Item Search

NameAudit NamePluginCategory
2.2.6 Ensure 'SQLNET.ENCRYPTION_CLIENT Is Set To 'REQUIRED'CIS Oracle Database 23ai v1.0.0 L1 RDBMS On Linux Host OSUnix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

2.2.6 Ensure 'SQLNET.ENCRYPTION_CLIENT Is Set To 'REQUIRED'CIS Oracle Database 23ai v1.0.0 L1 RDBMS On Windows Server Host OSWindows

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

3.3 Ensure that MongoDB is run using a non-privileged, dedicated service accountCIS MongoDB 4 L1 OS Linux v1.0.0Unix

ACCESS CONTROL

4.1 Ensure legacy TLS protocols are disabledCIS MongoDB 4 L2 OS Linux v1.0.0Unix

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

4.1 Ensure legacy TLS protocols are disabledCIS MongoDB 5 L2 OS Linux v1.2.0Unix

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

4.2 Ensure Weak Protocols are DisabledCIS MongoDB 5 L1 OS Linux v1.2.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION

4.2 Ensure Weak Protocols are DisabledCIS MongoDB 4 L1 OS Linux v1.0.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION

4.4 Ensure Federal Information Processing Standard (FIPS) is enabledCIS MongoDB 4 L2 OS Linux v1.0.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION

4.4 Ensure Federal Information Processing Standard (FIPS) is enabledCIS MongoDB 5 L2 OS Linux v1.2.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION

4.5 Ensure Encryption of Data at Rest - enableEncryptionCIS MongoDB 4 L2 OS Linux v1.0.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION

4.5 Ensure Encryption of Data at Rest - enableEncryptionCIS MongoDB 5 L2 OS Linux v1.2.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION

4.5 Ensure Encryption of Data at Rest - encryptionKeyFileCIS MongoDB 5 L2 OS Linux v1.2.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION

5.3 Ensure that logging captures as much information as possibleCIS MongoDB 4 L2 OS Linux v1.0.0Unix

AUDIT AND ACCOUNTABILITY

5.3 Ensure that logging captures as much information as possibleCIS MongoDB 5 L2 OS Linux v1.2.0Unix

AUDIT AND ACCOUNTABILITY

5.4 Ensure that new entries are appended to the end of the log fileCIS MongoDB 4 L2 OS Linux v1.0.0Unix

AUDIT AND ACCOUNTABILITY

5.4 Ensure that new entries are appended to the end of the log fileCIS MongoDB 5 L2 OS Linux v1.2.0Unix

AUDIT AND ACCOUNTABILITY

6.1 Ensure that MongoDB uses a non-default portCIS MongoDB 4 L1 OS Linux v1.0.0Unix

SYSTEM AND INFORMATION INTEGRITY

6.1 Ensure that MongoDB uses a non-default portCIS MongoDB 5 L1 OS Linux v1.2.0Unix

SYSTEM AND INFORMATION INTEGRITY

6.2 Ensure that operating system resource limits are set for MongoDBCIS MongoDB 5 L2 OS Linux v1.2.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION

6.2 Ensure that operating system resource limits are set for MongoDBCIS MongoDB 4 L2 OS Linux v1.0.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION

6.3 Ensure that server-side scripting is disabled if not neededCIS MongoDB 4 L2 OS Linux v1.0.0Unix

SYSTEM AND INFORMATION INTEGRITY

6.3 Ensure that server-side scripting is disabled if not neededCIS MongoDB 5 L2 OS Linux v1.2.0Unix

SYSTEM AND INFORMATION INTEGRITY

7.1 Ensure appropriate key file permissions are set - CAFileCIS MongoDB 5 L1 OS Linux v1.2.0Unix

IDENTIFICATION AND AUTHENTICATION

7.1 Ensure appropriate key file permissions are set - keyFileCIS MongoDB 5 L1 OS Linux v1.2.0Unix

IDENTIFICATION AND AUTHENTICATION

7.1 Ensure appropriate key file permissions are set - PEMKeyFileCIS MongoDB 5 L1 OS Linux v1.2.0Unix

IDENTIFICATION AND AUTHENTICATION

9.3 Check That Defined Home Directories ExistCIS Oracle Solaris 11.4 L1 v1.1.0Unix

ACCESS CONTROL, MEDIA PROTECTION

9.7 Check Permissions on User Home DirectoriesCIS Solaris 11.1 L1 v1.0.0Unix

CONFIGURATION MANAGEMENT

9.8 Check Permissions on User '.' (Hidden) FilesCIS Solaris 11.1 L1 v1.0.0Unix

IDENTIFICATION AND AUTHENTICATION

9.9 Check Permissions on User Home DirectoriesCIS Oracle Solaris 11.4 L1 v1.1.0Unix

ACCESS CONTROL, MEDIA PROTECTION

9.10 Check for Presence of User .rhosts FilesCIS Solaris 11.1 L1 v1.0.0Unix

CONFIGURATION MANAGEMENT

9.11 Check Groups in passwd(4)CIS Solaris 11.1 L1 v1.0.0Unix

ACCESS CONTROL

9.11 Check Permissions on User .netrc FilesCIS Oracle Solaris 11.4 L1 v1.1.0Unix

ACCESS CONTROL, MEDIA PROTECTION

9.14 Check User Home Directory OwnershipCIS Solaris 11.1 L1 v1.0.0Unix

CONFIGURATION MANAGEMENT

9.16 Check for Duplicate UIDsCIS Oracle Solaris 11.4 L1 v1.1.0Unix

IDENTIFICATION AND AUTHENTICATION

9.22 Find World Writable FilesCIS Solaris 11.1 L1 v1.0.0Unix

ACCESS CONTROL

ALMA-09-018720 - The firewalld service on AlmaLinux OS 9 must be active.DISA CloudLinux AlmaLinux OS 9 STIG v1r2Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

ALMA-09-031700 - AlmaLinux OS 9 must have the firewalld package installed.DISA CloudLinux AlmaLinux OS 9 STIG v1r2Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

Buffer overflow protection should be configured 'LimitRequestFieldsize'TNS IBM HTTP Server Best PracticeUnix

SYSTEM AND INFORMATION INTEGRITY

CGI-BIN directory should be disabled. 'LoadModule env_module'TNS IBM HTTP Server Best PracticeUnix

CONFIGURATION MANAGEMENT

EX16-ED-000320 - Exchange Message size restrictions must be controlled on Receive connectors.DISA Microsoft Exchange 2016 Edge Transport Server STIG v2r5Windows

SYSTEM AND COMMUNICATIONS PROTECTION

EX19-ED-000120 - Exchange Message size restrictions must be controlled on receive connectors.DISA Microsoft Exchange 2019 Edge Server STIG v2r2Windows

SYSTEM AND COMMUNICATIONS PROTECTION

HTTP TRACE method should be disabled. 'RewriteLogLevel'TNS IBM HTTP Server Best PracticeUnix

CONFIGURATION MANAGEMENT

Logging Directives should be restricted to authorized users. - 'ErrorLog logs/error_log'TNS IBM HTTP Server Best PracticeUnix

AUDIT AND ACCOUNTABILITY

MaxSpareServers parameter value should be appropriately configured.TNS IBM HTTP Server Best PracticeUnix

SYSTEM AND COMMUNICATIONS PROTECTION

Non-Essential modules should be disabled. 'mod_dav'TNS IBM HTTP Server Best PracticeWindows

CONFIGURATION MANAGEMENT

Non-Essential modules should be disabled. 'mod_status'TNS IBM HTTP Server Best PracticeWindows

CONFIGURATION MANAGEMENT

RHEL-09-251010 - RHEL 9 must have the firewalld package installed.DISA Red Hat Enterprise Linux 9 STIG v2r4Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

RHEL-09-251015 - The firewalld service on RHEL 9 must be active.DISA Red Hat Enterprise Linux 9 STIG v2r4Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

User IDs which disclose the privileges associated with it, should not be created.TNS IBM HTTP Server Best PracticeWindows

ACCESS CONTROL

User IDs which disclose the privileges associated with it, should not be created. 'lock'TNS IBM HTTP Server Best PracticeUnix

ACCESS CONTROL