Item Search

NameAudit NamePluginCategory
1.1.4.3 network accountingCIS Cisco IOS XR 7.x v1.0.1 L1Cisco

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

1.2 Use the updated Linux KernelCIS Docker 1.11.0 v1.0.0 L1 LinuxUnix

SYSTEM AND INFORMATION INTEGRITY

1.2 Use the updated Linux KernelCIS Docker 1.12.0 v1.0.0 L1 LinuxUnix

SYSTEM AND INFORMATION INTEGRITY

1.8.3 Ensure GDM session lock is enabledCIS Amazon Linux 2 STIG v2.0.0 STIGUnix

ACCESS CONTROL

1.8.6 Ensure GDM session lock is enabledCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIGUnix

ACCESS CONTROL

1.41 RHEL-09-213110CIS Red Hat Enterprise Linux 9 STIG v1.0.0 CAT IIUnix

SYSTEM AND INFORMATION INTEGRITY

2.3.3 - AirWatch - Mark Company Mail DomainAirWatch - CIS Apple iOS 9 v1.0.0 L2MDM

ACCESS CONTROL

2.3.3 - MobileIron - Mark Company Mail DomainMobileIron - CIS Apple iOS 9 v1.0.0 L2MDM

ACCESS CONTROL

2.8 Enable user namespace supportCIS Docker 1.12.0 v1.0.0 L2 DockerUnix
2.8 Enable user namespace supportCIS Docker 1.13.0 v1.0.0 L2 DockerUnix
2.8 Enable user namespace supportCIS Docker 1.11.0 v1.0.0 L2 DockerUnix
2.8 Enable user namespace support - /etc/subgidCIS Docker Community Edition v1.1.0 L2 DockerUnix
2.8 Enable user namespace support - /etc/subuidCIS Docker Community Edition v1.1.0 L2 DockerUnix
2.8 Enable user namespace support --userns-remap=defaultCIS Docker Community Edition v1.1.0 L2 DockerUnix

SYSTEM AND COMMUNICATIONS PROTECTION

4.1.7 Ensure events that modify the system's network environment are collected - auditctl b64 sethostnameCIS Distribution Independent Linux Workstation L2 v2.0.0Unix

CONFIGURATION MANAGEMENT

4.1.7 Ensure events that modify the system's network environment are collected - auditctl b64 sethostnameCIS Distribution Independent Linux Server L2 v2.0.0Unix

CONFIGURATION MANAGEMENT

4.1.7 Ensure events that modify the system's network environment are collected - b64 sethostnameCIS Distribution Independent Linux Workstation L2 v2.0.0Unix

CONFIGURATION MANAGEMENT

4.1.7 Ensure events that modify the system's network environment are collected - b64 sethostnameCIS Distribution Independent Linux Server L2 v2.0.0Unix

CONFIGURATION MANAGEMENT

4.3 Ensure that unnecessary packages are not installed in the containerCIS Docker v1.8.0 L1 OS LinuxUnix

CONFIGURATION MANAGEMENT

5.4.5 Ensure system-auth is used when changing passwordsCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIGUnix

IDENTIFICATION AND AUTHENTICATION

5.5.1.2 Ensure minimum days between password changes is configured - /etc/login.defsCIS Red Hat Enterprise Linux 7 STIG v2.0.0 L1 ServerUnix

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

5.5.1.2 Ensure minimum days between password changes is configured - /etc/login.defsCIS Red Hat Enterprise Linux 7 STIG v2.0.0 L1 WorkstationUnix

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

5.5.1.2 Ensure minimum days between password changes is configured - /etc/shadowCIS Red Hat Enterprise Linux 7 STIG v2.0.0 L1 ServerUnix

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

5.5.1.2 Ensure minimum days between password changes is configured - /etc/shadowCIS Red Hat Enterprise Linux 7 STIG v2.0.0 L1 WorkstationUnix

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

5.5.1.2 Ensure minimum days between password changes is configured - login.defsCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIGUnix

IDENTIFICATION AND AUTHENTICATION

5.5.1.2 Ensure minimum days between password changes is configured - password shadowCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIGUnix

IDENTIFICATION AND AUTHENTICATION

5.5.2 Ensure system accounts are secured - non-login shellCIS Red Hat 6 Server L1 v3.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

5.5.2 Ensure system accounts are secured - non-login shellCIS CentOS 6 Server L1 v3.0.0Unix

ACCESS CONTROL

5.5.2 Ensure system accounts are secured - non-login shellCIS Oracle Linux 6 Workstation L1 v2.0.0Unix

ACCESS CONTROL

5.5.2 Ensure system accounts are secured - non-login shellCIS Red Hat 6 Workstation L1 v3.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

