Item Search

NameAudit NamePluginCategory
1.9 UBTU-24-100130CIS Ubuntu Linux 24.04 LTS STIG v1.0.0 CAT IIUnix

CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY

1.57 OL08-00-010360CIS Oracle Linux 8 STIG v1.0.0 CAT IIUnix

CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY

1.113 UBTU-22-651020CIS Ubuntu Linux 22.04 LTS STIG v1.0.0 CAT IIUnix

CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY

1.351 RHEL-09-651010CIS Red Hat Enterprise Linux 9 STIG v1.0.0 CAT IIUnix

CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY

1.352 RHEL-09-651015CIS Red Hat Enterprise Linux 9 STIG v1.0.0 CAT IIUnix

CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY

ALMA-09-045340 - AlmaLinux OS 9 must have the Advanced Intrusion Detection Environment (AIDE) package installed.DISA CloudLinux AlmaLinux OS 9 STIG v1r2Unix

CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY

ALMA-09-045450 - AlmaLinux OS 9 must routinely check the baseline configuration for unauthorized changes and notify the system administrator when anomalies in the operation of any security functions are discovered.DISA CloudLinux AlmaLinux OS 9 STIG v1r2Unix

CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY

F5BI-DM-000211 - The BIG-IP appliance must be configured to implement automated security responses if baseline configurations are changed in an unauthorized manner.DISA F5 BIG-IP Device Management STIG v2r4F5

CONFIGURATION MANAGEMENT

GEN000140-2 - A file integrity baseline including cryptographic hashes must be created - '/etc/aide.conf must exist'DISA STIG for Oracle Linux 5 v2r1Unix

CONFIGURATION MANAGEMENT

GEN000140-2 - A file integrity baseline including cryptographic hashes must be created - 'cryptographic hash is used 'DISA STIG for Oracle Linux 5 v2r1Unix

CONFIGURATION MANAGEMENT

GEN000140-2 - A file integrity baseline including cryptographic hashes must be created - 'database location'DISA STIG for Oracle Linux 5 v2r1Unix

CONFIGURATION MANAGEMENT

GEN000140-3 - A file integrity baseline including cryptographic hashes must be maintained - '/etc/aide.conf exists'DISA STIG for Oracle Linux 5 v2r1Unix

CONFIGURATION MANAGEMENT

GEN000140-3 - A file integrity baseline including cryptographic hashes must be maintained - 'database has been configured'DISA STIG for Oracle Linux 5 v2r1Unix

CONFIGURATION MANAGEMENT

GEN000220 - A file integrity tool must be used at least weekly to check for unauthorized file changes, particularly the addition of unauthorized system libraries or binaries, or for unauthorized modification to authorized system libraries or binaries.DISA STIG Solaris 10 SPARC v2r4Unix

CONFIGURATION MANAGEMENT

GEN000220 - A file integrity tool must be used at least weekly to check for unauthorized file changes, particularly the addition of unauthorized system libraries or binaries, or for unauthorized modification to authorized system libraries or binaries.DISA STIG for Oracle Linux 5 v2r1Unix

CONFIGURATION MANAGEMENT, RISK ASSESSMENT

GEN002260 - The system must be checked for extraneous device files at least weekly.DISA STIG Solaris 10 X86 v2r4Unix

CONFIGURATION MANAGEMENT

GEN002400 - The system must be checked weekly for unauthorized setuid files, as well as, unauthorized modification to authorized setuid files.DISA STIG Solaris 10 SPARC v2r4Unix

CONFIGURATION MANAGEMENT

MS.DEFENDER.4.1v2 - A custom policy SHALL be configured to protect PII and sensitive information, as defined by the agency. At a minimum, credit card numbers, U.S. Individual Taxpayer Identification Numbers (ITIN), and U.S. Social Security numbers (SSN) SHALL be blocked.CISA SCuBA Microsoft 365 Defender v1.5.0microsoft_azure

ACCESS CONTROL, SECURITY ASSESSMENT AND AUTHORIZATION, CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION, RISK ASSESSMENT, SYSTEM AND SERVICES ACQUISITION, SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY

MS.EXO.13.1v1 - Mailbox auditing SHALL be enabled.CISA SCuBA Microsoft 365 Exchange Online v1.5.0microsoft_azure

