Item Search

NameAudit NamePluginCategory
1 - Application specific loggingTNS Best Practice Jetty 9 LinuxUnix
3 - Configure log file size limit - org.eclipse.jetty.server.handler.RequestLogHandlerTNS Best Practice Jetty 9 LinuxUnix

AUDIT AND ACCOUNTABILITY

3.1.5 Ensure the filename pattern for log files is set correctlyCIS PostgreSQL 9.5 DB v1.1.0PostgreSQLDB

AUDIT AND ACCOUNTABILITY

3.1.7 Ensure 'log_truncate_on_rotation' is enabledCIS PostgreSQL 10 DB v1.0.0PostgreSQLDB

AUDIT AND ACCOUNTABILITY

3.1.7 Ensure 'log_truncate_on_rotation' is enabledCIS PostgreSQL 13 DB v1.2.0PostgreSQLDB

AUDIT AND ACCOUNTABILITY

3.1.7 Ensure 'log_truncate_on_rotation' is enabledCIS PostgreSQL 17 v1.0.0 L1 PostgreSQLPostgreSQLDB

AUDIT AND ACCOUNTABILITY

3.1.7 Ensure 'log_truncate_on_rotation' is enabledCIS PostgreSQL 16 v1.1.0 L1 OS Linux PostgreSQLDBPostgreSQLDB

AUDIT AND ACCOUNTABILITY

4 - Restrict access to $JETTY_HOME - ownerTNS Best Practice Jetty 9 LinuxUnix

ACCESS CONTROL

7 - SSL implementation - start.jar --module=deployTNS Best Practice Jetty 9 LinuxUnix

SYSTEM AND COMMUNICATIONS PROTECTION

7.1 Ensure 'Symmetric Key encryption algorithm' is set to 'AES_128' or higher in non-system databasesCIS SQL Server 2008 R2 DB Engine L1 v1.7.0MS_SQLDB

SYSTEM AND COMMUNICATIONS PROTECTION

7.1 Ensure 'Symmetric Key encryption algorithm' is set to 'AES_128' or higher in non-system databasesCIS SQL Server 2012 Database L1 AWS RDS v1.6.0MS_SQLDB

SYSTEM AND COMMUNICATIONS PROTECTION

7.1 Ensure 'Symmetric Key encryption algorithm' is set to 'AES_128' or higher in non-system databasesCIS Microsoft SQL Server 2022 v1.2.1 L1 AWS RDSMS_SQLDB

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

7.1 Ensure 'Symmetric Key encryption algorithm' is set to 'AES_128' or higher in non-system databasesCIS Microsoft SQL Server 2022 v1.2.1 L1 Database EngineMS_SQLDB

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

7.1 Ensure 'Symmetric Key encryption algorithm' is set to 'AES_128' or higher in non-system databasesCIS Microsoft SQL Server 2019 v1.5.0 L1 AWS RDSMS_SQLDB

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

8 - Secure DatasourcesTNS Best Practice JBoss 7 LinuxUnix

CONFIGURATION MANAGEMENT

10 - Enable SSL ConnectorTNS Best Practice JBoss 7 LinuxUnix

SYSTEM AND COMMUNICATIONS PROTECTION

11 - Access Control - JAASTNS Best Practice Jetty 9 LinuxUnix
12 - Remove and mask informational headers - Server Property OverrideTNS Best Practice JBoss 7 LinuxUnix

SYSTEM AND COMMUNICATIONS PROTECTION

13 - Disable stacktrace in response bodyTNS Best Practice JBoss 7 LinuxUnix

SYSTEM AND INFORMATION INTEGRITY

13 - Restrict access to temp directory - ownerTNS Best Practice Jetty 9 LinuxUnix

ACCESS CONTROL

14 - SSL Encryption - WSDL Secure PortTNS Best Practice JBoss 7 LinuxUnix

SYSTEM AND COMMUNICATIONS PROTECTION

16 - ORB Subsystem - Security-Domain SetTNS Best Practice JBoss 7 LinuxUnix

SYSTEM AND COMMUNICATIONS PROTECTION

16 - Restrict access to JETTY.policy - ownerTNS Best Practice Jetty 9 LinuxUnix

ACCESS CONTROL

21 - Restrict access to users.xml - ownerTNS Best Practice Jetty 9 LinuxUnix

ACCESS CONTROL

28 - Ensure scheme is set accuratelyTNS Best Practice Jetty 9 LinuxUnix

SYSTEM AND COMMUNICATIONS PROTECTION

37 - Configure maxHttpHeaderSizeTNS Best Practice Jetty 9 LinuxUnix

SYSTEM AND COMMUNICATIONS PROTECTION

41 - Do not run applications as privilegedTNS Best Practice Jetty 9 LinuxUnix

ACCESS CONTROL

Adtran : Disable TelnetTNS Adtran AOS Best Practice AuditAdtran

CONFIGURATION MANAGEMENT

Adtran : Enable aaaTNS Adtran AOS Best Practice AuditAdtran

IDENTIFICATION AND AUTHENTICATION

Adtran : Enable security mode on virtual access point (VAP)TNS Adtran AOS Best Practice AuditAdtran

