Item Search

NameAudit NamePluginCategory
1.1 Ensure packages are obtained from authorized repositoriesCIS PostgreSQL 11 OS v1.0.0Unix

CONFIGURATION MANAGEMENT

2.2.29 (L2) Configure 'Log on as a service'CIS Microsoft Windows 8.1 v2.4.1 L2 BitlockerWindows

ACCESS CONTROL

2.2.29 Configure 'Log on as a service'CIS Windows 7 Workstation Level 2 + Bitlocker v3.2.0Windows

ACCESS CONTROL

4.5.3.3 Ensure default user umask is configuredCIS Oracle Linux 7 v4.0.0 L1 ServerUnix

ACCESS CONTROL, MEDIA PROTECTION

4.5.3.3 Ensure default user umask is configuredCIS Rocky Linux 8 Workstation L1 v2.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

4.5.3.3 Ensure default user umask is configuredCIS Oracle Linux 8 Workstation L1 v3.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

4.5.3.3 Ensure default user umask is configuredCIS Oracle Linux 7 v4.0.0 L1 WorkstationUnix

ACCESS CONTROL, MEDIA PROTECTION

4.5.3.3 Ensure default user umask is configuredCIS Red Hat EL8 Workstation L1 v3.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

5.2 Ensure 'Peer Name Resolution Protocol (PNRPsvc)' is set to 'Not Installed'CIS Microsoft Windows Server 2019 STIG v3.0.0 STIG MSWindows

CONFIGURATION MANAGEMENT

5.2 Ensure 'Peer Name Resolution Protocol (PNRPsvc)' is set to 'Not Installed' (STIG only)CIS Microsoft Windows Server 2022 STIG v2.0.0 STIG DCWindows

CONFIGURATION MANAGEMENT

5.4.1.2 Ensure minimum days between password changes is 7 or more - login.defsCIS Aliyun Linux 2 L1 v1.0.0Unix

IDENTIFICATION AND AUTHENTICATION

5.4.1.2 Ensure minimum days between password changes is 7 or more - login.defsCIS Distribution Independent Linux Workstation L1 v2.0.0Unix

IDENTIFICATION AND AUTHENTICATION

5.4.1.2 Ensure minimum days between password changes is 7 or more - usersCIS Ubuntu Linux 14.04 LTS Workstation L1 v2.1.0Unix

IDENTIFICATION AND AUTHENTICATION

5.4.1.2 Ensure minimum days between password changes is 7 or more - usersCIS Debian 9 Server L1 v1.0.1Unix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

5.4.1.2 Ensure minimum days between password changes is 7 or more - usersCIS Amazon Linux v2.1.0 L1Unix

IDENTIFICATION AND AUTHENTICATION

5.4.1.3 Ensure password expiration warning days is 7 or more - login.defsCIS Amazon Linux v2.1.0 L1Unix

IDENTIFICATION AND AUTHENTICATION

5.4.1.3 Ensure password expiration warning days is 7 or more - login.defsCIS Debian 9 Server L1 v1.0.1Unix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

5.4.1.3 Ensure password expiration warning days is 7 or more - login.defsCIS Amazon Linux 2 STIG v1.0.0 L1Unix

IDENTIFICATION AND AUTHENTICATION

5.4.1.3 Ensure password expiration warning days is 7 or more - login.defsCIS Ubuntu Linux 18.04 LXD Container L1 v1.0.0Unix

IDENTIFICATION AND AUTHENTICATION

5.4.1.3 Ensure password expiration warning days is 7 or more - login.defsCIS Ubuntu Linux 18.04 LXD Host L1 Server v1.0.0Unix

IDENTIFICATION AND AUTHENTICATION

5.4.1.3 Ensure password expiration warning days is 7 or more - login.defsCIS Ubuntu Linux 18.04 LXD Host L1 Workstation v1.0.0Unix

IDENTIFICATION AND AUTHENTICATION

5.4.3.3 Ensure default user umask is configuredCIS SUSE Linux Enterprise 15 v2.0.0 L1 WorkstationUnix

ACCESS CONTROL, MEDIA PROTECTION

5.4.3.3 Ensure default user umask is configuredCIS Ubuntu Linux 22.04 LTS v2.0.0 L1 WorkstationUnix

ACCESS CONTROL, MEDIA PROTECTION

5.4.3.3 Ensure default user umask is configuredCIS Oracle Linux 9 v2.0.0 L1 ServerUnix

ACCESS CONTROL, MEDIA PROTECTION

5.4.3.3 Ensure default user umask is configuredCIS Debian Linux 12 v1.1.0 L1 WorkstationUnix

ACCESS CONTROL, MEDIA PROTECTION

5.4.3.3 Ensure default user umask is configuredCIS Ubuntu Linux 22.04 LTS v2.0.0 L1 ServerUnix

ACCESS CONTROL, MEDIA PROTECTION

10.1.2 Set Password Change Minimum Number of DaysCIS Debian Linux 7 L1 v1.0.0Unix

IDENTIFICATION AND AUTHENTICATION

10.1.3 Set Password Expiring Warning DaysCIS Debian Linux 7 L1 v1.0.0Unix

IDENTIFICATION AND AUTHENTICATION

20.21 Ensure 'DoD Root Certificate Authority (CA) certificates' are installed in the 'Trusted Root Store'CIS Microsoft Windows Server 2016 STIG v3.0.0 STIG DCWindows

