Item Search

NameAudit NamePluginCategory
1.2 Do Not Install a Multi-Use System - chkconfigCIS BIND DNS v3.0.1 Caching Only Name ServerUnix

CONFIGURATION MANAGEMENT

1.2 Do Not Install a Multi-Use System - chkconfigCIS BIND DNS v1.0.0 L1 Authoritative Name ServerUnix

CONFIGURATION MANAGEMENT

1.2 Do Not Install a Multi-Use System - systemctlCIS BIND DNS v3.0.1 Authoritative Name ServerUnix

CONFIGURATION MANAGEMENT

1.5 Installing ISC BIND 9 - bind9 installationCIS BIND DNS v1.0.0 L1 Authoritative Name ServerUnix

CONFIGURATION MANAGEMENT

1.5 Installing ISC BIND 9 - named locationCIS BIND DNS v1.0.0 L1 Authoritative Name ServerUnix

CONFIGURATION MANAGEMENT

1.5 Installing ISC BIND 9 - named locationCIS BIND DNS v3.0.1 Authoritative Name ServerUnix

CONFIGURATION MANAGEMENT

1.5 Installing ISC BIND 9 - named locationCIS BIND DNS v3.0.1 Caching Only Name ServerUnix

CONFIGURATION MANAGEMENT

1.6.1 Ensure system wide crypto policy is not set to legacyCIS Red Hat Enterprise Linux 10 v1.0.1 L1 WorkstationUnix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

1.6.1 Ensure system wide crypto policy is not set to legacyCIS Rocky Linux 10 v1.0.0 L1 ServerUnix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

1.6.1 Ensure system wide crypto policy is not set to legacyCIS Oracle Linux 10 v1.0.0 L1 ServerUnix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

1.6.1 Ensure system wide crypto policy is not set to legacyCIS AlmaLinux OS 10 v1.0.0 L1 WorkstationUnix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

1.8.15 Ensure GNOME Lock Delay is configuredCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIGUnix

ACCESS CONTROL

2.1 Run BIND as a non-root User - process -u namedCIS BIND DNS v1.0.0 L1 Authoritative Name ServerUnix

ACCESS CONTROL

2.1 Run BIND as a non-root User - process -u namedCIS BIND DNS v1.0.0 L1 Caching Only Name ServerUnix

ACCESS CONTROL

2.1 Run BIND as a non-root User - process -u namedCIS BIND DNS v3.0.1 Authoritative Name ServerUnix

ACCESS CONTROL

2.1 Run BIND as a non-root User - process -u namedCIS BIND DNS v3.0.1 Caching Only Name ServerUnix

ACCESS CONTROL

2.1 Run BIND as a non-root User - UIDCIS BIND DNS v1.0.0 L1 Caching Only Name ServerUnix

ACCESS CONTROL

2.1 Run BIND as a non-root User - UIDCIS BIND DNS v3.0.1 Caching Only Name ServerUnix

ACCESS CONTROL

2.1 Run BIND as a non-root User - UIDCIS BIND DNS v3.0.1 Authoritative Name ServerUnix

ACCESS CONTROL

3.6 Configure Network Time Protocol (NTP) - OPTIONS=-u ntp:ntp -p /var/run/ntpd.pidCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

AUDIT AND ACCOUNTABILITY

3.6 Configure Network Time Protocol (NTP) - restrict -6 default kod nomodify nopeer notrap noqueryCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

AUDIT AND ACCOUNTABILITY

3.6 Configure Network Time Protocol (NTP) - restrict default kod nomodify nopeer notrap noqueryCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

AUDIT AND ACCOUNTABILITY

3.6 Configure Network Time Protocol (NTP) - server aaa.bbb.ccc.dddCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

AUDIT AND ACCOUNTABILITY

5.3.3.6.3 Ensure the certificate of the user or group is mapped to the corresponding user or group in the "sssd.conf" fileCIS Red Hat Enterprise Linux 8 STIG v2.0.0 STIGUnix

IDENTIFICATION AND AUTHENTICATION

5.4.6 Ensure no accounts are configured with blank or null passwords - password-authCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIGUnix

CONFIGURATION MANAGEMENT

5.4.6 Ensure no accounts are configured with blank or null passwords - system-authCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIGUnix

