Item Search

NameAudit NamePluginCategory
1.2 Ensure a customer created Customer Master Key (CMK) is created for the App-tierCIS Amazon Web Services Three-tier Web Architecture L2 1.0.0amazon_aws

ACCESS CONTROL

1.2 Ensure that the SharePoint Central Administration Site is TLS-enabled - HTTPSCIS Microsoft SharePoint 2019 OS v1.0.0Windows

SYSTEM AND COMMUNICATIONS PROTECTION

1.7 Ensure all Customer owned Amazon Machine Images for Web Tier are not shared publiclyCIS Amazon Web Services Three-tier Web Architecture L1 1.0.0amazon_aws

ACCESS CONTROL

1.15 Ensure all Public Web Tier SSL\TLS certificates are >30 days from ExpirationCIS Amazon Web Services Three-tier Web Architecture L2 1.0.0amazon_aws

SYSTEM AND INFORMATION INTEGRITY

1.17 Ensure CloudFront to Origin connection is configured using TLS1.1+ as the SSL\TLS protocolCIS Amazon Web Services Three-tier Web Architecture L2 1.0.0amazon_aws

SYSTEM AND COMMUNICATIONS PROTECTION

2.3 Ensure the WebDAV Modules Are DisabledCIS Apache HTTP Server 2.2 L1 v3.6.0 MiddlewareUnix

SYSTEM AND INFORMATION INTEGRITY

2.3 Ensure the WebDAV Modules Are DisabledCIS Apache HTTP Server 2.2 L1 v3.6.0Unix

SYSTEM AND INFORMATION INTEGRITY

2.3 Ensure the WebDAV Modules Are DisabledCIS Apache HTTP Server 2.2 L2 v3.6.0Unix

SYSTEM AND INFORMATION INTEGRITY

2.6 Ensure AutoScaling Group Launch Configuration for App Tier is configured to use an App-Tier IAM RoleCIS Amazon Web Services Three-tier Web Architecture L1 1.0.0amazon_aws

ACCESS CONTROL

2.8 Ensure an IAM policy that allows admin privileges for all services used is created - Policy ExistCIS Amazon Web Services Three-tier Web Architecture L1 1.0.0amazon_aws

ACCESS CONTROL

3.1 Ensure 'deployment method retail' is setCIS IIS 10 v1.2.1 Level 1Windows

SYSTEM AND SERVICES ACQUISITION

3.6 Ensure 'httpcookie' mode is configured for session state - ApplicationsCIS IIS 10 v1.2.1 Level 2Windows

SYSTEM AND SERVICES ACQUISITION

3.12 Configure HTTP to HTTPS Redirects with a CloudFront Viewer Protocol PolicyCIS Amazon Web Services Three-tier Web Architecture L2 1.0.0amazon_aws

SYSTEM AND COMMUNICATIONS PROTECTION

3.13 Ensure Web Tier Auto-Scaling Group has an associated Elastic Load BalancerCIS Amazon Web Services Three-tier Web Architecture L1 1.0.0amazon_aws

CONFIGURATION MANAGEMENT

4.6 Ensure that a log metric filter for the Cloudwatch group assigned to the "VPC Flow Logs" is createdCIS Amazon Web Services Three-tier Web Architecture L1 1.0.0amazon_aws

AUDIT AND ACCOUNTABILITY

4.8 Ensure Handler is not granted Write and Script/Execute - DefaultCIS IIS 10 v1.2.1 Level 1Windows

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

4.10 Ensure 'notListedCgisAllowed' is set to falseCIS IIS 7 L1 v1.8.0Windows

SYSTEM AND COMMUNICATIONS PROTECTION

5.3 Ensure AWS Cloudfront Logging is enabledCIS Amazon Web Services Three-tier Web Architecture L1 1.0.0amazon_aws

AUDIT AND ACCOUNTABILITY

5.4 Ensure Cloudwatch Log Group is created for Web TierCIS Amazon Web Services Three-tier Web Architecture L1 1.0.0amazon_aws

AUDIT AND ACCOUNTABILITY

5.11 Ensure an AWS Managed Config Rule for encrypted volumes is applied to App Tier - EncryptionCIS Amazon Web Services Three-tier Web Architecture L1 1.0.0amazon_aws

SYSTEM AND COMMUNICATIONS PROTECTION

6.4 Ensure Geo-Restriction is enabled within Cloudfront DistributionCIS Amazon Web Services Three-tier Web Architecture L2 1.0.0amazon_aws

SYSTEM AND COMMUNICATIONS PROTECTION

6.8 Ensure subnets for the Data tier are createdCIS Amazon Web Services Three-tier Web Architecture L1 1.0.0amazon_aws

SYSTEM AND COMMUNICATIONS PROTECTION

6.10 Ensure NAT Gateways are created in at least 2 Availability Zones - Subnet1CIS Amazon Web Services Three-tier Web Architecture L1 1.0.0amazon_aws

SYSTEM AND COMMUNICATIONS PROTECTION

6.25 Ensure Data tier Security Group has no inbound rules for CIDR of 0 (Global Allow)CIS Amazon Web Services Three-tier Web Architecture L1 1.0.0amazon_aws