SYSTEM AND COMMUNICATIONS PROTECTION

20.40 Ensure 'Only Administrators have Administrator rights on the system' (STIG MS only)CIS Microsoft Windows Server 2016 STIG v3.0.0 STIG MSWindows

ACCESS CONTROL

20.45 Ensure 'Outdated or unused accounts are removed or disabled' (STIG only)CIS Microsoft Windows Server 2022 STIG v2.0.0 STIG DCWindows

ACCESS CONTROL

20.48 Ensure 'Permissions for the Application Event Log must prevent access by non-privileged accounts'CIS Microsoft Windows Server 2016 STIG v3.0.0 STIG MSWindows

AUDIT AND ACCOUNTABILITY

20.49 Ensure 'Permissions for the Security Event Log must prevent access by non-privileged accounts'CIS Microsoft Windows Server 2016 STIG v3.0.0 STIG DCWindows

AUDIT AND ACCOUNTABILITY

20.49 Ensure 'Permissions for the Security Event Log must prevent access by non-privileged accounts' (STIG only)CIS Microsoft Windows Server 2022 STIG v2.0.0 STIG MSWindows

AUDIT AND ACCOUNTABILITY

20.50 Ensure 'Permissions for the System Event Log must prevent access by non-privileged accounts'CIS Microsoft Windows Server 2016 STIG v3.0.0 STIG DCWindows

AUDIT AND ACCOUNTABILITY

20.50 Ensure 'Permissions for the System Event Log must prevent access by non-privileged accounts'CIS Microsoft Windows Server 2019 STIG v3.0.0 STIG MSWindows

AUDIT AND ACCOUNTABILITY

Choose drive encryption method and cipher strength (Windows 10 [Version 1511] and later) - EncryptionMethodWithXtsFdvMSCT Windows 10 1803 v1.0.0Windows

SYSTEM AND COMMUNICATIONS PROTECTION

Choose drive encryption method and cipher strength (Windows 10 [Version 1511] and later) - EncryptionMethodWithXtsFdvMSCT Windows 10 1809 v1.0.0Windows

SYSTEM AND COMMUNICATIONS PROTECTION

Choose drive encryption method and cipher strength (Windows 10 [Version 1511] and later) - EncryptionMethodWithXtsOsMSCT Windows 10 1803 v1.0.0Windows

SYSTEM AND COMMUNICATIONS PROTECTION

Choose drive encryption method and cipher strength (Windows 10 [Version 1511] and later) - EncryptionMethodWithXtsOsMSCT Windows 10 1809 v1.0.0Windows

SYSTEM AND COMMUNICATIONS PROTECTION

Choose drive encryption method and cipher strength (Windows 10 [Version 1511] and later) - EncryptionMethodWithXtsRdvMSCT Windows 10 1803 v1.0.0Windows

SYSTEM AND COMMUNICATIONS PROTECTION

DTAG008 - The antivirus signature file age must not exceed 7 days.DISA McAfee VirusScan 8.8 Managed Client STIG v6r1Windows

SYSTEM AND INFORMATION INTEGRITY

MD4X-00-006600 - MongoDB must be configured in accordance with the security configuration settings based on DoD security configuration and implementation guidance, including STIGs, NSA configuration guides, CTOs, DTMs, and IAVMs.DISA STIG MongoDB Enterprise Advanced 4.x v1r4 OSUnix

CONFIGURATION MANAGEMENT

WN10-CC-000020 - IPv6 source routing must be configured to highest protection.DISA Microsoft Windows 10 STIG v3r4Windows

CONFIGURATION MANAGEMENT

WN10-CC-000025 - The system must be configured to prevent IP source routing.DISA Microsoft Windows 10 STIG v3r4Windows

CONFIGURATION MANAGEMENT

WN11-CC-000020 - IPv6 source routing must be configured to highest protection.DISA Microsoft Windows 11 STIG v2r3Windows

CONFIGURATION MANAGEMENT

WN11-CC-000025 - The system must be configured to prevent IP source routing.DISA Microsoft Windows 11 STIG v2r3Windows

CONFIGURATION MANAGEMENT

WN12-CC-000150 - WDigest Authentication must be disabled.DISA Windows Server 2012 and 2012 R2 DC STIG v3r7Windows

CONFIGURATION MANAGEMENT

WN16-CC-000070 - Windows Server 2016 must be configured to ignore NetBIOS name release requests except from WINS servers.DISA Windows Server 2016 STIG v2r9Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WN19-CC-000060 - Windows Server 2019 must be configured to ignore NetBIOS name release requests except from WINS servers.DISA Microsoft Windows Server 2019 STIG v3r4Windows

SYSTEM AND COMMUNICATIONS PROTECTION