Item Search

NameAudit NamePluginCategory
6.1.5 Ensure the file integrity tool is configured to verify ACLsCIS Red Hat Enterprise Linux 8 STIG v2.0.0 STIGUnix

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

7.1.1.7 Ensure that virtual network flow logs are captured and sent to Log AnalyticsCIS Microsoft Azure Foundations v4.0.0 L2microsoft_azure

SYSTEM AND INFORMATION INTEGRITY

Buffer overflow protection should be configured 'LimitRequestFieldsize'TNS IBM HTTP Server Best PracticeUnix

SYSTEM AND INFORMATION INTEGRITY

CGI-BIN directory should be disabled. 'Directory'TNS IBM HTTP Server Best PracticeWindows

CONFIGURATION MANAGEMENT

CGI-BIN directory should be disabled. 'LoadModule env_module'TNS IBM HTTP Server Best PracticeUnix

CONFIGURATION MANAGEMENT

F5BI-LT-000163 - To protect against data mining, the BIG-IP Core implementation providing content filtering must be configured to detect code injection attacks being launched against data storage objects.DISA F5 BIG-IP Local Traffic Manager STIG v2r4F5

ACCESS CONTROL

File permissions in the root document should only be accessible by administratorTNS IBM HTTP Server Best PracticeWindows
Fortigate - full-final-warning-threshold <= 95%TNS Fortigate FortiOS Best Practices v2.0.0FortiGate

AUDIT AND ACCOUNTABILITY

Fortigate - full-first-warning-threshold <= 75%TNS Fortigate FortiOS Best Practices v2.0.0FortiGate

AUDIT AND ACCOUNTABILITY

Fortigate - System event loggingTNS Fortigate FortiOS Best Practices v2.0.0FortiGate

AUDIT AND ACCOUNTABILITY

Fortigate - VPN event loggingTNS Fortigate FortiOS Best Practices v2.0.0FortiGate

AUDIT AND ACCOUNTABILITY

GEN006560 - The system vulnerability assessment tool, host-based intrusion detection tool, and file integrity tool must notify SA and IAO.DISA STIG AIX 5.3 v1r2Unix

CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY

GEN006560 - The system vulnerability assessment, host-based intrusion detection, and file integrity tools must notify of a security breach.DISA STIG AIX 6.1 v1r14Unix

CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY

HTTP TRACE method should be disabled. 'RewriteLog'TNS IBM HTTP Server Best PracticeWindows

AUDIT AND ACCOUNTABILITY

HTTP TRACE method should be disabled. 'RewriteLogLevel'TNS IBM HTTP Server Best PracticeUnix

CONFIGURATION MANAGEMENT

Huawei: Disable SNMP write accessTNS Huawei VRP Best Practice AuditHuawei

ACCESS CONTROL

Huawei: Enable AAA authorizationTNS Huawei VRP Best Practice AuditHuawei

IDENTIFICATION AND AUTHENTICATION

Huawei: Set 'login' headerTNS Huawei VRP Best Practice AuditHuawei

ACCESS CONTROL

Huawei: Set 'shell' headerTNS Huawei VRP Best Practice AuditHuawei

ACCESS CONTROL

Huawei: Set appropriate 'login' headerTNS Huawei VRP Best Practice AuditHuawei

ACCESS CONTROL

Huawei: Set System NameTNS Huawei VRP Best Practice AuditHuawei

CONFIGURATION MANAGEMENT

JUEX-L2-000020 - The Juniper EX switch must be configured to uniquely identify all network-connected endpoint devices before establishing any connection.DISA Juniper EX Series Layer 2 Switch v2r3Juniper

IDENTIFICATION AND AUTHENTICATION

JUSX-IP-000025 - The IDPS must send an alert to, at a minimum, the ISSO and ISSM when DoS incidents are detected.DISA Juniper SRX Services Gateway IDPS v2r1Juniper

SYSTEM AND INFORMATION INTEGRITY

Keep Alive setting parameter value should be appropriately configured.TNS IBM HTTP Server Best PracticeWindows

ACCESS CONTROL

Limit HTTP methods allowed by the Web Server.TNS IBM HTTP Server Best PracticeWindows

CONFIGURATION MANAGEMENT

Logging Directives should be restricted to authorized users. - 'ErrorLog logs/error_log'TNS IBM HTTP Server Best PracticeUnix

AUDIT AND ACCOUNTABILITY

MaxKeepAliveRequests parameter value should be appropriately configured.TNS IBM HTTP Server Best PracticeWindows

SYSTEM AND COMMUNICATIONS PROTECTION

MaxSpareServers parameter value should be appropriately configured.TNS IBM HTTP Server Best PracticeUnix