CONFIGURATION MANAGEMENT

5.4.11 Ensure password prohibited reuse is at a minimum 5CIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIGUnix

IDENTIFICATION AND AUTHENTICATION

CIS_Red_Hat_EL7_STIG_v2.0.0_L1_Server.audit from CIS Red Hat Enterprise Linux 7 STIG v2.0.0CIS Red Hat Enterprise Linux 7 STIG v2.0.0 L1 ServerUnix
CIS_Red_Hat_EL7_STIG_v2.0.0_L1_Workstation.audit from CIS Red Hat Enterprise Linux 7 STIG v2.0.0CIS Red Hat Enterprise Linux 7 STIG v2.0.0 L1 WorkstationUnix
CIS_Red_Hat_EL7_STIG_v2.0.0_L2_Server.audit from CIS Red Hat Enterprise Linux 7 STIG v2.0.0CIS Red Hat Enterprise Linux 7 STIG v2.0.0 L2 ServerUnix
CIS_Red_Hat_EL7_STIG_v2.0.0_L2_Workstation.audit from CIS Red Hat Enterprise Linux 7 STIG v2.0.0CIS Red Hat Enterprise Linux 7 STIG v2.0.0 L2 WorkstationUnix
CIS_Red_Hat_EL7_STIG_v2.0.0_STIG.audit from CIS Red Hat Enterprise Linux 7 STIG v2.0.0CIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIGUnix
CIS_Red_Hat_Enterprise_Linux_7_v4.0.0_L1_Server.audit from CIS Red Hat Enterprise Linux 7 Benchmark v4.0.0CIS Red Hat Enterprise Linux 7 v4.0.0 L1 ServerUnix
CIS_Red_Hat_Enterprise_Linux_7_v4.0.0_L1_Workstation.audit from CIS Red Hat Enterprise Linux 7 Benchmark v4.0.0CIS Red Hat Enterprise Linux 7 v4.0.0 L1 WorkstationUnix
CIS_Red_Hat_Enterprise_Linux_7_v4.0.0_L2_Server.audit from CIS Red Hat Enterprise Linux 7 Benchmark v4.0.0CIS Red Hat Enterprise Linux 7 v4.0.0 L2 ServerUnix
CIS_Red_Hat_Enterprise_Linux_7_v4.0.0_L2_Workstation.audit from CIS Red Hat Enterprise Linux 7 Benchmark v4.0.0CIS Red Hat Enterprise Linux 7 v4.0.0 L2 WorkstationUnix
CIS_Red_Hat_Enterprise_Linux_8_STIG_v2.0.0_L1_Server.audit from CIS Red Hat Enterprise Linux 8 STIG v2.0.0CIS Red Hat Enterprise Linux 8 STIG v2.0.0 L1 ServerUnix
CIS_Red_Hat_Enterprise_Linux_8_STIG_v2.0.0_L1_Workstation.audit from CIS Red Hat Enterprise Linux 8 STIG v2.0.0CIS Red Hat Enterprise Linux 8 STIG v2.0.0 L1 WorkstationUnix
CIS_Red_Hat_Enterprise_Linux_8_STIG_v2.0.0_L2_Server.audit from CIS Red Hat Enterprise Linux 8 STIG v2.0.0CIS Red Hat Enterprise Linux 8 STIG v2.0.0 L2 ServerUnix
CIS_Red_Hat_Enterprise_Linux_8_STIG_v2.0.0_L2_Workstation.audit from CIS Red Hat Enterprise Linux 8 STIG v2.0.0CIS Red Hat Enterprise Linux 8 STIG v2.0.0 L2 WorkstationUnix
CIS_Red_Hat_Enterprise_Linux_8_STIG_v2.0.0_STIG.audit from CIS Red Hat Enterprise Linux 8 STIG v2.0.0CIS Red Hat Enterprise Linux 8 STIG v2.0.0 STIGUnix
DKER-EE-002780 - PIDs cgroup limits must be used in Docker Enterprise.DISA STIG Docker Enterprise 2.x Linux/Unix v2r2Unix

SYSTEM AND COMMUNICATIONS PROTECTION

MD7X-00-012500 MongoDB must be configured in accordance with the security configuration settings based on DOD security configuration and implementation guidance, including STIGs, NSA configuration guides, CTOs, DTMs, and IAVMs.DISA MongoDB Enterprise Advanced 7.x STIG v1r1Unix

CONFIGURATION MANAGEMENT

RHEL-07-020270 - The Red Hat Enterprise Linux operating system must not have unnecessary accounts.DISA Red Hat Enterprise Linux 7 STIG v3r15Unix

CONFIGURATION MANAGEMENT

RHEL-07-021100 - The Red Hat Enterprise Linux operating system must have cron logging implemented.DISA Red Hat Enterprise Linux 7 STIG v3r15Unix

CONFIGURATION MANAGEMENT

RHEL-07-040540 - The Red Hat Enterprise Linux operating system must not contain .shosts files.DISA Red Hat Enterprise Linux 7 STIG v3r15Unix

CONFIGURATION MANAGEMENT

RHEL-07-040550 - The Red Hat Enterprise Linux operating system must not contain shosts.equiv files.DISA Red Hat Enterprise Linux 7 STIG v3r15Unix

CONFIGURATION MANAGEMENT

RHEL-10-700550 - RHEL 10 must be configured so that the Secure Shell (SSH) daemon disables remote X connections for interactive users.DISA Red Hat Enterprise Linux 10 STIG v1r1Unix

SYSTEM AND INFORMATION INTEGRITY

RHEL-10-700580 - RHEL 10 must be configured so that the Secure Shell (SSH) daemon prevents remote hosts from connecting to the proxy display.DISA Red Hat Enterprise Linux 10 STIG v1r1Unix

SYSTEM AND INFORMATION INTEGRITY

RHEL-10-700620 - RHEL 10 must not permit direct logins to the root account using remote access via Secure Shell (SSH).DISA Red Hat Enterprise Linux 10 STIG v1r1Unix

IDENTIFICATION AND AUTHENTICATION