Item Search

NameAudit NamePluginCategory
1.33 WN19-00-000330CIS Microsoft Windows Server 2019 STIG v4.0.0 DC CAT IIWindows

CONFIGURATION MANAGEMENT

1.38 WN19-00-000380CIS Microsoft Windows Server 2019 STIG v4.0.0 MS CAT IIWindows

CONFIGURATION MANAGEMENT

1.38 WN19-00-000380CIS Microsoft Windows Server 2019 STIG v4.0.0 DC CAT IIWindows

CONFIGURATION MANAGEMENT

1.110 WN19-CC-000170CIS Microsoft Windows Server 2019 STIG v4.0.0 MS CAT IIWindows

ACCESS CONTROL

1.125 WN19-CC-000320CIS Microsoft Windows Server 2019 STIG v4.0.0 MS CAT IIIWindows

CONFIGURATION MANAGEMENT

1.128 WN19-CC-000350CIS Microsoft Windows Server 2019 STIG v4.0.0 DC CAT IIWindows

CONFIGURATION MANAGEMENT

1.128 WN19-CC-000350CIS Microsoft Windows Server 2019 STIG v4.0.0 MS CAT IIWindows

CONFIGURATION MANAGEMENT

1.142 WN19-CC-000490CIS Microsoft Windows Server 2019 STIG v4.0.0 MS CAT IIWindows

ACCESS CONTROL

1.156 WN19-DC-000100CIS Microsoft Windows Server 2019 STIG v4.0.0 DC CAT IWindows

ACCESS CONTROL

1.230 WN19-SO-000230CIS Microsoft Windows Server 2019 STIG v4.0.0 DC CAT IWindows

ACCESS CONTROL

1.235 WN19-SO-000280CIS Microsoft Windows Server 2019 STIG v4.0.0 MS CAT IIWindows

IDENTIFICATION AND AUTHENTICATION

1.253 WN19-UC-000010CIS Microsoft Windows Server 2019 STIG v4.0.0 DC CAT IIWindows

CONFIGURATION MANAGEMENT

4.1 Create CIS Audit ClassCIS Solaris 11.2 L1 v1.1.0Unix

ACCESS CONTROL

4.8 Ensure 'sql_mode' Contains 'STRICT_ALL_TABLES'CIS MariaDB 10.6 Database L2 v1.1.0MySQLDB

PLANNING, SYSTEM AND SERVICES ACQUISITION

5.2.1 Ensure '%ANY%' Is Revoked from Unauthorized 'GRANTEE'CIS Oracle Server 12c DB Traditional Auditing v3.0.0OracleDB

ACCESS CONTROL

5.2.7 Ensure 'AUDIT SYSTEM' Is Revoked from Unauthorized 'GRANTEE'CIS Oracle Server 12c DB Unified Auditing v3.0.0OracleDB

ACCESS CONTROL

5.3.2 Ensure 'SELECT_CATALOG_ROLE' Is Revoked from Unauthorized 'GRANTEE'CIS Oracle Server 12c DB Traditional Auditing v3.0.0OracleDB

ACCESS CONTROL

5.3.3 Ensure 'EXECUTE_CATALOG_ROLE' Is Revoked from Unauthorized 'GRANTEE'CIS Oracle Server 12c DB Traditional Auditing v3.0.0OracleDB

ACCESS CONTROL

5.3.4 Ensure 'DBA' Is Revoked from Unauthorized 'GRANTEE'CIS Oracle Server 12c DB Traditional Auditing v3.0.0OracleDB

ACCESS CONTROL

5.9 Ensure DML/DDL Grants Are Limited to Specific Databases and UsersCIS MySQL 5.7 Community Database L1 v2.0.0MySQLDB

ACCESS CONTROL, MEDIA PROTECTION

5.9 Ensure DML/DDL Grants are Limited to Specific Databases and UsersCIS Oracle MySQL Community Server 8.0 v1.2.0 L1 MySQL RDBMS MySQLDBMySQLDB

