Item Search

NameAudit NamePluginCategory
1.1.3.1 Configure AuthorizationCIS Cisco IOS XR 7.x v1.0.0 L2Cisco

ACCESS CONTROL

1.2.1 Ensure the container host has been HardenedCIS Docker v1.7.0 L1 Docker - LinuxUnix

CONFIGURATION MANAGEMENT

2.8 Ensure Socket Peer-Credential Authentication is Used AppropriatelyCIS MariaDB 10.6 Database L2 v1.1.0MySQLDB

CONFIGURATION MANAGEMENT

2.8 Ensure Socket Peer-Credential Authentication is Used AppropriatelyCIS MariaDB 10.6 on Linux L2 v1.1.0Unix

CONFIGURATION MANAGEMENT

3.7 Ensure Relational Database Service backup retention policy is setCIS Amazon Web Services Three-tier Web Architecture L1 1.0.0amazon_aws

CONTINGENCY PLANNING

4.1 Ensure sudo is configured correctly - /etc/sudoers.d/postgresCIS PostgreSQL 12 OS v1.1.0Unix

ACCESS CONTROL

4.1 Ensure that 'Secure transfer required' is set to 'Enabled'CIS Microsoft Azure Foundations v3.0.0 L1microsoft_azure

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

4.1 Ensure TLS or SSL protects all network communicationsCIS MongoDB L1 Unix Audit v1.0.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION

4.1 Ensure TLS or SSL protects all network communicationsCIS MongoDB 3.4 L1 Unix Audit v1.0.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION

4.1 Ensure TLS or SSL protects all network communicationsCIS MongoDB 3.4 L1 Windows Audit v1.0.0Windows

SYSTEM AND COMMUNICATIONS PROTECTION

4.4 Enable Auditing of Process and Privilege Events - AUE_FCHROOT : cisCIS Solaris 11 L1 v1.1.0Unix

AUDIT AND ACCOUNTABILITY

4.4 Enable Auditing of Process and Privilege Events - AUE_SETEGID : cisCIS Solaris 11.2 L1 v1.1.0Unix

AUDIT AND ACCOUNTABILITY

4.4 Enable Auditing of Process and Privilege Events - AUE_SETEUID : cisCIS Solaris 11.1 L1 v1.0.0Unix

AUDIT AND ACCOUNTABILITY

4.4 Enable Auditing of Process and Privilege Events - AUE_SETPGID : cisCIS Solaris 11.2 L1 v1.1.0Unix

AUDIT AND ACCOUNTABILITY

4.4 Enable Auditing of Process and Privilege Events - AUE_SETREGID : cisCIS Solaris 11 L1 v1.1.0Unix

AUDIT AND ACCOUNTABILITY

4.9 Ensure 'sql_mode' Contains 'STRICT_ALL_TABLES'CIS MySQL 8.0 Community Database L2 v1.1.0MySQLDB

PLANNING, SYSTEM AND SERVICES ACQUISITION

5.1 Do Not Specify Passwords in the Command LineCIS PostgreSQL 13 DB v1.2.0PostgreSQLDB

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

5.1 Do Not Specify Passwords in the Command LineCIS PostgreSQL 14 OS v 1.2.0Unix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

5.1 Do Not Specify Passwords in the Command LineCIS PostgreSQL 17 v1.0.0 L1 PostgreSQLUnix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

5.1 Ensure All Auditable System Actions Commands Are AuditedCIS Oracle Database 23ai v1.0.0 L1 RDBMSOracleDB

AUDIT AND ACCOUNTABILITY

5.1 Ensure Common SNMP Community Strings are NOT usedCIS Juniper OS Benchmark v2.1.0 L1Juniper

SYSTEM AND COMMUNICATIONS PROTECTION

5.1 Ensure Default IIS web log location is movedCIS IIS 10 v1.2.1 Level 1Windows

AUDIT AND ACCOUNTABILITY

5.1 Ensure Default IIS web log location is movedCIS IIS 8.0 v1.5.1 Level 1Windows

AUDIT AND ACCOUNTABILITY

5.1 Ensure Default IIS web log location is movedCIS IIS 7 L1 v1.8.0Windows

AUDIT AND ACCOUNTABILITY

5.1 Ensure swarm mode is not Enabled, if not neededCIS Docker v1.7.0 L1 Docker - LinuxUnix

CONFIGURATION MANAGEMENT

5.1 Set 'Secure Protocol combinations' to 'Enabled:Only use TLS 1.0'CIS IE 9 v1.0.0Windows

SYSTEM AND COMMUNICATIONS PROTECTION

5.3.1 Ensure server parameter 'require_secure_transport' is set to 'ON' for MySQL flexible serverCIS Microsoft Azure Foundations v3.0.0 L1microsoft_azure

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

6.4 Ensure That the Cloud SQL Database Instance Requires All Incoming Connections To Use SSLCIS Google Cloud Platform v3.0.0 L1GCP

