Item Search

NameAudit NamePluginCategory
1.8.4 Ensure XDCMP is not enabledCIS Red Hat Enterprise Linux 7 STIG v2.0.0 L1 WorkstationUnix

CONFIGURATION MANAGEMENT

1.8.10 Ensure XDCMP is not enabledCIS Debian 10 Workstation L1 v2.0.0Unix

CONFIGURATION MANAGEMENT

1.9 Ensure Web Tier ELB have SSL/TLS Certificate attachedCIS Amazon Web Services Three-tier Web Architecture L1 1.0.0amazon_aws

SYSTEM AND COMMUNICATIONS PROTECTION

2.2.2 Ensure time set is within appropriate limitsCIS Apple OSX 10.10 Yosemite L1 v1.2.0Unix
2.3.3 Audit Lock Screen and Start Screen Saver ToolsCIS Apple macOS 10.14 v2.0.0 L1Unix

ACCESS CONTROL

2.5.14.5 Ensure 'Allow Active X One Off Forms' is set to 'Enabled: Load only Outlook Controls'CIS Microsoft Office Enterprise v1.2.0 L1Windows

CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

4.4 Ensure excessive function privileges are revokedCIS PostgreSQL 9.5 DB v1.1.0PostgreSQLDB

ACCESS CONTROL

5.3.3 Ensure password reuse is limitedCIS Debian 9 Server L1 v1.0.1Unix

ACCESS CONTROL

5.3.3 Ensure password reuse is limitedCIS Ubuntu Linux 18.04 LXD Container L1 v1.0.0Unix

ACCESS CONTROL

5.3.3 Ensure password reuse is limitedCIS Debian 8 Workstation L1 v2.0.2Unix

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

5.3.3 Ensure password reuse is limitedCIS Debian 9 Workstation L1 v1.0.1Unix

ACCESS CONTROL

5.3.3 Ensure password reuse is limitedCIS Distribution Independent Linux Server L1 v2.0.0Unix

ACCESS CONTROL

5.3.3 Ensure password reuse is limitedCIS SUSE Linux Enterprise Server 11 L1 v2.1.1Unix

IDENTIFICATION AND AUTHENTICATION

5.3.3.1.1 Ensure password failed attempts lockout is configuredCIS Ubuntu Linux 20.04 LTS v3.0.0 L1 WorkstationUnix

ACCESS CONTROL

6.1.1 Audit system file permissionsCIS Distribution Independent Linux Server L2 v2.0.0Unix

ACCESS CONTROL

6.3.2 Set Lockout for Failed Password Attempts - auth required pam_tally2.so deny=5 onerr=failCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

ACCESS CONTROL

6.11 Ensure all HTTP Header Logging options are enabledCIS Palo Alto Firewall 10 v1.2.0 L1Palo_Alto

AUDIT AND ACCOUNTABILITY, SYSTEM AND COMMUNICATIONS PROTECTION

6.11 Ensure all HTTP Header Logging options are enabledCIS Palo Alto Firewall 11 v1.1.0 L1Palo_Alto

AUDIT AND ACCOUNTABILITY, SYSTEM AND COMMUNICATIONS PROTECTION

6.12 Ensure all HTTP Header Logging options are enabled - Log Container PageCIS Palo Alto Firewall 9 v1.1.0 L1Palo_Alto

AUDIT AND ACCOUNTABILITY, SYSTEM AND COMMUNICATIONS PROTECTION

6.12 Ensure all HTTP Header Logging options are enabled - RefererCIS Palo Alto Firewall 9 v1.1.0 L1Palo_Alto

AUDIT AND ACCOUNTABILITY, SYSTEM AND COMMUNICATIONS PROTECTION

6.12 Ensure all HTTP Header Logging options are enabled - User-AgentCIS Palo Alto Firewall 9 v1.1.0 L1Palo_Alto

AUDIT AND ACCOUNTABILITY, SYSTEM AND COMMUNICATIONS PROTECTION

7.7 App Store Automatically download apps purchased on other Macs ConsiderationsCIS Apple OSX 10.9 L2 v1.3.0Unix
7.7 App Store Automatically download apps purchased on other Macs ConsiderationsCIS Apple OSX 10.11 El Capitan L2 v1.1.0Unix
9.5 Response Rate Limiting and DDOS MitigationCIS BIND DNS v1.0.0 L1 Authoritative Name ServerUnix

SYSTEM AND INFORMATION INTEGRITY

BIND-9X-000001 - A BIND 9.x server implementation must be running in a chroot(ed) directory structure.DISA BIND 9.x STIG v2r3Unix

SYSTEM AND COMMUNICATIONS PROTECTION

BIND-9X-001002 - The platform on which the name server software is hosted must only run processes and services needed to support the BIND 9.x implementation.DISA BIND 9.x STIG v2r3Unix

CONFIGURATION MANAGEMENT

BIND-9X-001600 - A BIND 9.x server validity period for the RRSIGs covering a zones DNSKEY RRSet must be no less than two days and no more than one week.DISA BIND 9.x STIG v2r3Unix

CONFIGURATION MANAGEMENT

CISC-RT-000260 - The Cisco perimeter router must be configured to only allow incoming communications from authorized sources to be routed to authorized destinations.DISA Cisco IOS XE Router RTR STIG v3r3Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