ACCESS CONTROL, MEDIA PROTECTION

5.9 Ensure DML/DDL Grants are Limited to Specific Databases and UsersCIS Oracle MySQL Enterprise Edition 8.4 v1.1.0 L1 MySQL RDBMS on Linux MySQLDBMySQLDB

ACCESS CONTROL, MEDIA PROTECTION

6.1.1 Ensure That a MySQL Instance Does Not Allow Anyone To Connect With Administrative PrivilegesCIS Google Cloud Platform Foundation v4.0.0 L1GCP

IDENTIFICATION AND AUTHENTICATION

7.1 Ensure 'Symmetric Key encryption algorithm' is set to 'AES_128' or higher in non-system databasesCIS Microsoft SQL Server 2022 v1.2.1 L1 Database EngineMS_SQLDB

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

7.1 Ensure 'Symmetric Key encryption algorithm' is set to 'AES_128' or higher in non-system databasesCIS SQL Server 2012 Database L1 AWS RDS v1.6.0MS_SQLDB

SYSTEM AND COMMUNICATIONS PROTECTION

7.1 Ensure 'Symmetric Key encryption algorithm' is set to 'AES_128' or higher in non-system databasesCIS Microsoft SQL Server 2019 v1.5.2 L1 AWS RDSMS_SQLDB

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

7.1 Ensure 'Symmetric Key encryption algorithm' is set to 'AES_128' or higher in non-system databasesCIS Microsoft SQL Server 2022 v1.2.1 L1 AWS RDSMS_SQLDB

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

7.1 Ensure 'Symmetric Key encryption algorithm' is set to 'AES_128' or higher in non-system databasesCIS Microsoft SQL Server 2025 v1.0.0 L1 AWS RDS MS_SQLDBMS_SQLDB

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

7.1 Ensure 'Symmetric Key encryption algorithm' is set to 'AES_128' or higher in non-system databasesCIS Microsoft SQL Server 2025 v1.0.0 L1 Database Engine MS_SQLDBMS_SQLDB

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

7.1 Ensure 'Symmetric Key encryption algorithm' is set to 'AES_128' or higher in non-system databasesCIS SQL Server 2008 R2 DB Engine L1 v1.7.0MS_SQLDB

SYSTEM AND COMMUNICATIONS PROTECTION

7.1 Ensure 'Symmetric Key encryption algorithm' is set to 'AES_128' or higher in non-system databasesCIS SQL Server 2014 Database L1 AWS RDS v1.5.0MS_SQLDB

SYSTEM AND COMMUNICATIONS PROTECTION

18.10.43.2 Ensure 'Allow camera and microphone access in Microsoft Defender Application Guard' is set to 'Disabled'CIS Microsoft Windows 11 Stand-alone v5.0.0 L1 BLWindows

CONFIGURATION MANAGEMENT

CIS_Oracle_Database_19c_v2.0.0_L1_RDBMS_On_Host_OS_Windows.audit from CIS Oracle Database 19c v2.0.0CIS Oracle Database 19c v2.0.0 L1 RDBMS On Host OS WindowsWindows
DG0079-ORACLE11 - DBMS login accounts require passwords to meet complexity requirements.DISA STIG Oracle 11 Instance v9r1 DatabaseOracleDB

IDENTIFICATION AND AUTHENTICATION

DO0270-ORACLE11 - A minimum of two Oracle redo log groups/files should be defined and configured to be stored on separate, archived physical disks or archived directories on a RAID device - 'V$LOG count > 2'DISA STIG Oracle 11 Instance v9r1 DatabaseOracleDB

AUDIT AND ACCOUNTABILITY

O19C-00-020600 - A minimum of three Oracle redo log groups/files must be defined and configured to be stored on separate, archived physical disks or archived directories on a RAID device. In addition, each Oracle redo log group must have a minimum of two Oracle redo log members (files).DISA Oracle Database 19c STIG v1r5 OracleDBOracleDB