SYSTEM AND COMMUNICATIONS PROTECTION

8.3 Ensure All Default Apache Content Is RemovedCIS Apache HTTP Server 2.4 v2.2.0 L2Unix

CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

AS24-U1-000190 - The log information from the Apache web server must be protected from unauthorized modification or deletion.DISA STIG Apache Server 2.4 Unix Server v3r2 MiddlewareUnix

AUDIT AND ACCOUNTABILITY

AS24-U1-000900 - The Apache web server must remove all export ciphers to protect the confidentiality and integrity of transmitted information.DISA STIG Apache Server 2.4 Unix Server v3r2Unix

SYSTEM AND COMMUNICATIONS PROTECTION

AS24-U1-000900 - The Apache web server must remove all export ciphers to protect the confidentiality and integrity of transmitted information.DISA STIG Apache Server 2.4 Unix Server v3r2 MiddlewareUnix

SYSTEM AND COMMUNICATIONS PROTECTION

AS24-U2-000620 - The Apache web server must display a default hosted application web page, not a directory listing, when a requested web page cannot be found.DISA STIG Apache Server 2.4 Unix Site v2r6Unix

SYSTEM AND INFORMATION INTEGRITY

Configuration files should be secured against unauthorized access.TNS IBM HTTP Server Best PracticeUnix
Configuration files should be secured against unauthorized access.TNS IBM HTTP Server Best Practice MiddlewareUnix
IIST-SV-000123 - The IIS 10.0 web server must be reviewed on a regular basis to remove any Operating System features, utility programs, plug-ins, and modules not necessary for operation.DISA IIS 10.0 Server v3r3Windows

CONFIGURATION MANAGEMENT

IIST-SV-000154 - The IIS 10.0 web server must maintain the confidentiality of controlled information during transmission through the use of an approved Transport Layer Security (TLS) version.DISA IIS 10.0 Server v3r3Windows

SYSTEM AND COMMUNICATIONS PROTECTION

IIST-SV-000154 - The IIS 10.0 web server must maintain the confidentiality of controlled information during transmission through the use of an approved Transport Layer Security (TLS) version.DISA IIS 10.0 Server v2r10Windows

SYSTEM AND COMMUNICATIONS PROTECTION

IIST-SV-000210 - HTTPAPI Server version must be removed from the HTTP Response Header information.DISA IIS 10.0 Server v2r10Windows

SYSTEM AND INFORMATION INTEGRITY

IISW-SV-000161 - An IIS Server configured to be a SMTP relay must require authentication.DISA IIS 8.5 Server v2r7Windows

CONFIGURATION MANAGEMENT

OH12-1X-000227 - OHS must not contain any robots.txt files - OHS must not contain any robots.txt files.DISA STIG Oracle HTTP Server 12.1.3 v2r3Unix

CONFIGURATION MANAGEMENT

VCFL-67-000015 - vSphere Client must not have the Web Distributed Authoring (WebDAV) servlet installed.DISA STIG VMware vSphere 6.7 Virgo Client v1r2Unix

CONFIGURATION MANAGEMENT

VCLU-70-000021 - Lookup Service must set the welcome-file node to a default web page.DISA STIG VMware vSphere 7.0 Lookup Service v1r2Unix

SYSTEM AND INFORMATION INTEGRITY

VCPF-70-000022 - Performance Charts must set the welcome-file node to a default web page.DISA STIG VMware vSphere 7.0 Perfcharts Tomcat v1r1Unix

SYSTEM AND INFORMATION INTEGRITY

VCST-67-000022 - The Security Token Service must set the welcome-file node to a default web page.DISA STIG VMware vSphere 6.7 STS Tomcat v1r3Unix

SYSTEM AND INFORMATION INTEGRITY

VCUI-67-000020 - vSphere UI must set the welcome-file node to a default web page.DISA STIG VMware vSphere 6.7 UI Tomcat v1r3Unix

SYSTEM AND INFORMATION INTEGRITY

VCUI-70-000022 - vSphere UI must set the welcome-file node to a default web page.DISA STIG VMware vSphere 7.0 vCA UI v1r2Unix

SYSTEM AND INFORMATION INTEGRITY

WA070 A22 - A private web server must be located on a separate controlled access subnet.DISA STIG Apache Server 2.2 Unix v1r11Unix
WA00505 A22 - Web Distributed Authoring and Versioning (WebDAV) must be disabled.DISA STIG Apache Server 2.2 Unix v1r11 MiddlewareUnix

CONFIGURATION MANAGEMENT

WA00505 W22 - Web Distributed Authoring and Versioning (WebDAV) must be disabled.DISA STIG Apache Server 2.2 Windows v1r13Windows

CONFIGURATION MANAGEMENT

WatchGuard : DNS ServersTNS Best Practice WatchGuard Audit 1.0.0WatchGuard

SYSTEM AND COMMUNICATIONS PROTECTION

WG345 A22 - The web server must remove all export ciphers from the cipher suite.DISA STIG Apache Server 2.2 Unix v1r11 MiddlewareUnix

SYSTEM AND COMMUNICATIONS PROTECTION

WG345 W22 - The web server must remove all export ciphers from the cipher suite.DISA STIG Apache Server 2.2 Windows v1r13Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WG440 IIS6 - Monitoring software must include CGI type files or equivalent programs.DISA STIG IIS 6.0 Server v6r16Windows