS CONTROL

TCAT-AS-001020 - LockOutRealms must be used for management of Tomcat.DISA STIG Apache Tomcat Application Server 9 v3r1 MiddlewareUnix

ACCESS CONTROL

UBTU-16-030030 - An application firewall must be installed.DISA STIG Ubuntu 16.04 LTS v2r3Unix

ACCESS CONTROL

UBTU-16-030450 - All remote access methods must be monitored - authprivDISA STIG Ubuntu 16.04 LTS v2r3Unix

ACCESS CONTROL

VCLD-67-000004 - VAMI must be configured to monitor remote access.DISA STIG VMware vSphere 6.7 VAMI-lighttpd v1r3Unix

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

VCLD-70-000004 - VAMI must be configured to monitor remote access.DISA STIG VMware vSphere 7.0 VAMI v1r2Unix

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

WBLC-01-000011 - Oracle WebLogic must employ automated mechanisms to facilitate the monitoring and control of remote access methods.Oracle WebLogic Server 12c Linux v2r2 MiddlewareUnix

ACCESS CONTROL

WBLC-01-000013 - Oracle WebLogic must ensure remote sessions for accessing security functions and security-relevant information are audited.Oracle WebLogic Server 12c Linux v2r2Unix

ACCESS CONTROL

WBLC-01-000013 - Oracle WebLogic must ensure remote sessions for accessing security functions and security-relevant information are audited.Oracle WebLogic Server 12c Windows v2r2Windows

ACCESS CONTROL

WBSP-AS-000110 - The WebSphere Application Server audit service provider must be enabled.DISA IBM WebSphere Traditional 9 STIG v1r1 MiddlewareUnix

ACCESS CONTROL

WN11-UR-000090 - The 'Deny log on through Remote Desktop Services' user right on Windows 11 workstations must be configured to prevent access from highly privileged domain accounts and local accounts on domain systems and unauthenticated access on all systems.DISA Microsoft Windows 11 STIG v2r3Windows

ACCESS CONTROL

WN12-CC-000133 - Users must be prevented from mapping local LPT ports and redirecting data from the Remote Desktop Session Host to local LPT ports. (Remote Desktop Services Role).DISA Windows Server 2012 and 2012 R2 DC STIG v3r7Windows

ACCESS CONTROL

WN16-MS-000410 - The 'Deny log on through Remote Desktop Services' user right on member servers must be configured to prevent access from highly privileged domain accounts and all local accounts on domain systems and from unauthenticated access on all systems - Deny log on through Remote Desktop Services user right on member servers must be configured to prevent access from highly privileged domain accounts and all local accounts on domain systems and from unauthenticated access on all systems.DISA Windows Server 2016 STIG v2r9Windows

ACCESS CONTROL

WN19-MS-000120 - Windows Server 2019 'Deny log on through Remote Desktop Services' user right on domain-joined member servers must be configured to prevent access from highly privileged domain accounts and all local accounts and from unauthenticated access on all systems.DISA Microsoft Windows Server 2019 STIG v3r4Windows

ACCESS CONTROL

WN22-AU-000190 - Windows Server 2022 must be configured to audit logon successes.DISA Microsoft Windows Server 2022 STIG v2r4Windows

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

WN22-AU-000200 - Windows Server 2022 must be configured to audit logon failures.DISA Microsoft Windows Server 2022 STIG v2r4Windows

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

WNFWA-000100 - Inbound exceptions to the firewall on domain workstations must only allow authorized remote management hosts.DISA Microsoft Windows Firewall v2r2Windows

ACCESS CONTROL