Item Search

NameAudit NamePluginCategory
2.1 Ensure the file permissions mask is correctCIS PostgreSQL 10 OS v1.0.0Unix

ACCESS CONTROL

2.1 Ensure the file permissions mask is correctCIS PostgreSQL 13 OS v1.2.0Unix

ACCESS CONTROL, MEDIA PROTECTION

2.2 Ensure the PostgreSQL pg_wheel group membership is correct - /etc/groupCIS PostgreSQL 11 OS v1.0.0Unix

ACCESS CONTROL

2.2 Ensure the PostgreSQL pg_wheel group membership is correct - /etc/passwdCIS PostgreSQL 10 OS v1.0.0Unix

ACCESS CONTROL

3.1.3 Ensure the logging collector is enabledCIS PostgreSQL 17 v1.0.0 L1 PostgreSQLPostgreSQLDB

AUDIT AND ACCOUNTABILITY

5.6 Ensure Password Complexity is configuredCIS PostgreSQL 17 v1.0.0 L1 PostgreSQLPostgreSQLDB

IDENTIFICATION AND AUTHENTICATION

6.7 Ensure FIPS 140-2 OpenSSL Cryptography Is UsedCIS PostgreSQL 15 OS v1.1.0Unix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

6.7 Ensure FIPS 140-2 OpenSSL Cryptography Is Used - openssl versionCIS PostgreSQL 12 OS v1.1.0Unix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

6.31 Don't use the default VPCCIS Amazon Web Services Three-tier Web Architecture L2 1.0.0amazon_aws
7.3 Ensure WAL archiving is configured and functional - archive_commandCIS PostgreSQL 10 OS v1.0.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION

8.2 Ensure the backup and restore tool, 'pgBackRest', is installed and configured - pgBackRest, is installed and configuredCIS PostgreSQL 12 OS v1.1.0Unix

CONTINGENCY PLANNING

9.6 Ensure Signing Keys are Scheduled to be Replaced Periodically - KSKCIS BIND DNS v1.0.0 L2 Authoritative Name ServerUnix

SYSTEM AND COMMUNICATIONS PROTECTION

Ensure 'aaa local authentication max failed attempts' is set to your organization's poicyTenable Cisco Firepower Threat Defense Best Practices AuditCisco_Firepower

ACCESS CONTROL

Ensure 'logging buffered severity ' is greater than or equal to '3'Tenable Cisco Firepower Threat Defense Best Practices AuditCisco_Firepower

AUDIT AND ACCOUNTABILITY

Ensure 'logging trap' is enabledTenable Cisco Firepower Threat Defense Best Practices AuditCisco_Firepower

AUDIT AND ACCOUNTABILITY

Ensure 'logging with timestamps' is enabledTenable Cisco Firepower Threat Defense Best Practices AuditCisco_Firepower

AUDIT AND ACCOUNTABILITY

Ensure 'noproxyarp' is enabled for untrusted interfacesTenable Cisco Firepower Threat Defense Best Practices AuditCisco_Firepower

SYSTEM AND COMMUNICATIONS PROTECTION

Ensure 'SNMP traps' is enabled - coldstartTenable Cisco Firepower Threat Defense Best Practices AuditCisco_Firepower

AUDIT AND ACCOUNTABILITY

Ensure 'SNMP traps' is enabled - linkdownTenable Cisco Firepower Threat Defense Best Practices AuditCisco_Firepower

AUDIT AND ACCOUNTABILITY

Ensure 'SNMP traps' is enabled - linkupTenable Cisco Firepower Threat Defense Best Practices AuditCisco_Firepower

AUDIT AND ACCOUNTABILITY

Ensure DHCP services are disabled for untrusted interfaces - dhcprelayTenable Cisco Firepower Threat Defense Best Practices AuditCisco_Firepower

CONFIGURATION MANAGEMENT

Ensure DNS services are configured correctly - domain-lookupTenable Cisco Firepower Threat Defense Best Practices AuditCisco_Firepower

CONFIGURATION MANAGEMENT

Ensure DNS services are configured correctly - name-serverTenable Cisco Firepower Threat Defense Best Practices AuditCisco_Firepower

SYSTEM AND COMMUNICATIONS PROTECTION

Ensure ICMP is restricted for untrusted interfacesTenable Cisco Firepower Threat Defense Best Practices AuditCisco_Firepower

SYSTEM AND COMMUNICATIONS PROTECTION

Ensure non-default application inspection is configured correctlyTenable Cisco Firepower Threat Defense Best Practices AuditCisco_Firepower

SYSTEM AND INFORMATION INTEGRITY

Ensure timezone is properly configuredTenable Cisco Firepower Threat Defense Best Practices AuditCisco_Firepower

CONFIGURATION MANAGEMENT

EX16-ED-000550 - Exchange must have antispam filtering configured.DISA Microsoft Exchange 2016 Edge Transport Server STIG v2r6Windows