CONFIGURATION MANAGEMENT

O121-BP-021600 - A minimum of two Oracle redo log groups/files must be defined and configured to be stored on separate, archived physical disks or archived directories on a RAID device.DISA Oracle Database 12c STIG v3r5 OracleDBOracleDB

CONFIGURATION MANAGEMENT

SQL2-00-004600 - SQL Server must enforce access control policies to restrict the Alter any availability group permission to only authorized roles.DISA STIG SQL Server 2012 DB Instance Security v1r20MS_SQLDB

ACCESS CONTROL

SQL2-00-012400 - SQL Server must include organization-defined additional, more detailed information in the audit records for audit events identified by type, location, or subject - 'Event ID 14'DISA STIG SQL Server 2012 DB Instance Security v1r20MS_SQLDB

AUDIT AND ACCOUNTABILITY

SQL2-00-012400 - SQL Server must include organization-defined additional, more detailed information in the audit records for audit events identified by type, location, or subject - 'Event ID 20'DISA STIG SQL Server 2012 DB Instance Security v1r20MS_SQLDB

AUDIT AND ACCOUNTABILITY

SQL2-00-012400 - SQL Server must include organization-defined additional, more detailed information in the audit records for audit events identified by type, location, or subject - 'Event ID 108'DISA STIG SQL Server 2012 DB Instance Security v1r20MS_SQLDB

AUDIT AND ACCOUNTABILITY

SQL2-00-012400 - SQL Server must include organization-defined additional, more detailed information in the audit records for audit events identified by type, location, or subject - 'Event ID 112'DISA STIG SQL Server 2012 DB Instance Security v1r20MS_SQLDB

AUDIT AND ACCOUNTABILITY

SQL2-00-012400 - SQL Server must include organization-defined additional, more detailed information in the audit records for audit events identified by type, location, or subject - 'Event ID 152'DISA STIG SQL Server 2012 DB Instance Security v1r20MS_SQLDB

AUDIT AND ACCOUNTABILITY

SQL2-00-012400 - SQL Server must include organization-defined additional, more detailed information in the audit records for audit events identified by type, location, or subject - 'Event ID 153'DISA STIG SQL Server 2012 DB Instance Security v1r20MS_SQLDB

AUDIT AND ACCOUNTABILITY

SQL2-00-012400 - SQL Server must include organization-defined additional, more detailed information in the audit records for audit events identified by type, location, or subject - 'Event ID 172'DISA STIG SQL Server 2012 DB Instance Security v1r20MS_SQLDB

AUDIT AND ACCOUNTABILITY

SQL2-00-012400 - SQL Server must include organization-defined additional, more detailed information in the audit records for audit events identified by type, location, or subject - 'Event ID 173'DISA STIG SQL Server 2012 DB Instance Security v1r20MS_SQLDB

AUDIT AND ACCOUNTABILITY

SQL4-00-016826 - SQL Server must have the SQL Server Replication software component removed if it is unused.DISA STIG SQL Server 2014 Instance OS Audit v2r4Windows

CONFIGURATION MANAGEMENT

SQL6-D0-001600 - The Database Master Key encryption password must meet DOD password complexity requirements.DISA MS SQL Server 2016 Database STIG v3r4MS_SQLDB

SYSTEM AND COMMUNICATIONS PROTECTION

SQL6-D0-014900 - SQL Server must generate audit records for all privileged activities or other system-level access.DISA MS SQL Server 2016 Instance STIG v3r6 MS_SQLDBMS_SQLDB

AUDIT AND ACCOUNTABILITY

SQLI-22-016000 - SQL Server must configure Customer Feedback and Error Reporting.DISA Microsoft SQL Server 2022 Instance STIG v1r4 WindowsWindows

CONFIGURATION MANAGEMENT