Item Search

NameAudit NamePluginCategory
1.1.17 Ensure that the --audit-log-maxbackup argument is set to 10 or as appropriateCIS Kubernetes 1.13 Benchmark v1.4.1 L1Unix

AUDIT AND ACCOUNTABILITY

1.2.4.2.1.18 Set 'Allow access to BitLocker-protected fixed data drives from earlier versions of Windows' to 'Disabled'CIS Windows 8 L1 v1.0.0Windows

SYSTEM AND COMMUNICATIONS PROTECTION

1.2.20 Ensure that the --audit-log-maxbackup argument is set to 10 or as appropriateCIS Kubernetes v1.24 Benchmark v1.0.0 L1 MasterUnix

AUDIT AND ACCOUNTABILITY

1.2.20 Ensure that the --audit-log-maxbackup argument is set to 10 or as appropriateCIS Kubernetes v1.23 Benchmark v1.0.1 L1 MasterUnix

AUDIT AND ACCOUNTABILITY

1.2.23 Ensure that the --audit-log-maxbackup argument is set to 10 or as appropriateCIS Kubernetes v1.20 Benchmark v1.0.1 L1 MasterUnix

AUDIT AND ACCOUNTABILITY

1.18 APPL-14-000053CIS Apple macOS 14 (Sonoma) STIG v1.0.0 CAT IIUnix

SYSTEM AND COMMUNICATIONS PROTECTION

1.59 APPL-14-001150CIS Apple macOS 14 (Sonoma) STIG v1.0.0 CAT IUnix

IDENTIFICATION AND AUTHENTICATION, MAINTENANCE

2.2.17 Ensure '_trace_files_public' Is Set to 'FALSE'CIS Oracle Server 12c DB Traditional Auditing v3.0.0OracleDB

ACCESS CONTROL

2.2.17 Ensure '_trace_files_public' Is Set to 'FALSE'CIS Oracle Server 12c DB Unified Auditing v3.0.0OracleDB

ACCESS CONTROL

3.1.12 Ensure that the --audit-log-maxbackup argument is set to 10 or as appropriateCIS Kubernetes 1.8 Benchmark v1.2.0 L1Unix

AUDIT AND ACCOUNTABILITY

3.1.12 Ensure that the --audit-log-maxbackup argument is set to 10 or as appropriateCIS Kubernetes 1.7.0 Benchmark v1.1.0 L1Unix

AUDIT AND ACCOUNTABILITY

4.1.12 Set Maximum Number of Applications (MAXAPPLS)CIS IBM DB2 11 v1.2.0 Linux OS Level 1Unix

ACCESS CONTROL

4.1.12 Set Maximum Number of Applications (MAXAPPLS)CIS IBM DB2 11 v1.2.0 Windows OS Level 1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

4.8 (L1) Host must store one week of audit recordsCIS VMware ESXi 8.0 v1.2.0 L1 VMwareVMware

AUDIT AND ACCOUNTABILITY

5.3.22 Ensure SSH MaxStartups is configuredCIS Ubuntu Linux 16.04 LTS Server L1 v2.0.0Unix

CONFIGURATION MANAGEMENT

5.3.22 Ensure SSH MaxStartups is configuredCIS Ubuntu Linux 16.04 LTS Workstation L1 v2.0.0Unix

CONFIGURATION MANAGEMENT

5.3.22 Ensure SSH MaxStartups is configured - sshdCIS CentOS 6 Server L1 v3.0.0Unix

CONFIGURATION MANAGEMENT

5.3.22 Ensure SSH MaxStartups is configured - sshdCIS Oracle Linux 6 Workstation L1 v2.0.0Unix

CONFIGURATION MANAGEMENT

5.3.22 Ensure SSH MaxStartups is configured - sshd_configCIS Oracle Linux 6 Server L1 v2.0.0Unix

CONFIGURATION MANAGEMENT

5.3.22 Ensure SSH MaxStartups is configured - sshd_configCIS Red Hat 6 Server L1 v3.0.0Unix

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

5.3.22 Ensure SSH MaxStartups is configured - sshd_configCIS Oracle Linux 6 Workstation L1 v2.0.0Unix

CONFIGURATION MANAGEMENT

5.3.24 Ensure SSH MaxStartups is configuredCIS Red Hat Enterprise Linux 7 STIG v2.0.0 L1 ServerUnix

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

5.3.24 Ensure SSH MaxStartups is configuredCIS Red Hat Enterprise Linux 7 STIG v2.0.0 L1 WorkstationUnix

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

100. OpenStack Compute - Policy.json - 'compute_extension:admin_actions:migrate'TNS OpenStack Nova/Compute Security GuideUnix

ACCESS CONTROL

100. OpenStack Identity - Policy.json - 'identity:list_policies'TNS OpenStack Keystone/Identity Security GuideUnix

ACCESS CONTROL

100. OpenStack Networking - Policy.json - 'get_subnet'TNS OpenStack Neutron/Networking Security GuideUnix

ACCESS CONTROL

APPL-14-000120 - The macOS system must configure SSHD Channel Timeout to 900.DISA Apple macOS 14 Sonoma STIG v2r4Unix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

