Item Search

NameAudit NamePluginCategory
2.1 Run BIND as a non-root User - process -u namedCIS BIND DNS v1.0.0 L1 Authoritative Name ServerUnix

ACCESS CONTROL

2.1 Run BIND as a non-root User - process -u namedCIS BIND DNS v3.0.1 Caching Only Name ServerUnix

ACCESS CONTROL

2.1 Run BIND as a non-root User - process -u namedCIS BIND DNS v1.0.0 L1 Caching Only Name ServerUnix

ACCESS CONTROL

2.1 Run BIND as a non-root User - process -u namedCIS BIND DNS v3.0.1 Authoritative Name ServerUnix

ACCESS CONTROL

2.1 Run BIND as a non-root User - UIDCIS BIND DNS v1.0.0 L1 Caching Only Name ServerUnix

ACCESS CONTROL

2.1 Run BIND as a non-root User - UIDCIS BIND DNS v3.0.1 Authoritative Name ServerUnix

ACCESS CONTROL

2.1 Run BIND as a non-root User - UIDCIS BIND DNS v1.0.0 L1 Authoritative Name ServerUnix

ACCESS CONTROL

2.1 Run BIND as a non-root User - UIDCIS BIND DNS v3.0.1 Caching Only Name ServerUnix

ACCESS CONTROL

4.10.9.1.3 (BL) Ensure 'Prevent installation of devices that match any of these device IDs: Prevent installation of devices that match any of these device IDs' is set to 'PCI\CC_0C0A'CIS Microsoft Intune for Windows 10 v4.0.0 BLWindows

MEDIA PROTECTION

5.4.5 Ensure system-auth is used when changing passwordsCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIGUnix

IDENTIFICATION AND AUTHENTICATION

5.5.1.2 Ensure minimum days between password changes is configured - /etc/login.defsCIS Red Hat Enterprise Linux 7 STIG v2.0.0 L1 ServerUnix

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

5.5.1.2 Ensure minimum days between password changes is configured - /etc/login.defsCIS Red Hat Enterprise Linux 7 STIG v2.0.0 L1 WorkstationUnix

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

5.5.1.2 Ensure minimum days between password changes is configured - /etc/shadowCIS Red Hat Enterprise Linux 7 STIG v2.0.0 L1 ServerUnix

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

5.5.1.2 Ensure minimum days between password changes is configured - login.defsCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIGUnix

IDENTIFICATION AND AUTHENTICATION

5.5.1.2 Ensure minimum days between password changes is configured - password shadowCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIGUnix

IDENTIFICATION AND AUTHENTICATION

5.5.1.9 Ensure inactive password lock is 0 days - individuals, groups, roles, and devices if the password expires.CIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIGUnix

IDENTIFICATION AND AUTHENTICATION

6.7 Ensure FIPS 140-2 OpenSSL Cryptography Is Used - fips_enabledCIS PostgreSQL 11 OS v1.0.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION

6.7 Ensure FIPS 140-2 OpenSSL Cryptography Is Used - fips_enabledCIS PostgreSQL 9.5 OS v1.1.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION

6.7 Ensure FIPS 140-2 OpenSSL Cryptography Is Used - openssl versionCIS PostgreSQL 9.6 OS v1.0.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION

10.1 Ensure SELinux Is Enabled in Enforcing Mode - config fileCIS BIND DNS v1.0.0 L2 Caching Only Name ServerUnix

ACCESS CONTROL

10.1 Ensure SELinux Is Enabled in Enforcing Mode - config fileCIS BIND DNS v1.0.0 L2 Authoritative Name ServerUnix

ACCESS CONTROL

10.1 Ensure SELinux Is Enabled in Enforcing Mode - current modeCIS BIND DNS v1.0.0 L2 Authoritative Name ServerUnix

ACCESS CONTROL

10.1 Ensure SELinux Is Enabled in Enforcing Mode - current modeCIS BIND DNS v1.0.0 L2 Caching Only Name ServerUnix

ACCESS CONTROL

CD12-00-007000 - PostgreSQL, when utilizing PKI-based authentication, must validate certificates by performing RFC 5280-compliant certification path validation.DISA STIG Crunchy Data PostgreSQL OS v3r1Unix

IDENTIFICATION AND AUTHENTICATION

CIS_Red_Hat_EL5_v2.2.1_L1.audit from Red Hat Enterprise Linux 5 BenchmarkCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix
CIS_Red_Hat_EL5_v2.2.1_L2.audit from Red Hat Enterprise Linux 5 BenchmarkCIS Red Hat Enterprise Linux 5 L2 v2.2.1Unix
CIS_Red_Hat_EL7_STIG_v2.0.0_L1_Server.audit from CIS Red Hat Enterprise Linux 7 STIG v2.0.0CIS Red Hat Enterprise Linux 7 STIG v2.0.0 L1 ServerUnix
CIS_Red_Hat_EL7_STIG_v2.0.0_L1_Workstation.audit from CIS Red Hat Enterprise Linux 7 STIG v2.0.0CIS Red Hat Enterprise Linux 7 STIG v2.0.0 L1 WorkstationUnix
CIS_Red_Hat_EL7_STIG_v2.0.0_L2_Server.audit from CIS Red Hat Enterprise Linux 7 STIG v2.0.0CIS Red Hat Enterprise Linux 7 STIG v2.0.0 L2 ServerUnix
CIS_Red_Hat_EL7_STIG_v2.0.0_L2_Workstation.audit from CIS Red Hat Enterprise Linux 7 STIG v2.0.0CIS Red Hat Enterprise Linux 7 STIG v2.0.0 L2 WorkstationUnix
CIS_Red_Hat_EL7_STIG_v2.0.0_STIG.audit from CIS Red Hat Enterprise Linux 7 STIG v2.0.0CIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIGUnix
CIS_Red_Hat_Enterprise_Linux_7_v4.0.0_L1_Server.audit from CIS Red Hat Enterprise Linux 7 Benchmark v4.0.0CIS Red Hat Enterprise Linux 7 v4.0.0 L1 ServerUnix
CIS_Red_Hat_Enterprise_Linux_7_v4.0.0_L1_Workstation.audit from CIS Red Hat Enterprise Linux 7 Benchmark v4.0.0CIS Red Hat Enterprise Linux 7 v4.0.0 L1 WorkstationUnix
CIS_Red_Hat_Enterprise_Linux_7_v4.0.0_L2_Server.audit from CIS Red Hat Enterprise Linux 7 Benchmark v4.0.0CIS Red Hat Enterprise Linux 7 v4.0.0 L2 ServerUnix
CIS_Red_Hat_Enterprise_Linux_7_v4.0.0_L2_Workstation.audit from CIS Red Hat Enterprise Linux 7 Benchmark v4.0.0CIS Red Hat Enterprise Linux 7 v4.0.0 L2 WorkstationUnix
CIS_Red_Hat_Enterprise_Linux_9_v2.0.0_L1_Server.audit from CIS Red Hat Enterprise Linux 9 Benchmark v2.0.0CIS Red Hat Enterprise Linux 9 v2.0.0 L1 ServerUnix
CIS_Red_Hat_Enterprise_Linux_9_v2.0.0_L1_Workstation.audit from CIS Red Hat Enterprise Linux 9 Benchmark v2.0.0CIS Red Hat Enterprise Linux 9 v2.0.0 L1 WorkstationUnix
CIS_Red_Hat_Enterprise_Linux_9_v2.0.0_L2_Server.audit from CIS Red Hat Enterprise Linux 9 Benchmark v2.0.0CIS Red Hat Enterprise Linux 9 v2.0.0 L2 ServerUnix
CIS_Red_Hat_Enterprise_Linux_9_v2.0.0_L2_Workstation.audit from CIS Red Hat Enterprise Linux 9 Benchmark v2.0.0CIS Red Hat Enterprise Linux 9 v2.0.0 L2 WorkstationUnix
GEN003540 - The system must implement non-executable program stacks - 'kernel.exec-shield'DISA STIG for Oracle Linux 5 v2r1Unix

CONFIGURATION MANAGEMENT

GEN003540 - The system must implement non-executable program stacks - 'kernel.randomize_va_space'DISA STIG for Oracle Linux 5 v2r1Unix

CONFIGURATION MANAGEMENT

JBOS-AS-000135 - JBoss ROOT logger must be configured to utilize the appropriate logging level.DISA JBoss EAP 6.3 STIG v2r6Unix

AUDIT AND ACCOUNTABILITY

OL6-00-000079 - The system must limit the ability of processes to have simultaneous write and execute access to memory.DISA STIG Oracle Linux 6 v2r7Unix

CONFIGURATION MANAGEMENT

SOL-11.1-020220 - The operating system must be configured to provide essential capabilities.DISA STIG Solaris 11 SPARC v3r1Unix

CONFIGURATION MANAGEMENT

SOL-11.1-020220 - The operating system must be configured to provide essential capabilities.DISA STIG Solaris 11 X86 v3r1Unix

CONFIGURATION MANAGEMENT

SOL-11.1-020230 - The operating system must employ automated mechanisms to prevent program execution in accordance with the organization-defined specifications.DISA STIG Solaris 11 SPARC v3r1Unix

CONFIGURATION MANAGEMENT

SOL-11.1-020230 - The operating system must employ automated mechanisms to prevent program execution in accordance with the organization-defined specifications.DISA STIG Solaris 11 X86 v3r1Unix

CONFIGURATION MANAGEMENT

TNS_Alcatel_Nokia_TiMOS_Best_Practices.audit from TNS Alcatel/Nokia TiMOS Best PracticesTNS Alcatel-Lucent TiMOS/Nokia SR-OS Best Practice AuditAlcatel
TNS_Best_Practice_RedHat_JBoss_v7_Linux.audit from TNS Best Practice JBoss 7 LinuxTNS Best Practice JBoss 7 LinuxUnix
TNS_Salesforce_Best_Practices_v1.2.0.audit from TNS Salesforce Best Practices Audit v1.2.0TNS Salesforce Best Practices Audit v1.2.0Salesforce.com