ACCESS CONTROL

Adtran : Ensure a trusted, primary DNS server is setTNS Adtran AOS Best Practice AuditAdtran

SYSTEM AND COMMUNICATIONS PROTECTION

Adtran : Ensure a trusted, secondary DNS server is setTNS Adtran AOS Best Practice AuditAdtran

SYSTEM AND COMMUNICATIONS PROTECTION

APPL-14-002006 - The macOS system must disable Unix-to-Unix Copy Protocol service.DISA Apple macOS 14 (Sonoma) STIG v2r3Unix

ACCESS CONTROL

EPAS-00-001100 - The EDB Postgres Advanced Server must allow only the ISSM (or individuals or roles appointed by the ISSM) to select which auditable events are to be audited.EnterpriseDB PostgreSQL Advanced Server OS Linux v2r1Unix

AUDIT AND ACCOUNTABILITY

EPAS-00-004600 - The EDB Postgres Advanced Server must enforce authorized access to all PKI private keys stored/used by the EDB Postgres Advanced Server.EnterpriseDB PostgreSQL Advanced Server OS Linux v2r1Unix

IDENTIFICATION AND AUTHENTICATION

Extreme : Configure Banner before-loginTNS Extreme ExtremeXOS Best Practice AuditExtreme_ExtremeXOS

ACCESS CONTROL

PGS9-00-009100 - Access to external executables must be disabled or restricted.DISA STIG PostgreSQL 9.x on RHEL DB v2r5PostgreSQLDB

CONFIGURATION MANAGEMENT

PPS9-00-002600 - The audit information produced by the EDB Postgres Advanced Server must be protected from unauthorized read access.EDB PostgreSQL Advanced Server OS Linux Audit v2r3Unix

AUDIT AND ACCOUNTABILITY

WatchGuard : Authentication Settings - 'Management User Idle Timeout'TNS Best Practice WatchGuard Audit 1.0.0WatchGuard

ACCESS CONTROL

WatchGuard : Authentication Settings - 'Management User Session Timeout'TNS Best Practice WatchGuard Audit 1.0.0WatchGuard

ACCESS CONTROL

WatchGuard : DDoS Prevention - Distributed Denial-of-Service Prevention - Per Client QuotaTNS Best Practice WatchGuard Audit 1.0.0WatchGuard

SYSTEM AND COMMUNICATIONS PROTECTION

WatchGuard : Device InfoTNS Best Practice WatchGuard Audit 1.0.0WatchGuard

CONFIGURATION MANAGEMENT

WatchGuard : DNS ServersTNS Best Practice WatchGuard Audit 1.0.0WatchGuard

SYSTEM AND COMMUNICATIONS PROTECTION

WatchGuard : DoS Prevention - Drop IPSEC Flood AttackTNS Best Practice WatchGuard Audit 1.0.0WatchGuard

SYSTEM AND COMMUNICATIONS PROTECTION

WatchGuard : IPS Logging Threat Level HIGH - EnabledTNS Best Practice WatchGuard Audit 1.0.0WatchGuard

AUDIT AND ACCOUNTABILITY

WatchGuard : IPS Signature Update - 'Enabled'TNS Best Practice WatchGuard Audit 1.0.0WatchGuard

SYSTEM AND INFORMATION INTEGRITY

WatchGuard : LDAP Server NameTNS Best Practice WatchGuard Audit 1.0.0WatchGuard

IDENTIFICATION AND AUTHENTICATION

WatchGuard : Logging - IKE Packet TracingTNS Best Practice WatchGuard Audit 1.0.0WatchGuard

AUDIT AND ACCOUNTABILITY

WatchGuard : Logging - Review Remote Logging Server AddressTNS Best Practice WatchGuard Audit 1.0.0WatchGuard

AUDIT AND ACCOUNTABILITY

WatchGuard : SNMP Configuration - v3 uses DESTNS Best Practice WatchGuard Audit 1.0.0WatchGuard

CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY