Item Search

NameAudit NamePluginCategory
1.5 Ensure the Latest Security Patches are AppliedCIS PostgreSQL 13 v1.3.0 L1 Database PostgreSQLDBPostgreSQLDB

SYSTEM AND SERVICES ACQUISITION

1.173 WN19-DC-000280CIS Microsoft Windows Server 2019 STIG v4.0.0 DC CAT IIWindows

SYSTEM AND COMMUNICATIONS PROTECTION

1.234 WN19-SO-000270CIS Microsoft Windows Server 2019 STIG v4.0.0 MS CAT IIWindows

ACCESS CONTROL

2.2 Ensure 'CLR Enabled' Server Configuration Option is set to '0'CIS SQL Server 2012 Database L1 DB v1.6.0MS_SQLDB

CONFIGURATION MANAGEMENT

2.3 Ensure 'Cross DB Ownership Chaining' Server Configuration Option is set to '0'CIS SQL Server 2014 Database L1 DB v1.5.0MS_SQLDB

ACCESS CONTROL

2.6 Ensure 'Remote Access' Server Configuration Option is set to '0'CIS SQL Server 2014 Database L1 DB v1.5.0MS_SQLDB

SYSTEM AND INFORMATION INTEGRITY

2.6 Ensure 'Remote Access' Server Configuration Option is set to '0'CIS SQL Server 2016 Database L1 DB v1.4.0MS_SQLDB

SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION

2.17 Ensure no login exists with the name 'sa'CIS SQL Server 2012 Database L1 DB v1.6.0MS_SQLDB

CONFIGURATION MANAGEMENT

2.17 Ensure no login exists with the name 'sa'CIS SQL Server 2014 Database L1 DB v1.5.0MS_SQLDB

CONFIGURATION MANAGEMENT

3.1.4 Ensure the log file destination directory is set correctlyCIS PostgreSQL 13 v1.3.0 L1 Database PostgreSQLDBPostgreSQLDB

AUDIT AND ACCOUNTABILITY

3.1.6 Ensure the log file permissions are set correctlyCIS PostgreSQL 13 v1.3.0 L1 Database PostgreSQLDBPostgreSQLDB

ACCESS CONTROL, MEDIA PROTECTION

3.1.15 Ensure the correct SQL statements generating errors are recordedCIS PostgreSQL 13 v1.3.0 L1 Database PostgreSQLDBPostgreSQLDB

AUDIT AND ACCOUNTABILITY

3.1.18 Ensure 'debug_print_plan' is disabledCIS PostgreSQL 13 v1.3.0 L1 Database PostgreSQLDBPostgreSQLDB

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

3.1.24 Ensure 'log_line_prefix' is set correctlyCIS PostgreSQL 13 v1.3.0 L1 Database PostgreSQLDBPostgreSQLDB

AUDIT AND ACCOUNTABILITY

3.1.25 Ensure 'log_statement' is set correctlyCIS PostgreSQL 13 v1.3.0 L1 Database PostgreSQLDBPostgreSQLDB

AUDIT AND ACCOUNTABILITY

3.4 Ensure SQL Authentication is not used in contained databasesCIS SQL Server 2016 Database L1 DB v1.4.0MS_SQLDB

ACCESS CONTROL

4.1 Ensure 'MUST_CHANGE' Option is set to 'ON' for All SQL Authenticated LoginsCIS SQL Server 2016 Database L1 DB v1.4.0MS_SQLDB

IDENTIFICATION AND AUTHENTICATION

4.2.35 Restrict Access to SYSCAT.STATEMENTSCIS IBM DB2 11 v1.2.0 Database Level 1IBM_DB2DB

ACCESS CONTROL, MEDIA PROTECTION

4.6 Ensure No Public Database Links ExistCIS Oracle Server 12c DB Traditional Auditing v3.0.0OracleDB

ACCESS CONTROL

4.9 Make use of predefined rolesCIS PostgreSQL 13 v1.3.0 L1 Database PostgreSQLDBPostgreSQLDB

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

5.1 Ensure 'Maximum number of error log files' is set to greater than or equal to '12'CIS SQL Server 2012 Database L1 DB v1.6.0MS_SQLDB

AUDIT AND ACCOUNTABILITY

5.3 Ensure 'Login Auditing' is set to 'failed logins'CIS SQL Server 2014 Database L1 AWS RDS v1.5.0MS_SQLDB

ACCESS CONTROL

6.1.8 Ensure the 'SYNONYM' Audit Option Is EnabledCIS Oracle Server 12c DB Traditional Auditing v3.0.0OracleDB

AUDIT AND ACCOUNTABILITY

6.2 Ensure 'CLR Assembly Permission Set' is set to 'SAFE_ACCESS' for All CLR AssembliesCIS SQL Server 2012 Database L1 DB v1.6.0MS_SQLDB

CONFIGURATION MANAGEMENT

6.10 Ensure Weak SSL/TLS Ciphers Are DisabledCIS PostgreSQL 13 v1.3.0 L1 Database PostgreSQLDBPostgreSQLDB

SYSTEM AND COMMUNICATIONS PROTECTION

6.26 Restrict Access to SYSCAT.STATEMENTSCIS IBM DB2 9 Benchmark v3.0.1 Level 2 DBIBM_DB2DB

ACCESS CONTROL

7.1 Ensure 'Symmetric Key encryption algorithm' is set to 'AES_128' or higher in non-system databasesCIS SQL Server 2016 Database L1 DB v1.4.0MS_SQLDB

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

7.2 Ensure Asymmetric Key Size is set to 'greater than or equal to 2048' in non-system databasesCIS SQL Server 2016 Database L1 DB v1.4.0MS_SQLDB

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

18.9.31.1 (L2) Ensure 'Allow Clipboard synchronization across devices' is set to 'Disabled'CIS Microsoft Windows Server 2019 v4.0.0 L2 DCWindows

CONFIGURATION MANAGEMENT

18.9.31.1 (L2) Ensure 'Allow Clipboard synchronization across devices' is set to 'Disabled'CIS Microsoft Windows Server 2019 Stand-alone v3.0.0 L2 MSWindows

CONFIGURATION MANAGEMENT

18.9.31.1 (L2) Ensure 'Allow Clipboard synchronization across devices' is set to 'Disabled'CIS Microsoft Windows Server 2019 v4.0.0 L2 MSWindows

CONFIGURATION MANAGEMENT

18.9.31.1 (L2) Ensure 'Allow Clipboard synchronization across devices' is set to 'Disabled'CIS Microsoft Windows Server 2025 Stand-alone v1.0.0 L2 MSWindows

CONFIGURATION MANAGEMENT

18.9.33.1 Ensure 'Allow Clipboard synchronization across devices' is set to 'Disabled'CIS Microsoft Windows Server 2025 v2.0.0 L2 MSWindows

CONFIGURATION MANAGEMENT

18.9.33.1 Ensure 'Allow Clipboard synchronization across devices' is set to 'Disabled'CIS Microsoft Windows Server 2022 v5.0.0 L2 MSWindows

CONFIGURATION MANAGEMENT

O112-C2-008000 - The DBMS must include organization-defined additional, more detailed information in the audit records for audit events identified by type, location, or subject.DISA STIG Oracle 11.2g v2r5 DatabaseOracleDB

AUDIT AND ACCOUNTABILITY

SQL2-00-003900 - SQL Server must not grant users direct access to the Unsafe assembly permission.DISA STIG SQL Server 2012 DB Instance Security v1r20MS_SQLDB

ACCESS CONTROL

SQL2-00-004200 - SQL Server must not grant users direct access control to the Shutdown permission.DISA STIG SQL Server 2012 DB Instance Security v1r20MS_SQLDB

ACCESS CONTROL

SQL2-00-004900 - SQL Server must not grant users direct access to the Alter resources permission.DISA STIG SQL Server 2012 DB Instance Security v1r20MS_SQLDB

ACCESS CONTROL

SQL2-00-005800 - SQL Server must not grant users direct access to the Control server permission.DISA STIG SQL Server 2012 DB Instance Security v1r20MS_SQLDB

ACCESS CONTROL

SQL2-00-006200 - SQL Server must not grant users direct access to the Create endpoint permission.DISA STIG SQL Server 2012 DB Instance Security v1r20MS_SQLDB

ACCESS CONTROL

SQL4-00-015400 - SQL Server software installation account(s) must be restricted to authorized users.DISA STIG SQL Server 2014 Instance OS Audit v2r4Windows

CONFIGURATION MANAGEMENT

SQL4-00-035900 - Trace or Audit records must be generated when unsuccessful attempts to access categorized information (e.g., classification levels/security levels) occur.DISA STIG SQL Server 2014 Database Audit v1r7MS_SQLDB

AUDIT AND ACCOUNTABILITY

SQL4-00-036850 - Trace or Audit records must be generated when unsuccessful attempts to modify categorized information (e.g., classification levels/security levels) occur - Event ID 83DISA STIG SQL Server 2014 Database Audit v1r7MS_SQLDB

AUDIT AND ACCOUNTABILITY

SQL4-00-036850 - Trace or Audit records must be generated when unsuccessful attempts to modify categorized information (e.g., classification levels/security levels) occur - Event ID 87DISA STIG SQL Server 2014 Database Audit v1r7MS_SQLDB

AUDIT AND ACCOUNTABILITY

SQL4-00-036850 - Trace or Audit records must be generated when unsuccessful attempts to modify categorized information (e.g., classification levels/security levels) occur - Event ID 91DISA STIG SQL Server 2014 Database Audit v1r7MS_SQLDB

AUDIT AND ACCOUNTABILITY

SQL4-00-036850 - Trace or Audit records must be generated when unsuccessful attempts to modify categorized information (e.g., classification levels/security levels) occur - SCHEMA_OBJECT_ACCESS...DISA STIG SQL Server 2014 Database Audit v1r7MS_SQLDB

AUDIT AND ACCOUNTABILITY

SQL6-D0-003700 - SQL Server must integrate with an organization-level authentication/access mechanism providing account management and automation for all users, groups, roles, and any other principals.DISA MS SQL Server 2016 Instance STIG v3r6 MS_SQLDBMS_SQLDB

ACCESS CONTROL

SQL6-D0-004100 - SQL Server must protect against a user falsely repudiating by ensuring the NT AUTHORITY SYSTEM account is not used for administration.DISA MS SQL Server 2016 Instance STIG v3r6 MS_SQLDBMS_SQLDB

AUDIT AND ACCOUNTABILITY

SQLI-22-003700 - SQL Server must integrate with an organization-level authentication/access mechanism providing account management and automation for all users, groups, roles, and any other principals.DISA Microsoft SQL Server 2022 Instance STIG v1r3 MS_SQLDBMS_SQLDB

ACCESS CONTROL

SQLI-22-011400 - SQL Server must enforce access restrictions associated with changes to the configuration of the instance.DISA Microsoft SQL Server 2022 Instance STIG v1r3 MS_SQLDBMS_SQLDB

CONFIGURATION MANAGEMENT