Item Search

NameAudit NamePluginCategory
1.2.4 Ensure HTTP and Telnet options are disabled for all management profiles - HTTPCIS Palo Alto Firewall 8 Benchmark L1 v1.0.0Palo_Alto

CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION

1.2.4 Ensure HTTP and Telnet options are disabled for all management profiles - TelnetCIS Palo Alto Firewall 8 Benchmark L1 v1.0.0Palo_Alto

CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION

1.4 Ensure multi-factor authentication (MFA) is turned on for all human users with password-based authenticationCIS Snowflake Foundations v1.0.0 L1Snowflake

IDENTIFICATION AND AUTHENTICATION

2.1.6 Ensure rsh server is not enabled - rexecCIS Oracle Linux 6 Workstation L1 v2.0.0Unix

CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION

2.1.6 Ensure rsh server is not enabled - rexecCIS CentOS 6 Workstation L1 v3.0.0Unix

CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION

2.1.6 Ensure rsh server is not enabled - rexecCIS CentOS 6 Server L1 v3.0.0Unix

CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION

2.1.6 Ensure rsh server is not enabled - rexecCIS Red Hat 6 Workstation L1 v3.0.0Unix

CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION

2.1.6 Ensure rsh server is not enabled - rexecCIS Red Hat 6 Server L1 v3.0.0Unix

CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION

2.1.6 Ensure rsh server is not enabled - rexecCIS Oracle Linux 6 Server L1 v2.0.0Unix

CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION

2.1.6 Ensure rsh server is not enabled - rloginCIS CentOS 6 Workstation L1 v3.0.0Unix

CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION

2.1.6 Ensure rsh server is not enabled - rloginCIS Oracle Linux 6 Workstation L1 v2.0.0Unix

CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION

2.1.6 Ensure rsh server is not enabled - rloginCIS Red Hat 6 Server L1 v3.0.0Unix

CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION

2.1.6 Ensure rsh server is not enabled - rloginCIS CentOS 6 Server L1 v3.0.0Unix

CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION

2.1.6 Ensure rsh server is not enabled - rloginCIS Oracle Linux 6 Server L1 v2.0.0Unix

CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION

2.1.6 Ensure rsh server is not enabled - rloginCIS Red Hat 6 Workstation L1 v3.0.0Unix

CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION

2.1.6 Ensure rsh server is not enabled - rshCIS Red Hat 6 Workstation L1 v3.0.0Unix

CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION

2.1.6 Ensure rsh server is not enabled - rshCIS CentOS 6 Server L1 v3.0.0Unix

CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION

2.1.6 Ensure rsh server is not enabled - rshCIS Oracle Linux 6 Workstation L1 v2.0.0Unix

CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION

2.1.6 Ensure rsh server is not enabled - rshCIS CentOS 6 Workstation L1 v3.0.0Unix

CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION

2.1.6 Ensure rsh server is not enabled - rshCIS Red Hat 6 Server L1 v3.0.0Unix

CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION

2.1.6 Ensure rsh server is not enabled - rshCIS Oracle Linux 6 Server L1 v2.0.0Unix

CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION

2.2 Ensure that MongoDB does not bypass authentication via the localhost exceptionCIS MongoDB 3.6 L1 Windows Audit v1.1.0Windows

IDENTIFICATION AND AUTHENTICATION

2.2 Ensure that MongoDB does not bypass authentication via the localhost exceptionCIS MongoDB 4 L1 OS Windows v1.0.0Windows