CISC-RT-000270 - The Cisco perimeter router must be configured to block inbound packets with source Bogon IP address prefixes.DISA Cisco IOS XE Router RTR STIG v3r3Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

CISC-RT-000480 - The Cisco BGP switch must be configured to use a unique key for each autonomous system (AS) that it peers with.DISA Cisco NX OS Switch RTR STIG v3r3Cisco

ACCESS CONTROL, CONFIGURATION MANAGEMENT

DISA_MongoDB_Enterprise_Advanced_7.x_STIG_v1r1_Unix.audit from DISA MongoDB Enterprise Advanced 7.x STIG v1r1DISA MongoDB Enterprise Advanced 7.x STIG v1r1Unix
DISA_STIG_AIX_7.x_v3r1.audit from DISA IBM AIX 7.x v3r1 STIGDISA STIG AIX 7.x v3r1Unix
DISA_STIG_Apple_OS_X_10.14_v2r6.audit from DISA Apple OS X 10.14 (Mojave) v2r6 STIGDISA STIG Apple Mac OSX 10.14 v2r6Unix
DTAVSEL-019 - The McAfee VirusScan Enterprise for Linux 1.9.x/2.0.x On-Access scanner must be enabled to scan mounted volumes when mounted volumes point to a network server without an anti-virus solution installed.McAfee Virus Scan Enterprise for Linux 1.9x/2.0x Local Client v1r6Unix

SYSTEM AND INFORMATION INTEGRITY

DTAVSEL-019 - The McAfee VirusScan Enterprise for Linux 1.9.x/2.0.x On-Access scanner must be enabled to scan mounted volumes when mounted volumes point to a network server without an anti-virus solution installed.McAfee Virus Scan Enterprise for Linux 1.9x/2.0x Managed Client v1r5Unix

SYSTEM AND INFORMATION INTEGRITY

DTAVSEL-111 - The McAfee VirusScan Enterprise for Linux 1.9.x/2.0.x On-Demand scanner must be configured to Move infected files to the quarantine directory if first action fails when programs and jokes are found.McAfee Virus Scan Enterprise for Linux 1.9x/2.0x Managed Client v1r5Unix

SYSTEM AND INFORMATION INTEGRITY

ESXI-67-000032 - The ESXi host must prohibit the reuse of passwords within five iterations.DISA STIG VMware vSphere 6.7 ESXi v1r3VMware

IDENTIFICATION AND AUTHENTICATION

GEN000700 - User passwords must be changed at least every 60 days.DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

IDENTIFICATION AND AUTHENTICATION

GEN007960 - The ldd command must be disabled unless it protects against the execution of untrusted files - ldd command must be disabled unless it protects against the execution of untrusted files.DISA STIG for Oracle Linux 5 v2r1Unix

CONFIGURATION MANAGEMENT

Lockout for failed password attempts - 'auth required pam_faillock.so preauth audit silent deny=5 unlock_time=900'Tenable Cisco Firepower Management Center OS Best Practices AuditUnix

ACCESS CONTROL

MD3X-00-000380 - MongoDB must use NIST FIPS 140-2-validated cryptographic modules for cryptographic operations.DISA STIG MongoDB Enterprise Advanced 3.x v2r3 OSUnix

IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

OH12-1X-000025 - OHS must have a SSL log format defined to allow generated information to be used by external applications or entities to monitor and control remote access in accordance with the categorization of data hosted by the web server.DISA STIG Oracle HTTP Server 12.1.3 v2r3Unix

ACCESS CONTROL

OH12-1X-000052 - OHS must have a SSL log format defined for log records generated to capture sufficient information to establish what type of events occurred.DISA STIG Oracle HTTP Server 12.1.3 v2r3Unix

AUDIT AND ACCOUNTABILITY

OH12-1X-000055 - OHS must have a SSL log format defined for log records generated to capture sufficient information to establish when an event occurred.DISA STIG Oracle HTTP Server 12.1.3 v2r3Unix

AUDIT AND ACCOUNTABILITY

OH12-1X-000058 - OHS must have a SSL log format defined for log records that allow the establishment of where within OHS the events occurred.DISA STIG Oracle HTTP Server 12.1.3 v2r3Unix

AUDIT AND ACCOUNTABILITY

OH12-1X-000067 - OHS must have a SSL log format defined to produce log records that contain sufficient information to establish the outcome (success or failure) of events.DISA STIG Oracle HTTP Server 12.1.3 v2r3Unix

AUDIT AND ACCOUNTABILITY

OH12-1X-000070 - OHS must have a SSL log format defined to produce log records containing sufficient information to establish the identity of any user/subject or process associated with an event.DISA STIG Oracle HTTP Server 12.1.3 v2r3Unix

AUDIT AND ACCOUNTABILITY

OL6-00-000274 - The system must prohibit the reuse of passwords within five iterations - system-authDISA STIG Oracle Linux 6 v2r7Unix

IDENTIFICATION AND AUTHENTICATION

OL09-00-001100 - OL 9 user account passwords must have a 60-day maximum password lifetime restriction.DISA Oracle Linux 9 STIG v1r2Unix

IDENTIFICATION AND AUTHENTICATION

RHEL-09-411015 - RHEL 9 user account passwords must have a 60-day maximum password lifetime restriction.DISA Red Hat Enterprise Linux 9 STIG v2r4Unix

IDENTIFICATION AND AUTHENTICATION