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

6.5 Ensure 'audit_log_connection_policy' is Not Set to 'NONE' - NONECIS MySQL 5.6 Enterprise Database L1 v2.0.0MySQLDB

AUDIT AND ACCOUNTABILITY

7.10 Repairing permissions is no longer needed with 10.11CIS Apple OSX 10.11 El Capitan L1 v1.1.0Unix
8.1 Ensure 'have_ssl' Is Set to 'YES'CIS MySQL 5.6 Community Database L1 v2.0.0MySQLDB

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

8.1 Ensure 'have_ssl' Is Set to 'YES'CIS MySQL 5.6 Enterprise Database L1 v2.0.0MySQLDB

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

GOOG-11-002300 - Google Android 11 must be configured to disable trust agents.AirWatch - DISA Google Android 11 COPE v2r1MDM

CONFIGURATION MANAGEMENT

MOTO-09-002300 - Motorola Android Pie must be configured to disable trust agents.MobileIron - DISA Motorola Android Pie.x COBO v1r2MDM

CONFIGURATION MANAGEMENT

MYS8-00-001600 - The MySQL Database Server 8.0 must be configured to provide audit record generation capability for DoD-defined auditable events within all database components.DISA Oracle MySQL 8.0 v2r2 DBMySQLDB

AUDIT AND ACCOUNTABILITY

MYS8-00-002300 - The MySQL Database Server 8.0 must generate audit records when unsuccessful attempts to access categories of information (e.g., classification levels/security levels) occur.DISA Oracle MySQL 8.0 v2r2 DBMySQLDB

AUDIT AND ACCOUNTABILITY

MYS8-00-002600 - The MySQL Database Server 8.0 must generate audit records when privileges/permissions are modified.DISA Oracle MySQL 8.0 v2r2 DBMySQLDB

AUDIT AND ACCOUNTABILITY

MYS8-00-002700 - The MySQL Database Server 8.0 must generate audit records when unsuccessful attempts to modify privileges/permissions occur.DISA Oracle MySQL 8.0 v2r2 DBMySQLDB

AUDIT AND ACCOUNTABILITY

MYS8-00-003300 - The MySQL Database Server 8.0 must generate audit records when unsuccessful attempts to delete privileges/permissions occur.DISA Oracle MySQL 8.0 v2r2 DBMySQLDB

AUDIT AND ACCOUNTABILITY

MYS8-00-003400 - The MySQL Database Server 8.0 must generate audit records when security objects are deleted.DISA Oracle MySQL 8.0 v2r2 DBMySQLDB

AUDIT AND ACCOUNTABILITY

MYS8-00-003500 - The MySQL Database Server 8.0 must generate audit records when unsuccessful attempts to delete security objects occur.DISA Oracle MySQL 8.0 v2r2 DBMySQLDB

AUDIT AND ACCOUNTABILITY

MYS8-00-004300 - The MySQL Database Server 8.0 must generate audit records when concurrent logons/connections by the same user from different workstations.DISA Oracle MySQL 8.0 v2r2 DBMySQLDB

AUDIT AND ACCOUNTABILITY

MYS8-00-004400 - The MySQL Database Server 8.0 must be able to generate audit records when successful accesses to objects occur.DISA Oracle MySQL 8.0 v2r2 DBMySQLDB

AUDIT AND ACCOUNTABILITY

MYS8-00-004500 - The MySQL Database Server 8.0 must generate audit records when unsuccessful accesses to objects occur.DISA Oracle MySQL 8.0 v2r2 DBMySQLDB

AUDIT AND ACCOUNTABILITY

MYS8-00-006000 - The MySQL Database Server 8.0 must be configured to prohibit or restrict the use of organization-defined functions, ports, protocols, and/or services, as defined in the PPSM CAL and vulnerability assessments.DISA Oracle MySQL 8.0 v2r2 DBMySQLDB

CONFIGURATION MANAGEMENT

MYS8-00-006300 - The MySQL Database Server 8.0 must uniquely identify and authenticate non-organizational users (or processes acting on behalf of non-organizational users).DISA Oracle MySQL 8.0 v2r2 DBMySQLDB

IDENTIFICATION AND AUTHENTICATION

MYS8-00-007200 - The MySQL Database Server 8.0 must protect the confidentiality and integrity of all information at rest.DISA Oracle MySQL 8.0 v2r2 DBMySQLDB

SYSTEM AND COMMUNICATIONS PROTECTION

MYS8-00-008400 - The MySQL Database Server 8.0 software installation account must be restricted to authorized users.DISA Oracle MySQL 8.0 v2r2 DBMySQLDB

CONFIGURATION MANAGEMENT

MYS8-00-012300 - Security-relevant software updates to the MySQL Database Server 8.0 must be installed within the time period directed by an authoritative source (e.g., IAVM, CTOs, DTMs, and STIGs).DISA Oracle MySQL 8.0 v2r2 DBMySQLDB

SYSTEM AND INFORMATION INTEGRITY

TiMOS/SR-OS : OS Version is up to dateTNS Alcatel-Lucent TiMOS/Nokia SR-OS Best Practice AuditAlcatel

CONFIGURATION MANAGEMENT