SYSTEM AND INFORMATION INTEGRITY

EX16-ED-000760 - The application must be configured to block and quarantine malicious code upon detection, then send an immediate alert to appropriate individuals.DISA Microsoft Exchange 2016 Edge Transport Server STIG v2r6Windows

SYSTEM AND INFORMATION INTEGRITY

iOS Compliance Policy - Minimum password lengthTenable Best Practices for Microsoft Intune iOS v1.0microsoft_azure

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

iOS Compliance Policy - Number of non-alphanumeric characters in passwordTenable Best Practices for Microsoft Intune iOS v1.0microsoft_azure

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

iOS Device Management - Explicit iTunes music, podcast, or news contentTenable Best Practices for Microsoft Intune iOS v1.0microsoft_azure

ACCESS CONTROL, CONFIGURATION MANAGEMENT

iOS Device Management - Join Wi-Fi networks only using configuration profilesTenable Best Practices for Microsoft Intune iOS v1.0microsoft_azure

ACCESS CONTROL

iOS Device Management - Maximum minutes of inactivity until screen locksTenable Best Practices for Microsoft Intune iOS v1.0microsoft_azure

ACCESS CONTROL

iOS Device Management - Personal HotspotTenable Best Practices for Microsoft Intune iOS v1.0microsoft_azure

ACCESS CONTROL, CONFIGURATION MANAGEMENT

iOS Device Management - Safari Pop-upsTenable Best Practices for Microsoft Intune iOS v1.0microsoft_azure

ACCESS CONTROL, CONFIGURATION MANAGEMENT

iOS Device Management - Siri DisabledTenable Best Practices for Microsoft Intune iOS v1.0microsoft_azure

CONFIGURATION MANAGEMENT

iOS Device Management - Treat AirDrop as an unmanaged destinationTenable Best Practices for Microsoft Intune iOS v1.0microsoft_azure

ACCESS CONTROL

JBOS-AS-000045 - Silent Authentication must be removed from the Default Application Security Realm.DISA JBoss EAP 6.3 STIG v2r6Unix

ACCESS CONTROL

macOS Compliance Policy - Require system integrity protectionTenable Best Practices for Microsoft Intune macOS v1.0microsoft_azure

ACCESS CONTROL

macOS Device Management - Block simple passwordsTenable Best Practices for Microsoft Intune macOS v1.0microsoft_azure

ACCESS CONTROL, CONFIGURATION MANAGEMENT

macOS Device Management - Encryption of data storage on deviceTenable Best Practices for Microsoft Intune macOS v1.0microsoft_azure

ACCESS CONTROL

macOS Device Management - Minimum password lengthTenable Best Practices for Microsoft Intune macOS v1.0microsoft_azure

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

SQL2-00-001600 - SQL Server must ensure that remote sessions that access an organization-defined list of security functions and security-relevant information are audited - 'Event ID 14'DISA STIG SQL Server 2012 DB Instance Security v1r20MS_SQLDB

ACCESS CONTROL

SQL2-00-001600 - SQL Server must ensure that remote sessions that access an organization-defined list of security functions and security-relevant information are audited - 'Event ID 15'DISA STIG SQL Server 2012 DB Instance Security v1r20MS_SQLDB

ACCESS CONTROL

SQL2-00-001600 - SQL Server must ensure that remote sessions that access an organization-defined list of security functions and security-relevant information are audited - 'Event ID 20'DISA STIG SQL Server 2012 DB Instance Security v1r20MS_SQLDB

ACCESS CONTROL

SQL2-00-001600 - SQL Server must ensure that remote sessions that access an organization-defined list of security functions and security-relevant information are audited - 'Event ID 109'DISA STIG SQL Server 2012 DB Instance Security v1r20MS_SQLDB

ACCESS CONTROL

SQL2-00-001600 - SQL Server must ensure that remote sessions that access an organization-defined list of security functions and security-relevant information are audited - 'Event ID 110'DISA STIG SQL Server 2012 DB Instance Security v1r20MS_SQLDB

ACCESS CONTROL

SQL2-00-001600 - SQL Server must ensure that remote sessions that access an organization-defined list of security functions and security-relevant information are audited - 'Event ID 118'DISA STIG SQL Server 2012 DB Instance Security v1r20MS_SQLDB

ACCESS CONTROL

SQL2-00-001600 - SQL Server must ensure that remote sessions that access an organization-defined list of security functions and security-relevant information are audited - 'Event ID 129'DISA STIG SQL Server 2012 DB Instance Security v1r20MS_SQLDB

ACCESS CONTROL

SQL2-00-001600 - SQL Server must ensure that remote sessions that access an organization-defined list of security functions and security-relevant information are audited - 'Event ID 132'DISA STIG SQL Server 2012 DB Instance Security v1r20MS_SQLDB

ACCESS CONTROL