Item Search

NameAudit NamePluginCategory
1.5.5 Set the ACL for each 'snmp-server community'CIS Cisco IOS XE 16.x v2.1.0 L1Cisco

ACCESS CONTROL, SYSTEM AND INFORMATION INTEGRITY

2.4 Do Not Specify Passwords in the Command LineCIS MySQL 8.0 Community Linux OS L1 v1.1.0Unix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

3.4.2.1 Ensure IPv6 default deny firewall policyCIS Bottlerocket L2Unix

SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION

3.5.1.1 Ensure default deny firewall policy - Chain FORWARDCIS Debian 8 Workstation L1 v2.0.2Unix

SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION

3.5.1.1 Ensure IPv6 default deny firewall policy - Chain FORWARDCIS Distribution Independent Linux Workstation L1 v2.0.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION

3.5.1.1 Ensure IPv6 default deny firewall policy - Chain INPUTCIS Distribution Independent Linux Server L1 v2.0.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION

3.5.1.1 Ensure IPv6 default deny firewall policy - Chain OUTPUTCIS Distribution Independent Linux Server L1 v2.0.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION

3.5.2.1 Ensure default deny firewall policy - Chain FORWARDCIS Distribution Independent Linux Workstation L1 v2.0.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION

3.5.2.1 Ensure IPv6 default deny firewall policy - Chain FORWARDCIS Debian 9 Server L1 v1.0.1Unix

SYSTEM AND COMMUNICATIONS PROTECTION

3.5.2.1 Ensure IPv6 default deny firewall policy - Chain OUTPUTCIS Debian 8 Workstation L1 v2.0.2Unix

SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION

4.20 sqlnet.ora - 'tcp.validnode_checking = YES'CIS v1.1.0 Oracle 11g OS Windows Level 2Windows

SYSTEM AND COMMUNICATIONS PROTECTION

5.2.3.3 Ensure events that modify the sudo log file are collectedCIS Ubuntu Linux 20.04 LTS Workstation L2 v2.0.1Unix

AUDIT AND ACCOUNTABILITY

5.2.3.3 Ensure events that modify the sudo log file are collectedCIS Ubuntu Linux 18.04 LTS v2.2.0 L2 ServerUnix

AUDIT AND ACCOUNTABILITY

5.2.3.3 Ensure events that modify the sudo log file are collectedCIS AlmaLinux OS 8 Workstation L2 v3.0.0Unix

AUDIT AND ACCOUNTABILITY

5.2.3.3 Ensure events that modify the sudo log file are collectedCIS Red Hat EL8 Workstation L2 v3.0.0Unix

AUDIT AND ACCOUNTABILITY

5.4.3 Ensure password hashing algorithm is SHA-512CIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIGUnix

IDENTIFICATION AND AUTHENTICATION

5.4.3 Ensure password hashing algorithm is SHA-512 - password-authCIS Red Hat Enterprise Linux 7 STIG v2.0.0 L1 WorkstationUnix

IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

5.4.7 Ensure minimum and maximum requirements are set for password changes - maxrepeatCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIGUnix

IDENTIFICATION AND AUTHENTICATION

8.1.12 Collect Use of Privileged CommandsCIS Debian Linux 7 L2 v1.0.0Unix

AUDIT AND ACCOUNTABILITY

AMLS-NM-000210 - The Arista Multilayer Switch must be configured to prohibit the use of all unnecessary and/or nonsecure functions, ports, protocols, and/or services, as defined in the PPSM CAL and vulnerability assessments.DISA STIG Arista MLS DCS-7000 Series NDM v1r4Arista

CONFIGURATION MANAGEMENT

AOSX-14-000015 - The macOS system must utilize an HBSS solution and implement all DoD required modules.DISA STIG Apple Mac OSX 10.14 v2r6Unix

SYSTEM AND INFORMATION INTEGRITY

APPL-12-000015 - The macOS system must utilize an ESS solution and implement all DoD required modules - ESS and implement all DoD required modules.DISA STIG Apple macOS 12 v1r9Unix

SYSTEM AND INFORMATION INTEGRITY

APPL-13-000015 - The macOS system must use an Endpoint Security Solution (ESS) and implement all DOD required modules.DISA STIG Apple macOS 13 v1r5Unix

SYSTEM AND INFORMATION INTEGRITY

DB2X-00-008700 - DB2 must only accept end entity certificates issued by DoD PKI or DoD-approved PKI Certification Authorities (CAs) for the establishment of all encrypted sessions - CAsDISA STIG IBM DB2 v10.5 LUW v2r1 DatabaseIBM_DB2DB

SYSTEM AND COMMUNICATIONS PROTECTION

DTAVSEL-006 - The McAfee VirusScan Enterprise for Linux 1.9.x/2.0.x On-Access scanner must be configured to find unknown macro viruses.McAfee Virus Scan Enterprise for Linux 1.9x/2.0x Managed Client v1r5Unix