5.5.2 Ensure system accounts are secured - unlocked non-rootCIS CentOS 6 Workstation L1 v3.0.0Unix

ACCESS CONTROL

5.5.2 Ensure system accounts are secured - unlocked non-rootCIS Oracle Linux 6 Server L1 v2.0.0Unix

ACCESS CONTROL

5.5.2 Ensure system accounts are secured - unlocked non-rootCIS Oracle Linux 6 Workstation L1 v2.0.0Unix

ACCESS CONTROL

5.5.2 Ensure system accounts are secured - unlocked non-rootCIS Red Hat 6 Workstation L1 v3.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

F5BI-FW-300015 - The F5 BIG-IP appliance must be configured to restrict itself from accepting outbound packets that contain an illegitimate address in the source address field via an egress filter or by enabling Unicast Reverse Path Forwarding (uRPF).DISA F5 BIG-IP TMOS Firewall STIG v1r1F5

CONFIGURATION MANAGEMENT

JBOS-AS-000010 - HTTP management session traffic must be encrypted.DISA JBoss Enterprise Application Platform 6.3 STIG v2r6Unix

ACCESS CONTROL

MD4X-00-006600 - MongoDB must be configured in accordance with the security configuration settings based on DoD security configuration and implementation guidance, including STIGs, NSA configuration guides, CTOs, DTMs, and IAVMs.DISA STIG MongoDB Enterprise Advanced 4.x v1r4 OSUnix

CONFIGURATION MANAGEMENT

RHEL-06-000010 - The Red Hat Enterprise Linux operating system must be a vendor-supported release.DISA Red Hat Enterprise Linux 6 STIG v2r2Unix

CONFIGURATION MANAGEMENT

RHEL-07-010063 - The Red Hat Enterprise Linux operating system must disable the login screen user list for graphical user interfaces.DISA Red Hat Enterprise Linux 7 STIG v3r15Unix

CONFIGURATION MANAGEMENT

RHEL-08-040310 - The RHEL 8 file integrity tool must be configured to verify Access Control Lists (ACLs).DISA Red Hat Enterprise Linux 8 STIG v2r7Unix

CONFIGURATION MANAGEMENT

RHEL-10-700600 - RHEL 10 must be configured so that SSHD accepts public key authentication.DISA Red Hat Enterprise Linux 10 STIG v1r1Unix

IDENTIFICATION AND AUTHENTICATION

VCWN-65-000008 - The vCenter Server for Windows must provide an immediate real-time alert to the SA and ISSO, at a minimum, of all audit failure events.DISA VMware vSphere 6.5 vCenter Server for Windows STIG v2r3VMware

AUDIT AND ACCOUNTABILITY

WBSP-AS-000630 - The WebSphere Application Server must provide an immediate real-time alert of all log failure events - notificationDISA IBM WebSphere Traditional 9 STIG v1r1Unix

AUDIT AND ACCOUNTABILITY

WBSP-AS-000630 - The WebSphere Application Server must provide an immediate real-time alert of all log failure events - enabledDISA IBM WebSphere Traditional 9 STIG v1r1Unix

AUDIT AND ACCOUNTABILITY

WBSP-AS-000640 - The WebSphere Application Server must alert the SA and ISSO, in the event of a log processing failure - enabledDISA IBM WebSphere Traditional 9 Windows STIG v1r1Windows

AUDIT AND ACCOUNTABILITY

WBSP-AS-000640 - The WebSphere Application Server must alert the SA and ISSO, in the event of a log processing failure - enabledDISA IBM WebSphere Traditional 9 STIG v1r1 MiddlewareUnix

AUDIT AND ACCOUNTABILITY

WBSP-AS-000640 - The WebSphere Application Server must alert the SA and ISSO, in the event of a log processing failure - enabledDISA IBM WebSphere Traditional 9 STIG v1r1Unix

AUDIT AND ACCOUNTABILITY

WBSP-AS-000640 - The WebSphere Application Server must alert the SA and ISSO, in the event of a log processing failure - notificationDISA IBM WebSphere Traditional 9 STIG v1r1Unix

AUDIT AND ACCOUNTABILITY

WBSP-AS-000640 - The WebSphere Application Server must alert the SA and ISSO, in the event of a log processing failure - notificationDISA IBM WebSphere Traditional 9 STIG v1r1 MiddlewareUnix

AUDIT AND ACCOUNTABILITY

WBSP-AS-000640 - The WebSphere Application Server must alert the SA and ISSO, in the event of a log processing failure - notificationDISA IBM WebSphere Traditional 9 Windows STIG v1r1Windows

AUDIT AND ACCOUNTABILITY