Item Search

NameAudit NamePluginCategory
1.1.18 Ensure that the --authorization-mode argument is not set to AlwaysAllowCIS Kubernetes 1.8 Benchmark v1.2.0 L1Unix

ACCESS CONTROL

1.1.19 Ensure that the --authorization-mode argument is not set to AlwaysAllowCIS Kubernetes 1.11 Benchmark v1.3.0 L1Unix

ACCESS CONTROL

1.4.1.3 Ensure known default accounts do not existCIS Cisco Firewall v8.x L1 v4.2.0Cisco

IDENTIFICATION AND AUTHENTICATION

1.5.6 Create an 'access-list' for use with SNMPCIS Cisco IOS XE 17.x v2.1.1 L1Cisco

ACCESS CONTROL, SYSTEM AND INFORMATION INTEGRITY

1.6.3 Create administrative boundaries between resources using namespacesCIS Kubernetes 1.7.0 Benchmark v1.1.0 L1Unix

ACCESS CONTROL

1.11.2 (L1) Ensure 'Guided Switch Enabled' is set to 'Disabled'CIS Microsoft Edge v3.0.0 L1Windows

CONFIGURATION MANAGEMENT

3.1.14 Ensure that the --authorization-mode argument is not set to AlwaysAllowCIS Kubernetes 1.7.0 Benchmark v1.1.0 L1Unix

ACCESS CONTROL

4.6.1 Create administrative boundaries between resources using namespacesCIS Google Kubernetes Engine (GKE) v1.7.0 L1GCP

SYSTEM AND COMMUNICATIONS PROTECTION

7.6 (L1) Ensure port groups are not configured to VLAN 4095 and 0 except for Virtual Guest Tagging (VGT)CIS VMware ESXi 7.0 v1.5.0 L1VMware

SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION

7.8 Ensure port-level configuration overrides are disabled.CIS VMware ESXi 6.7 v1.3.0 Level 1VMware

SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION

20.21 Ensure 'DoD Root Certificate Authority (CA) certificates' are installed in the 'Trusted Root Store'CIS Microsoft Windows Server 2022 STIG v2.0.0 STIG DCWindows

SYSTEM AND COMMUNICATIONS PROTECTION

20.21 Ensure 'DoD Root Certificate Authority (CA) certificates' are installed in the 'Trusted Root Store'CIS Microsoft Windows Server 2019 STIG v3.0.0 STIG DCWindows

SYSTEM AND COMMUNICATIONS PROTECTION

20.21 Ensure 'DoD Root Certificate Authority (CA) certificates' are installed in the 'Trusted Root Store'CIS Microsoft Windows Server 2022 STIG v2.0.0 STIG MSWindows

SYSTEM AND COMMUNICATIONS PROTECTION

20.21 Ensure 'DoD Root Certificate Authority (CA) certificates' are installed in the 'Trusted Root Store'CIS Microsoft Windows Server 2016 STIG v3.0.0 STIG DCWindows

SYSTEM AND COMMUNICATIONS PROTECTION

20.27 Ensure 'Event Viewer must be protected from unauthorized modification and deletion'CIS Microsoft Windows Server 2019 STIG v3.0.0 STIG DCWindows

AUDIT AND ACCOUNTABILITY

20.27 Ensure 'Event Viewer must be protected from unauthorized modification and deletion' (STIG only)CIS Microsoft Windows Server 2022 STIG v2.0.0 STIG DCWindows

AUDIT AND ACCOUNTABILITY

20.27 Ensure 'Event Viewer must be protected from unauthorized modification and deletion' (STIG only)CIS Microsoft Windows Server 2022 STIG v2.0.0 STIG MSWindows

AUDIT AND ACCOUNTABILITY

20.30 Ensure 'FTP servers must be configured to prevent anonymous logons'CIS Microsoft Windows Server 2019 STIG v3.0.0 STIG DCWindows

CONFIGURATION MANAGEMENT

20.30 Ensure 'FTP servers must be configured to prevent anonymous logons'CIS Microsoft Windows Server 2019 STIG v3.0.0 STIG MSWindows

CONFIGURATION MANAGEMENT

20.30 Ensure 'FTP servers must be configured to prevent anonymous logons' (STIG only)CIS Microsoft Windows Server 2022 STIG v2.0.0 STIG MSWindows

CONFIGURATION MANAGEMENT

20.30 Ensure 'FTP servers must be configured to prevent anonymous logons' (STIG only)CIS Microsoft Windows Server 2022 STIG v2.0.0 STIG DCWindows

CONFIGURATION MANAGEMENT

20.40 Ensure 'Only Administrators have Administrator rights on the system' (STIG MS only)CIS Microsoft Windows Server 2016 STIG v3.0.0 STIG MSWindows

ACCESS CONTROL

20.48 Ensure 'Permissions for the Application Event Log must prevent access by non-privileged accounts'CIS Microsoft Windows Server 2016 STIG v3.0.0 STIG MSWindows

AUDIT AND ACCOUNTABILITY

20.62 Ensure 'Telnet Client is not installed' (STIG only)CIS Microsoft Windows Server 2022 STIG v2.0.0 STIG MSWindows

CONFIGURATION MANAGEMENT

20.62 Ensure 'Telnet Client is not installed' (STIG only)CIS Microsoft Windows Server 2022 STIG v2.0.0 STIG DCWindows

CONFIGURATION MANAGEMENT

AMLS-L2-000140 - The Arista Multilayer Switch must re-authenticate all endpoint devices every 60 minutes or less - dot1x reauthenticationDISA STIG Arista MLS DCS-7000 Series L2S v1r3Arista

