Item Search

NameAudit NamePluginCategory
1.1.1.6 Ensure overlay kernel module is not availableCIS Ubuntu Linux 20.04 LTS v3.0.0 L2 ServerUnix

CONFIGURATION MANAGEMENT

1.1.1.6 Ensure overlay kernel module is not availableCIS Ubuntu Linux 20.04 LTS v3.0.0 L2 WorkstationUnix

CONFIGURATION MANAGEMENT

1.1.1.6 Ensure squashfs kernel module is not availableCIS Red Hat Enterprise Linux 9 v2.0.0 L2 WorkstationUnix

CONFIGURATION MANAGEMENT

1.1.1.6 Ensure squashfs kernel module is not availableCIS Rocky Linux 9 v2.0.0 L2 ServerUnix

CONFIGURATION MANAGEMENT

1.5 Ensure auditing is configured for the docker daemonCIS Docker Community Edition v1.1.0 L1 Linux Host OSUnix

AUDIT AND ACCOUNTABILITY

1.6.1 Configure at least 2 external NTP ServersCIS Cisco NX-OS v1.2.0 L1Cisco

AUDIT AND ACCOUNTABILITY

1.40 RHEL-09-213105CIS Red Hat Enterprise Linux 9 STIG v1.0.0 CAT IIUnix

CONFIGURATION MANAGEMENT

2.1.1.2 Set version 2 for 'ip ssh version'CIS Cisco IOS 15 L1 v4.1.1Cisco

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

2.1.1.2 Set version 2 for 'ip ssh version'CIS Cisco IOS XE 17.x v2.2.1 L1Cisco

CONFIGURATION MANAGEMENT

2.2.2 Ensure X11 Server components are not installedCIS Red Hat Enterprise Linux 7 STIG v2.0.0 L1 ServerUnix

CONFIGURATION MANAGEMENT

2.2.2 Ensure X11 Server components are not installedCIS Red Hat 6 Server L1 v3.0.0Unix

CONFIGURATION MANAGEMENT

2.2.2 Ensure X11 Server components are not installedCIS CentOS 6 Server L1 v3.0.0Unix

CONFIGURATION MANAGEMENT

2.2.2 Ensure X11 Server components are not installedCIS Oracle Linux 6 Server L1 v2.0.0Unix

CONFIGURATION MANAGEMENT

2.2.2 Ensure X11 Server components are not installedCIS Fedora 19 Family Linux Server L1 v1.0.0Unix

CONFIGURATION MANAGEMENT

3.4.2.1 Ensure nftables is installedCIS Ubuntu Linux 18.04 LTS v2.2.0 L1 ServerUnix

SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION

3.5.3 Ensure iptables is installedCIS Debian 9 Workstation L1 v1.0.1Unix

SYSTEM AND COMMUNICATIONS PROTECTION

3.6.1.1 Ensure iptables is installedCIS CentOS 6 Server L1 v3.0.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION

4.1.1 Ensure a single firewall configuration utility is in useCIS Ubuntu Linux 24.04 LTS v1.0.0 L1 ServerUnix

SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION

4.1.1 Ensure a single firewall configuration utility is in useCIS Ubuntu Linux 20.04 LTS v3.0.0 L1 WorkstationUnix

SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION

4.1.1 Ensure a single firewall configuration utility is in useCIS Debian Linux 12 v1.1.0 L1 WorkstationUnix

SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION

4.1.1 Ensure a single firewall configuration utility is in useCIS Ubuntu Linux 24.04 LTS v1.0.0 L1 WorkstationUnix

SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION

4.1.1 Ensure a single firewall configuration utility is in useCIS Debian Linux 12 v1.1.0 L1 ServerUnix

SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION

4.1.1 Ensure a single firewall configuration utility is in useCIS Ubuntu Linux 20.04 LTS v3.0.0 L1 ServerUnix

SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION

4.3.1 Ensure nftables is installedCIS Ubuntu Linux 20.04 LTS v3.0.0 L1 ServerUnix

SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION

5.1.4 Ensure SSH Protocol is set to 2CIS Google Container-Optimized OS v1.2.0 L1 ServerUnix

ACCESS CONTROL, CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION, MAINTENANCE, SYSTEM AND COMMUNICATIONS PROTECTION