IDENTIFICATION AND AUTHENTICATION

2.2 Ensure that MongoDB does not bypass authentication via the localhost exceptionCIS MongoDB 7 v1.1.0 L1 MongoDBUnix

IDENTIFICATION AND AUTHENTICATION

2.2 Ensure that MongoDB does not bypass authentication via the localhost exceptionCIS MongoDB 6 v1.2.0 L1 MongoDBWindows

IDENTIFICATION AND AUTHENTICATION

2.3.2 Ensure rsh client is not installed - rsh-clientCIS Debian 9 Server L1 v1.0.1Unix

CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION

2.3.2 Ensure rsh client is not installed - rsh-clientCIS Debian 9 Workstation L1 v1.0.1Unix

CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION

2.3.2 Ensure rsh client is not installed - rsh-redone-clientCIS Debian 9 Server L1 v1.0.1Unix

CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION

2.3.2 Ensure rsh client is not installed - rsh-redone-clientCIS Debian 9 Workstation L1 v1.0.1Unix

CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION

2.3.4 Ensure telnet client is not installedCIS Debian 9 Server L1 v1.0.1Unix

CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION

2.3.4 Ensure telnet client is not installedCIS Debian 9 Workstation L1 v1.0.1Unix

CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION

3.1.3 Forbid Dial in AccessCIS Juniper OS Benchmark v2.1.0 L2Juniper

IDENTIFICATION AND AUTHENTICATION, SYSTEM AND INFORMATION INTEGRITY

5.2.2.2 (L1) Ensure multifactor authentication is enabled for all usersCIS Microsoft 365 Foundations v5.0.0 L1 E3microsoft_azure

IDENTIFICATION AND AUTHENTICATION

5.2.4 Ensure SSH Protocol is not set to 1CIS Ubuntu Linux 18.04 LXD Host L1 Server v1.0.0Unix

IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

5.2.4 Ensure SSH Protocol is not set to 1CIS Ubuntu Linux 18.04 LXD Host L1 Workstation v1.0.0Unix

IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

5.2.4 Ensure SSH Protocol is not set to 1CIS Ubuntu Linux 18.04 LXD Container L1 v1.0.0Unix

IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

5.2.4 Ensure SSH Protocol is set to 2CIS Distribution Independent Linux Workstation L1 v2.0.0Unix

IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

5.2.4 Ensure SSH Protocol is set to 2CIS Distribution Independent Linux Server L1 v2.0.0Unix

IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

5.3.29 Ensure SSH Protocol is set to 2CIS Amazon Linux 2 STIG v2.0.0 STIGUnix

IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

6.2.4 Ensure that a multifactor authentication policy exists for all usersCIS Microsoft Azure Foundations v4.0.0 L2microsoft_azure

IDENTIFICATION AND AUTHENTICATION

6.6.14 Ensure Multi-Factor is used with External AAACIS Juniper OS Benchmark v2.1.0 L2Juniper

IDENTIFICATION AND AUTHENTICATION

6.10.1.13 Ensure SSH Key Authentication is DisabledCIS Juniper OS Benchmark v2.1.0 L2Juniper

IDENTIFICATION AND AUTHENTICATION

6.10.3.2 Ensure XNM-SSL Connection Limit is SetCIS Juniper OS Benchmark v2.1.0 L2Juniper

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

6.10.3.3 Ensure XNM-SSL Rate Limit is SetCIS Juniper OS Benchmark v2.1.0 L2Juniper

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

6.10.4.1 Ensure NETCONF Rate Limit is SetCIS Juniper OS Benchmark v2.1.0 L1Juniper

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

6.10.4.2 Ensure NETCONF Connection Limit is SetCIS Juniper OS Benchmark v2.1.0 L1Juniper

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

6.10.6 Ensure Telnet is Not SetCIS Juniper OS Benchmark v2.1.0 L1Juniper

IDENTIFICATION AND AUTHENTICATION, SYSTEM AND INFORMATION INTEGRITY

6.10.7 Ensure Reverse Telnet is Not SetCIS Juniper OS Benchmark v2.1.0 L1Juniper

IDENTIFICATION AND AUTHENTICATION, SYSTEM AND INFORMATION INTEGRITY

20.11 Ensure 'Active Directory user accounts are configured to require the use of a Common Access Card (CAC), Personal Identity Verification (PIV)-compliant hardware token, or Alternate Logon Token (ALT)' (STIG DC only)CIS Microsoft Windows Server 2019 STIG v3.0.0 STIG DCWindows

IDENTIFICATION AND AUTHENTICATION

Monterey - Enforce multifactor authentication for network access to privileged accountsNIST macOS Monterey v1.0.0 - All ProfilesUnix

IDENTIFICATION AND AUTHENTICATION