SYSTEM AND COMMUNICATIONS PROTECTION

Non-Essential modules should be disabled. 'mod_autoindex'TNS IBM HTTP Server Best PracticeWindows

CONFIGURATION MANAGEMENT

Non-Essential modules should be disabled. 'mod_dav'TNS IBM HTTP Server Best PracticeWindows

CONFIGURATION MANAGEMENT

Non-Essential modules should be disabled. 'mod_status'TNS IBM HTTP Server Best PracticeWindows

CONFIGURATION MANAGEMENT

OpenStack Compute - user/group ownership of config files set to root/nova - /etc/nova/policy.jsonTNS OpenStack Nova/Compute Security GuideUnix

CONFIGURATION MANAGEMENT

OpenStack Horizon - disable_password_reveal parameter set to TrueTNS OpenStack Dashboard/Horizon Security GuideUnix

CONFIGURATION MANAGEMENT

OpenStack Horizon - password_autocomplete parameter set to offTNS OpenStack Dashboard/Horizon Security GuideUnix

CONFIGURATION MANAGEMENT

OpenStack Horizon - SESSION_COOKIE_SECURE parameter set to TrueTNS OpenStack Dashboard/Horizon Security GuideUnix

SYSTEM AND COMMUNICATIONS PROTECTION

OpenStack Horizon - strict permissions set for horizon configuration files - /etc/openstack-dashboard/local_settings.pyTNS OpenStack Dashboard/Horizon Security GuideUnix

CONFIGURATION MANAGEMENT

OpenStack Identity - strict permissions set for Identity configuration files - /etc/keystone/keystone.confTNS OpenStack Keystone/Identity Security GuideUnix

CONFIGURATION MANAGEMENT

OpenStack Identity - user/group ownership of config files set to keystone - /etc/keystone/keystone.confTNS OpenStack Keystone/Identity Security GuideUnix

CONFIGURATION MANAGEMENT

OpenStack Identity - user/group ownership of config files set to keystone - /etc/keystone/ssl/private/signing_key.pemTNS OpenStack Keystone/Identity Security GuideUnix

CONFIGURATION MANAGEMENT

OpenStack Networking - strict permissions set for Compute configuration files - /etc/neutron/neutron.confTNS OpenStack Neutron/Networking Security GuideUnix

CONFIGURATION MANAGEMENT

OpenStack Networking - user/group ownership of config files set to root/neutron - /etc/neutron/api-paste.iniTNS OpenStack Neutron/Networking Security GuideUnix

CONFIGURATION MANAGEMENT

PANW-IP-000024 - The Palo Alto Networks security platform must install updates for application software files, signature definitions, detection heuristics, and vendor-provided rules when new releases are available in accordance with organizational configuration management policy and procedures.DISA STIG Palo Alto IDPS v3r2Palo_Alto

SYSTEM AND INFORMATION INTEGRITY

RHEL-09-431016 - RHEL 9 must elevate the SELinux context when an administrator calls the sudo command.DISA Red Hat Enterprise Linux 9 STIG v2r6Unix

ACCESS CONTROL

SLES-12-010500 - Advanced Intrusion Detection Environment (AIDE) must verify the baseline SUSE operating system configuration at least weekly.DISA SLES 12 STIG v3r3Unix

CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY

SLES-15-010420 - Advanced Intrusion Detection Environment (AIDE) must verify the baseline SUSE operating system configuration at least weekly.DISA SUSE Linux Enterprise Server 15 STIG v2r5Unix

CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY

SYMP-AG-000230 - Symantec ProxySG must provide an alert to, at a minimum, the SCA and ISSO of all audit failure events where the detection and/or prevention function is unable to write events to either local storage or the centralized server - EnabledDISA Symantec ProxySG Benchmark ALG v1r3BlueCoat

AUDIT AND ACCOUNTABILITY

SYMP-AG-000230 - Symantec ProxySG must provide an alert to, at a minimum, the SCA and ISSO of all audit failure events where the detection and/or prevention function is unable to write events to either local storage or the centralized server - FromDISA Symantec ProxySG Benchmark ALG v1r3BlueCoat

AUDIT AND ACCOUNTABILITY

SYMP-AG-000230 - Symantec ProxySG must provide an alert to, at a minimum, the SCA and ISSO of all audit failure events where the detection and/or prevention function is unable to write events to either local storage or the centralized server - ServerDISA Symantec ProxySG Benchmark ALG v1r3BlueCoat

AUDIT AND ACCOUNTABILITY

User IDs which disclose the privileges associated with it, should not be created.TNS IBM HTTP Server Best PracticeWindows

ACCESS CONTROL

User IDs which disclose the privileges associated with it, should not be created. 'lock'TNS IBM HTTP Server Best PracticeUnix

ACCESS CONTROL