5.2.2 Ensure SSH Protocol is set to 2CIS SUSE Linux Enterprise Server 11 L1 v2.1.1Unix

CONFIGURATION MANAGEMENT

5.2.4 Ensure SSH Protocol is set to 2CIS Debian 9 Workstation L1 v1.0.1Unix

SYSTEM AND COMMUNICATIONS PROTECTION

5.3.4 Ensure SSH Protocol is set to 2CIS CentOS 6 Workstation L1 v3.0.0Unix

CONFIGURATION MANAGEMENT

5.3.4 Ensure SSH Protocol is set to 2CIS Oracle Linux 6 Server L1 v2.0.0Unix

CONFIGURATION MANAGEMENT

5.3.4 Ensure SSH Protocol is set to 2CIS CentOS 6 Server L1 v3.0.0Unix

CONFIGURATION MANAGEMENT

5.3.4 Ensure SSH Protocol is set to 2CIS Oracle Linux 6 Workstation L1 v2.0.0Unix

CONFIGURATION MANAGEMENT

5.3.4 Ensure SSH Protocol is set to 2CIS Red Hat 6 Workstation L1 v3.0.0Unix

CONFIGURATION MANAGEMENT

5.3.4 Ensure SSH Protocol is set to 2CIS Ubuntu Linux 16.04 LTS Server L1 v2.0.0Unix

CONFIGURATION MANAGEMENT

5.4 Ensure that Linux kernel capabilities are restricted within containersCIS Docker v1.8.0 L1 OS LinuxUnix

CONFIGURATION MANAGEMENT

6.6.1.2 Ensure Max Login Backoff Threshold of 2CIS Juniper OS Benchmark v2.1.0 L1Juniper

ACCESS CONTROL

6.10.1.2 Ensure SSH is Restricted to Version 2CIS Juniper OS Benchmark v2.1.0 L1Juniper

IDENTIFICATION AND AUTHENTICATION

7.2 Set Strong Password Creation Policies - MINALPHA = 2CIS Solaris 11.2 L1 v1.1.0Unix

IDENTIFICATION AND AUTHENTICATION

7.2 Set Strong Password Creation Policies - MINALPHA = 2CIS Solaris 11 L1 v1.1.0Unix

IDENTIFICATION AND AUTHENTICATION

9.1.1 Enable cron Daemon - anacron run level 2CIS Debian Linux 7 L1 v1.0.0Unix

CONFIGURATION MANAGEMENT

Allow users to demote attachments to Level 2MSCT M365 Apps for enterprise 2312 v1.0.0Windows

CONFIGURATION MANAGEMENT

Allow users to demote attachments to Level 2MSCT M365 Apps for enterprise 2412 v1.0.0Windows

CONFIGURATION MANAGEMENT

Allow users to demote attachments to Level 2MSCT Office 2016 v1.0.0Windows

CONFIGURATION MANAGEMENT

AZLX-23-002065 - Amazon Linux 2023 must authenticate the remote logging server for off-loading audit logs via rsyslog.DISA Amazon Linux 2023 STIG v1r2Unix

AUDIT AND ACCOUNTABILITY

AZLX-23-002345 - Amazon Linux 2023 system commands must be owned by root.DISA Amazon Linux 2023 STIG v1r2Unix

CONFIGURATION MANAGEMENT

AZLX-23-002396 - Amazon Linux 2023 must automatically exit interactive command shell user sessions after 15 minutes of inactivity.DISA Amazon Linux 2023 STIG v1r2Unix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

PHTN-67-000048 - The Photon operating system must initiate auditing as part of the boot process.DISA STIG VMware vSphere 6.7 Photon OS v1r6Unix

AUDIT AND ACCOUNTABILITY

RHEL-07-020050 - The Red Hat Enterprise Linux operating system must prevent the installation of software, patches, service packs, device drivers, or operating system components from a repository without verification they have been digitally signed using a certificate that is issued by a Certificate Authority (CA) that is recognized and approved by the organization.DISA Red Hat Enterprise Linux 7 STIG v3r15Unix

CONFIGURATION MANAGEMENT

Word 2 and earlier binary documents and templatesMSCT Office 365 ProPlus 1908 v1.0.0Windows

SYSTEM AND INFORMATION INTEGRITY

Word 2 and earlier binary documents and templatesMicrosoft 365 Apps for Enterprise 2306 v1.0.0Windows

SYSTEM AND INFORMATION INTEGRITY

Word 2 and earlier binary documents and templatesMSCT M365 Apps for enterprise 2412 v1.0.0Windows

SYSTEM AND INFORMATION INTEGRITY