SYSTEM AND INFORMATION INTEGRITY

DTAVSEL-008 - The McAfee VirusScan Enterprise for Linux 1.9.x/2.0.x On-Access scanner must be configured to scan files when being written to disk.McAfee Virus Scan Enterprise for Linux 1.9x/2.0x Managed Client v1r5Unix

SYSTEM AND INFORMATION INTEGRITY

DTAVSEL-009 - The McAfee VirusScan Enterprise for Linux 1.9.x/2.0.x On-Access scanner must be configured to scan files when being read from disk.McAfee Virus Scan Enterprise for Linux 1.9x/2.0x Managed Client v1r5Unix

SYSTEM AND INFORMATION INTEGRITY

PANW-IP-000045 - Palo Alto Networks security platform components, including sensors, event databases, and management consoles must integrate with a network-wide monitoring capability.DISA STIG Palo Alto IDPS v3r2Palo_Alto

SYSTEM AND INFORMATION INTEGRITY

Prevent installation of devices that match any of these device IDs - 1MSCT Windows 10 v1507 v1.0.0Windows

MEDIA PROTECTION

Prevent installation of devices that match any of these device IDs - 1MSCT Windows 10 1903 v1.19.9Windows

MEDIA PROTECTION

Prevent installation of devices that match any of these device IDs - DenyDeviceIDsRetroactiveMSCT Windows 10 v1507 v1.0.0Windows

MEDIA PROTECTION

Prevent installation of devices that match any of these device IDs - DenyDeviceIDsRetroactiveMSCT Windows 10 1803 v1.0.0Windows

MEDIA PROTECTION

Prevent installation of devices that match any of these device IDs - DenyDeviceIDsRetroactiveMSCT Windows 10 1809 v1.0.0Windows

MEDIA PROTECTION

Prevent installation of devices that match any of these device IDs - DenyDeviceIDsRetroactiveMSCT Windows 10 1903 v1.19.9Windows

MEDIA PROTECTION

Prevent installation of devices that match any of these device IDs - Device Installation RestrictionsMSCT Windows 10 1809 v1.0.0Windows

MEDIA PROTECTION

Prevent installation of devices that match any of these device IDs - PCI\CC_0C0AMSCT Windows 10 1803 v1.0.0Windows

MEDIA PROTECTION

Prevent installation of devices using drivers that match these device setup classes - {d48179be-ec20-11d1-b6b8-00c04fa372a7}MSCT Windows 10 1803 v1.0.0Windows

MEDIA PROTECTION

Prevent installation of devices using drivers that match these device setup classes - 1MSCT Windows 10 v1507 v1.0.0Windows

MEDIA PROTECTION

Prevent installation of devices using drivers that match these device setup classes - 1MSCT Windows 10 v21H2 v1.0.0Windows

MEDIA PROTECTION

Prevent installation of devices using drivers that match these device setup classes - DenyDeviceClassesMSCT Windows 10 v1507 v1.0.0Windows

MEDIA PROTECTION

Prevent installation of devices using drivers that match these device setup classes - DenyDeviceClassesMSCT Windows 10 1803 v1.0.0Windows

MEDIA PROTECTION

RHEL-07-010110 - The Red Hat Enterprise Linux operating system must initiate a session lock for graphical user interfaces when the screensaver is activated.DISA Red Hat Enterprise Linux 7 STIG v3r15Unix

ACCESS CONTROL

RHEL-07-040370 - The Red Hat Enterprise Linux operating system must not permit direct logons to the root account using remote access via SSH.DISA Red Hat Enterprise Linux 7 STIG v3r15Unix

CONFIGURATION MANAGEMENT

VCSA-70-000267 - The vCenter Server must disable the distributed virtual switch health check.DISA STIG VMware vSphere 7.0 vCenter v1r3VMware

CONFIGURATION MANAGEMENT

VCTR-67-000033 - The vCenter Server must use a least-privileges assignment for the vCenter Server database user.DISA STIG VMware vSphere 6.7 vCenter v1r4VMware

CONFIGURATION MANAGEMENT

VCTR-67-000074 - The vCenter Server Administrators must clean up log files after failed installations.DISA STIG VMware vSphere 6.7 vCenter v1r4VMware

CONFIGURATION MANAGEMENT

VCWN-06-000033 - A least-privileges assignment must be used for the vCenter Server database user.DISA STIG VMware vSphere vCenter 6.x v1r4VMware

CONFIGURATION MANAGEMENT

VCWN-65-000028 - The vCenter Server for Windows Administrators must clean up log files after failed installations.DISA STIG VMware vSphere vCenter 6.5 v2r3VMware

CONFIGURATION MANAGEMENT

VCWN-65-000033 - The vCenter Server for Windows must use a least-privileges assignment for the vCenter Server database user.DISA STIG VMware vSphere vCenter 6.5 v2r3VMware

CONFIGURATION MANAGEMENT

VM Tools: guest-8.tools-allow-transformsVMware vSphere Security Configuration and Hardening GuideVMware

CONFIGURATION MANAGEMENT