APPL-14-000130 - The macOS system must configure SSHD unused connection timeout to 900.DISA Apple macOS 14 Sonoma STIG v2r4Unix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

APPL-15-000024 - The macOS system must enforce SSH to display a policy banner.DISA Apple macOS 15 Sequoia STIG v1r7Unix

ACCESS CONTROL

APPL-15-000053 - The macOS system must set login grace time to 30.DISA Apple macOS 15 Sequoia STIG v1r7Unix

SYSTEM AND COMMUNICATIONS PROTECTION

APPL-15-000054 - The macOS system must limit SSHD to FIPS-compliant connections.DISA Apple macOS 15 Sequoia STIG v1r7Unix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, MAINTENANCE, SYSTEM AND COMMUNICATIONS PROTECTION

APPL-15-000120 - The macOS system must configure SSHD channel timeout to 900.DISA Apple macOS 15 Sequoia STIG v1r7Unix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

APPL-15-000130 - The macOS system must configure SSHD unused connection timeout to 900.DISA Apple macOS 15 Sequoia STIG v1r7Unix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

APPL-15-001100 - The macOS system must disable root login for SSH.DISA Apple macOS 15 Sequoia STIG v1r7Unix

CONFIGURATION MANAGEMENT

APPL-26-000024 - The macOS system must enforce SSH to display a policy banner.DISA Apple macOS 26 Tahoe STIG v1r2Unix

ACCESS CONTROL

APPL-26-000051 - The macOS system must configure SSHD ClientAliveInterval to 900.DISA Apple macOS 26 Tahoe STIG v1r2Unix

SYSTEM AND COMMUNICATIONS PROTECTION

APPL-26-000054 - The macOS system must limit SSHD to FIPS-compliant connections.DISA Apple macOS 26 Tahoe STIG v1r2Unix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, MAINTENANCE, SYSTEM AND COMMUNICATIONS PROTECTION

APPL-26-000120 - The macOS system must configure SSHD channel timeout to 900.DISA Apple macOS 26 Tahoe STIG v1r2Unix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

APPL-26-000130 - The macOS system must configure SSHD unused connection timeout to 900.DISA Apple macOS 26 Tahoe STIG v1r2Unix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

ARST-RT-000070 - The Arista Multicast Source Discovery Protocol (MSDP) router must be configured to filter received source-active multicast advertisements for any undesirable multicast groups and sources.DISA STIG Arista MLS EOS 4.2x Router v2r1Arista

ACCESS CONTROL

ARST-RT-000080 - The Arista Multicast Source Discovery Protocol (MSDP) router must be configured to filter source-active multicast advertisements to external MSDP peers to avoid global visibility of local-only multicast sources and groups.DISA STIG Arista MLS EOS 4.2x Router v2r1Arista

ACCESS CONTROL

ARST-RT-000080 - The Arista Multicast Source Discovery Protocol (MSDP) router must be configured to filter source-active multicast advertisements to external MSDP peers to avoid global visibility of local-only multicast sources and groups.DISA Arista MLS EOS 4.X Router STIG v2r2Arista

ACCESS CONTROL

CISC-RT-000680 - The Cisco PE router providing Virtual Private LAN Services (VPLS) must be configured to have all attachment circuits defined to the virtual forwarding instance (VFI) with the globally unique VPN ID assigned for each customer VLAN.DISA Cisco IOS XE Router RTR STIG v3r5Cisco

CONFIGURATION MANAGEMENT

CISC-RT-000680 - The Cisco PE switch providing Virtual Private LAN Services (VPLS) must be configured to have all attachment circuits defined to the virtual forwarding instance (VFI) with the globally unique VPN ID assigned for each customer VLAN.DISA Cisco IOS XE Switch RTR STIG v3r3Cisco

CONFIGURATION MANAGEMENT

CISC-RT-000710 - The Cisco PE switch must be configured to implement Internet Group Management Protocol (IGMP) or Multicast Listener Discovery (MLD) snooping for each Virtual Private LAN Services (VPLS) bridge domain.DISA Cisco NX OS Switch RTR STIG v3r3Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

CISC-RT-000720 - The Cisco PE switch must be configured to limit the number of MAC addresses it can learn for each Virtual Private LAN Services (VPLS) bridge domain.DISA Cisco NX OS Switch RTR STIG v3r3Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

CNTR-K8-003290 - The Kubernetes API Server must be set to audit log max size.DISA STIG Kubernetes v2r5Unix

CONFIGURATION MANAGEMENT

Out-of-Band Management portArubaOS Switch 16.x Hardening Guide v1.0.0ArubaOS

SYSTEM AND COMMUNICATIONS PROTECTION

PANW-NM-000144 - The Palo Alto Networks security platform must generate an audit log record when the Data Plane CPU utilization is 100%.DISA Palo Alto Networks NDM STIG v3r3Palo_Alto

CONFIGURATION MANAGEMENT

VCST-80-000126 The vCenter STS service must limit the number of times that each Transmission Control Protocol (TCP) connection is kept alive.DISA VMware vSphere 8.0 vCenter Appliance Secure Token Service (STS) STIG v2r1Unix

ACCESS CONTROL