ACCESS CONTROL, SECURITY ASSESSMENT AND AUTHORIZATION, CONFIGURATION MANAGEMENT, CONTINGENCY PLANNING, IDENTIFICATION AND AUTHENTICATION, INCIDENT RESPONSE, SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY

MS.SHAREPOINT.1.1v1 - External sharing for SharePoint SHALL be limited to Existing guests or Only people in your organization.CISA SCuBA Microsoft 365 SharePoint Online OneDrive v1.5.0microsoft_azure

ACCESS CONTROL, SECURITY ASSESSMENT AND AUTHORIZATION, CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION, RISK ASSESSMENT, SYSTEM AND SERVICES ACQUISITION, SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY

MS.SHAREPOINT.1.2v1 - External sharing for OneDrive SHALL be limited to Existing guests or Only people in your organization.CISA SCuBA Microsoft 365 SharePoint Online OneDrive v1.5.0microsoft_azure

ACCESS CONTROL, SECURITY ASSESSMENT AND AUTHORIZATION, CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION, RISK ASSESSMENT, SYSTEM AND SERVICES ACQUISITION, SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY

MS.SHAREPOINT.1.4v1 - Guest access SHALL be limited to the email the invitation was sent to.CISA SCuBA Microsoft 365 SharePoint Online OneDrive v1.5.0microsoft_azure

ACCESS CONTROL, SECURITY ASSESSMENT AND AUTHORIZATION, CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION, RISK ASSESSMENT, SYSTEM AND SERVICES ACQUISITION, SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY

MS.TEAMS.6.1v1 - A DLP solution SHALL be enabled. The selected DLP solution SHOULD offer services comparable to the native DLP solution offered by Microsoft.CISA SCuBA Microsoft 365 Teams v1.5.0microsoft_azure

ACCESS CONTROL, SECURITY ASSESSMENT AND AUTHORIZATION, CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION, RISK ASSESSMENT, SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY

MS.TEAMS.6.2v1 - The DLP solution SHALL protect personally identifiable information (PII)CISA SCuBA Microsoft 365 Teams v1.5.0microsoft_azure

ACCESS CONTROL, SECURITY ASSESSMENT AND AUTHORIZATION, CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION, RISK ASSESSMENT, SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY

OL6-00-000302 - A file integrity tool must be used at least weekly to check for unauthorized file changes, particularly the addition of unauthorized system libraries or binaries, or for unauthorized modification to authorized system libraries or binaries.DISA STIG Oracle Linux 6 v2r7Unix

CONFIGURATION MANAGEMENT

OL6-00-000303 - The operating system must employ automated mechanisms, per organization defined frequency, to detect the addition of unauthorized components/devices into the operating system.DISA STIG Oracle Linux 6 v2r7Unix

CONFIGURATION MANAGEMENT

OL6-00-000304 - The operating system must employ automated mechanisms to detect the presence of unauthorized software on organizational information systems and notify designated organizational officials in accordance with the organization defined frequency.DISA STIG Oracle Linux 6 v2r7Unix

CONFIGURATION MANAGEMENT

OL6-00-000306 - The operating system must detect unauthorized changes to software and information.DISA STIG Oracle Linux 6 v2r7Unix

CONFIGURATION MANAGEMENT

OL6-00-000307 - The operating system must ensure unauthorized, security-relevant configuration changes detected are tracked.DISA STIG Oracle Linux 6 v2r7Unix

CONFIGURATION MANAGEMENT

OL07-00-020030 - The Oracle Linux operating system must be configured so that a file integrity tool verifies the baseline operating system configuration at least weekly.DISA Oracle Linux 7 STIG v3r3Unix

CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY

OL07-00-020040 - The Oracle Linux operating system must be configured so that designated personnel are notified if baseline configurations are changed in an unauthorized manner.DISA Oracle Linux 7 STIG v3r3Unix

CONFIGURATION MANAGEMENT

OL08-00-010360 - The OL 8 file integrity tool must notify the system administrator (SA) when changes to the baseline configuration or anomalies in the operation of any security functions are discovered within an organizationally defined frequency.DISA Oracle Linux 8 STIG v2r5Unix

CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY

OL09-00-000301 - OL 9 must routinely check the baseline configuration for unauthorized changes and notify the system administrator (SA) when anomalies in the operation of any security functions are discovered.DISA Oracle Linux 9 STIG v1r2Unix

CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY

PHTN-30-000013 - The Photon operating system must have the auditd service running.DISA STIG VMware vSphere 7.0 Photon OS v1r4Unix

AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY

PHTN-40-000016 The Photon operating system must enable the auditd service.DISA VMware vSphere 8.0 vCenter Appliance Photon OS 4.0 STIG v2r1Unix

AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY

PHTN-67-000018 - The Photon operating system must have the auditd service running.DISA STIG VMware vSphere 6.7 Photon OS v1r6Unix

AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY

RHEL-07-020030 - The Red Hat Enterprise Linux operating system must be configured so that a file integrity tool verifies the baseline operating system configuration at least weekly.DISA Red Hat Enterprise Linux 7 STIG v3r15Unix

CONFIGURATION MANAGEMENT

RHEL-09-651015 - RHEL 9 must routinely check the baseline configuration for unauthorized changes and notify the system administrator when anomalies in the operation of any security functions are discovered.DISA Red Hat Enterprise Linux 9 STIG v2r4Unix

CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY

SLES-12-010500 - Advanced Intrusion Detection Environment (AIDE) must verify the baseline SUSE operating system configuration at least weekly.DISA SLES 12 STIG v3r3Unix

CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY

SLES-15-010420 - Advanced Intrusion Detection Environment (AIDE) must verify the baseline SUSE operating system configuration at least weekly.DISA SUSE Linux Enterprise Server 15 STIG v2r5Unix

CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY

SOL-11.1-020190 - The operating system must employ automated mechanisms, per organization-defined frequency, to detect the addition of unauthorized components/devices into the operating system.DISA Solaris 11 SPARC STIG v3r3Unix

CONFIGURATION MANAGEMENT

SOL-11.1-020190 - The operating system must employ automated mechanisms, per organization-defined frequency, to detect the addition of unauthorized components/devices into the operating system.DISA Solaris 11 X86 STIG v3r3Unix

CONFIGURATION MANAGEMENT

UBTU-16-010540 - The file integrity tool must notify the system administrator when changes to the baseline configuration or anomalies in the operation of any security functions are discovered - defaultDISA STIG Ubuntu 16.04 LTS v2r3Unix

CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY

UBTU-16-010540 - The file integrity tool must notify the system administrator when changes to the baseline configuration or anomalies in the operation of any security functions are discovered - silentreportsDISA STIG Ubuntu 16.04 LTS v2r3Unix

CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY

UBTU-18-010508 - The Ubuntu operating system must notify designated personnel if baseline configurations are changed in an unauthorized manner. The file integrity tool must notify the system administrator when changes to the baseline configuration or anomalies in the operation of any security functions are discovered.DISA STIG Ubuntu 18.04 LTS v2r15Unix

CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY

UBTU-22-651020 - Ubuntu 22.04 LTS must notify designated personnel if baseline configurations are changed in an unauthorized manner. The file integrity tool must notify the system administrator when changes to the baseline configuration or anomalies in the operation of any security functions are discovered.DISA Canonical Ubuntu 22.04 LTS STIG v2r5Unix

CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY

UBTU-24-100130 - Ubuntu 24.04 LTS must notify designated personnel if baseline configurations are changed in an unauthorized manner. The file integrity tool must notify the system administrator (SA) when changes to the baseline configuration or anomalies in the operation of any security functions are discovered.DISA Canonical Ubuntu 24.04 LTS STIG v1r2Unix

CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY

VCSA-70-000150 - vCenter must provide an immediate real-time alert to the system administrator (SA) and information system security officer (ISSO), at a minimum, of all audit failure events requiring real-time alerts.DISA STIG VMware vSphere 7.0 vCenter v1r3VMware

AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT

VCSA-80-000150 - The vCenter server must provide an immediate real-time alert to the system administrator (SA) and information system security officer (ISSO), at a minimum, of all audit failure events requiring real-time alerts.DISA VMware vSphere 8.0 vCenter STIG v2r3VMware

AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT

WN16-00-000240 - System files must be monitored for unauthorized changes.DISA Microsoft Windows Server 2016 STIG v2r10Windows

CONFIGURATION MANAGEMENT