IDENTIFICATION AND AUTHENTICATION

CASA-ND-001050 - The Cisco ASA must be configured to authenticate Simple Network Management Protocol (SNMP) messages using a FIPS-validated Keyed-Hash Message Authentication Code (HMAC).DISA STIG Cisco ASA NDM v2r2Cisco

IDENTIFICATION AND AUTHENTICATION

CISC-ND-000570 - The Cisco router must be configured to enforce password complexity by requiring that at least one uppercase character be used.DISA Cisco IOS Router NDM STIG v3r4Cisco

IDENTIFICATION AND AUTHENTICATION

CISC-ND-001140 - The Cisco router must be configured to encrypt SNMP messages using a FIPS 140-2 approved algorithm.DISA STIG Cisco IOS XE Router NDM v3r2Cisco

ACCESS CONTROL

CISC-ND-001210 - The Cisco router must be configured to implement cryptographic mechanisms to protect the confidentiality of remote maintenance sessions.DISA STIG Cisco IOS XE Router NDM v3r2Cisco

MAINTENANCE

CISC-RT-000398 - The Cisco perimeter router must be configured to drop IPv6 packets containing a Hop-by-Hop or Destination Option extension header with an undefined option type.DISA STIG Cisco IOS-XR Router RTR v3r2Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

EX13-EG-000165 - Exchange messages with a blank sender field must be rejected.DISA Microsoft Exchange 2013 Edge Transport Server STIG v1r6Windows

SYSTEM AND INFORMATION INTEGRITY

EX13-EG-000175 - Exchange filtered messages must be archived.DISA Microsoft Exchange 2013 Edge Transport Server STIG v1r6Windows

SYSTEM AND INFORMATION INTEGRITY

EX16-ED-000330 - Exchange messages with a blank sender field must be rejected.DISA Microsoft Exchange 2016 Edge Transport Server STIG v2r5Windows

SYSTEM AND INFORMATION INTEGRITY

EX19-ED-000125 - Exchange filtered messages must be archived.DISA Microsoft Exchange 2019 Edge Server STIG v2r2Windows

SYSTEM AND INFORMATION INTEGRITY

First Hop Security - Router Advertisement Guard - Admin StatusTenable Cisco ACICisco_ACI

CONFIGURATION MANAGEMENT

GEN003619 - The system must not be configured for network bridging.DISA STIG Solaris 10 X86 v2r4Unix

CONFIGURATION MANAGEMENT

JBOS-AS-000080 - The JBoss server must generate log records for access and authentication events to the management interface.DISA JBoss EAP 6.3 STIG v2r6Unix

AUDIT AND ACCOUNTABILITY

JUEX-L2-000050 - The Juniper EX switch must be configured to permit authorized users to select a user session to capture.DISA Juniper EX Series Layer 2 Switch v2r2Juniper

AUDIT AND ACCOUNTABILITY

JUEX-NM-000490 - The Juniper EX switch must use an an NTP service that is hosted by a trusted source or a DOD-compliant enterprise or local NTP server.DISA Juniper EX Series Network Device Management v2r2Juniper

IDENTIFICATION AND AUTHENTICATION

JUEX-RT-000270 - The Juniper router must be configured to have all nonessential capabilities disabled.DISA Juniper EX Series Router v2r1Juniper

CONFIGURATION MANAGEMENT

JUEX-RT-000770 - The Juniper perimeter router must be configured to block all outbound management traffic.DISA Juniper EX Series Router v2r1Juniper

SYSTEM AND COMMUNICATIONS PROTECTION

JUNI-RT-000070 - The Juniper router must be configured to have all non-essential capabilities disabled - ftpDISA STIG Juniper Router RTR v3r2Juniper

CONFIGURATION MANAGEMENT

JUNI-RT-000070 - The Juniper router must be configured to have all non-essential capabilities disabled - httpDISA STIG Juniper Router RTR v3r2Juniper

CONFIGURATION MANAGEMENT

JUSX-AG-000145 - The Juniper SRX Services Gateway Firewall must continuously monitor outbound communications traffic for unusual/unauthorized activities or conditions.DISA Juniper SRX Services Gateway ALG v3r2Juniper

SYSTEM AND INFORMATION INTEGRITY

JUSX-DM-000166 - The Juniper SRX Services Gateway must be configured to use Junos 12.1 X46 or later to meet the minimum required version for DoD.DISA Juniper SRX Services Gateway NDM v3r2Juniper

CONFIGURATION MANAGEMENT

vCenter: vcenter-8.vami-firewall-restrict-accessVMware vSphere Security Configuration and Hardening GuideVMware

CONFIGURATION MANAGEMENT

VCSA-70-000279 - The vCenter Server must protect the confidentiality and integrity of transmitted information by isolating Internet Protocol (IP)-based storage traffic.DISA STIG VMware vSphere 7.0 vCenter v1r3VMware

CONFIGURATION MANAGEMENT

VCSA-80-000279 - The vCenter Server must protect the confidentiality and integrity of transmitted information by isolating Internet Protocol (IP)-based storage traffic.DISA VMware vSphere 8.0 vCenter STIG v2r2VMware

CONFIGURATION MANAGEMENT

vNetwork : restrict-port-level-overridesVMWare vSphere 6.5 Hardening GuideVMware