Item Search

NameAudit NamePluginCategory
1.1.1 Ensure mounting of squashfs filesystems is disabled - lsmodCIS Aliyun Linux 2 L1 v1.0.0Unix

CONFIGURATION MANAGEMENT

1.1.15 Ensure nodev option set on /dev/shm partitionCIS Aliyun Linux 2 L1 v1.0.0Unix

CONFIGURATION MANAGEMENT

1.5.1.6 Ensure no unconfined services existCIS Amazon Linux 2 v3.0.0 L1Unix

ACCESS CONTROL, MEDIA PROTECTION

1.6.1 Ensure message of the day is configured properlyCIS Amazon Linux 2 v3.0.0 L1Unix

ACCESS CONTROL

1.27 Set 'Remove file extensions blocked as Level 2' to 'Disabled'CIS MS Office Outlook 2010 v1.0.0Windows

SYSTEM AND COMMUNICATIONS PROTECTION

2.1.3 Ensure chrony is not run as the root userCIS Amazon Linux 2 v3.0.0 L1Unix

ACCESS CONTROL

2.2.1 Ensure autofs services are not in useCIS Amazon Linux 2 v3.0.0 L1Unix

MEDIA PROTECTION

2.2.4 Ensure dns server services are not in useCIS Amazon Linux 2 v3.0.0 L1Unix

CONFIGURATION MANAGEMENT

2.2.8 Ensure message access server services are not in useCIS Amazon Linux 2 v3.0.0 L1Unix

CONFIGURATION MANAGEMENT

2.2.18 Ensure web server services are not in useCIS Amazon Linux 2 v3.0.0 L1Unix

CONFIGURATION MANAGEMENT

2.2.19 Ensure xinetd services are not in useCIS Amazon Linux 2 v3.0.0 L1Unix

CONFIGURATION MANAGEMENT

3.1.3 Ensure bluetooth services are not in useCIS Amazon Linux 2 v3.0.0 L1Unix

CONFIGURATION MANAGEMENT

3.3.6 Ensure secure icmp redirects are not acceptedCIS Amazon Linux 2 v3.0.0 L1Unix

CONFIGURATION MANAGEMENT

3.3.7 Ensure reverse path filtering is enabledCIS Amazon Linux 2 v3.0.0 L1Unix

CONFIGURATION MANAGEMENT

3.4.2.2 Ensure firewalld service enabled and runningCIS Amazon Linux 2 v3.0.0 L1Unix

SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION

3.4.3.5 Ensure nftables loopback traffic is configuredCIS Amazon Linux 2 v3.0.0 L1Unix

SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION

3.4.3.7 Ensure nftables default deny firewall policyCIS Amazon Linux 2 v3.0.0 L1Unix

SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION

3.4.4.2.3 Ensure iptables rules exist for all open portsCIS Amazon Linux 2 v3.0.0 L1Unix

SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION

3.4.4.2.5 Ensure iptables rules are savedCIS Amazon Linux 2 v3.0.0 L1Unix

SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION

3.4.4.2.6 Ensure iptables service is enabled and activeCIS Amazon Linux 2 v3.0.0 L1Unix

SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION

3.4.4.3.3 Ensure ip6tables firewall rules exist for all open portsCIS Amazon Linux 2 v3.0.0 L1Unix

SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION

4.1.1.2 Ensure permissions on /etc/crontab are configuredCIS Amazon Linux 2 v3.0.0 L1Unix

ACCESS CONTROL, MEDIA PROTECTION

4.1.1.7 Ensure permissions on /etc/cron.d are configuredCIS Amazon Linux 2 v3.0.0 L1Unix

ACCESS CONTROL, MEDIA PROTECTION

4.2.11 Ensure sshd IgnoreRhosts is enabledCIS Amazon Linux 2 v3.0.0 L1Unix

IDENTIFICATION AND AUTHENTICATION

4.2.13 Ensure sshd LoginGraceTime is configuredCIS Amazon Linux 2 v3.0.0 L1Unix

ACCESS CONTROL

4.2.20 Ensure sshd PermitRootLogin is disabledCIS Amazon Linux 2 v3.0.0 L1Unix

ACCESS CONTROL

4.2.22 Ensure sshd UsePAM is enabledCIS Amazon Linux 2 v3.0.0 L1Unix

IDENTIFICATION AND AUTHENTICATION

4.3.6 Ensure sudo authentication timeout is configured correctlyCIS Amazon Linux 2 v3.0.0 L1Unix

ACCESS CONTROL

4.4.2.2.6 Ensure password maximum sequential characters is configuredCIS Amazon Linux 2 v3.0.0 L1Unix

IDENTIFICATION AND AUTHENTICATION

4.4.2.4.3 Ensure pam_unix includes a strong password hashing algorithmCIS Amazon Linux 2 v3.0.0 L1Unix

IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

4.5.1.1 Ensure strong password hashing algorithm is configuredCIS Amazon Linux 2 v3.0.0 L1Unix

IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

5.1.2.1.1 Ensure systemd-journal-remote is installedCIS Amazon Linux 2 v3.0.0 L1Unix

AUDIT AND ACCOUNTABILITY

5.1.2.1.4 Ensure journald is not configured to receive logs from a remote clientCIS Amazon Linux 2 v3.0.0 L1Unix

AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT

5.1.2.2 Ensure journald service is enabledCIS Amazon Linux 2 v3.0.0 L1Unix

AUDIT AND ACCOUNTABILITY

5.1.2.3 Ensure journald is configured to compress large log filesCIS Amazon Linux 2 v3.0.0 L1Unix

AUDIT AND ACCOUNTABILITY

5.1.2.6 Ensure journald log rotation is configured per site policyCIS Amazon Linux 2 v3.0.0 L1Unix

AUDIT AND ACCOUNTABILITY

5.1.3 Ensure logrotate is configuredCIS Amazon Linux 2 v3.0.0 L1Unix

AUDIT AND ACCOUNTABILITY

5.3.2 Ensure filesystem integrity is regularly checkedCIS Amazon Linux 2 v3.0.0 L1Unix

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

5.3.16 Ensure only FIPS 140-2 ciphers are used for SSHCIS Amazon Linux 2 STIG v2.0.0 STIGUnix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

6.1.7 Ensure permissions on /etc/gshadow are configuredCIS Amazon Linux 2 v3.0.0 L1Unix

ACCESS CONTROL, MEDIA PROTECTION

6.1.8 Ensure permissions on /etc/gshadow- are configuredCIS Amazon Linux 2 v3.0.0 L1Unix

ACCESS CONTROL, MEDIA PROTECTION

6.2.3 Ensure all groups in /etc/passwd exist in /etc/groupCIS Amazon Linux 2 v3.0.0 L1Unix

ACCESS CONTROL

6.2.6 Ensure no duplicate user names existCIS Amazon Linux 2 v3.0.0 L1Unix

IDENTIFICATION AND AUTHENTICATION

6.2.8 Ensure root path integrityCIS Amazon Linux 2 v3.0.0 L1Unix

CONFIGURATION MANAGEMENT

6.7 Ensure FIPS 140-2 OpenSSL Cryptography Is Used - openssl versionCIS PostgreSQL 9.5 OS v1.1.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION

12.3 Ensure the Apache AppArmor Profile Is in Enforce ModeCIS Apache HTTP Server 2.2 L2 v3.6.0Unix

CONFIGURATION MANAGEMENT

12.3 Ensure the Apache AppArmor Profile Is in Enforce ModeCIS Apache HTTP Server 2.2 L2 v3.6.0 MiddlewareUnix

CONFIGURATION MANAGEMENT

CASA-VN-000400 - The Cisco ASA remote access VPN server must be configured to use LDAP over SSL to determine authorization for granting access to the network.DISA STIG Cisco ASA VPN v2r2Cisco

ACCESS CONTROL

CISC-ND-001140 - The Cisco router must be configured to encrypt SNMP messages using a FIPS 140-2 approved algorithm.DISA STIG Cisco IOS-XR Router NDM v3r2Cisco

ACCESS CONTROL

GEN000290-2 - The system must not have the unnecessary 'news' account.DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL