Item Search

NameAudit NamePluginCategory
1.1 Ensure packages are obtained from authorized repositoriesCIS PostgreSQL 10 OS v1.0.0Unix

CONFIGURATION MANAGEMENT

1.4 Ensure Data Cluster Initialized SuccessfullyCIS PostgreSQL 14 OS v 1.2.0Unix

ACCESS CONTROL, MEDIA PROTECTION

2.1 Ensure the file permissions mask is correctCIS PostgreSQL 15 OS v1.1.0Unix

ACCESS CONTROL, MEDIA PROTECTION

2.2 Ensure extension directory has appropriate ownership and permissionsCIS PostgreSQL 14 OS v 1.2.0Unix

ACCESS CONTROL, MEDIA PROTECTION

3.1.3 Ensure the logging collector is enabledCIS PostgreSQL 13 DB v1.2.0PostgreSQLDB

AUDIT AND ACCOUNTABILITY

3.1.3 Ensure the logging collector is enabledCIS PostgreSQL 14 DB v 1.2.0PostgreSQLDB

AUDIT AND ACCOUNTABILITY

3.1.3 Ensure the logging collector is enabledCIS PostgreSQL 11 DB v1.0.0PostgreSQLDB

AUDIT AND ACCOUNTABILITY

3.2 Configure Security Auditing Flags per local organizational requirements - 'audit successful/failed administrative events'CIS Apple macOS 10.13 L2 v1.1.0Unix

AUDIT AND ACCOUNTABILITY

3.2 Configure Security Auditing Flags per local organizational requirements - 'audit successful/failed file attribute modification events'CIS Apple macOS 10.13 L2 v1.1.0Unix

AUDIT AND ACCOUNTABILITY

3.3 Ensure Auto-Scaling Launch Configuration for Web-Tier is configured to use an approved Amazon Machine ImageCIS Amazon Web Services Three-tier Web Architecture L1 1.0.0amazon_aws

CONFIGURATION MANAGEMENT

4.2 Ensure valid public keys are installedCIS PostgreSQL 9.5 OS v1.1.0Unix

IDENTIFICATION AND AUTHENTICATION

4.6 (L1) Host must enable audit record loggingCIS VMware ESXi 8.0 v1.2.0 L1VMware

AUDIT AND ACCOUNTABILITY

5.1 Ensure login via 'local' UNIX Domain Socket is configured correctlyCIS PostgreSQL 16 OS v1.0.0Unix

IDENTIFICATION AND AUTHENTICATION

5.1 Ensure login via 'local' UNIX Domain Socket is configured correctlyCIS PostgreSQL 9.5 OS v1.1.0Unix

IDENTIFICATION AND AUTHENTICATION

5.2 Ensure PostgreSQL is Bound to an IP AddressCIS PostgreSQL 13 DB v1.2.0PostgreSQLDB

PLANNING, SYSTEM AND SERVICES ACQUISITION

5.4 Ensure login via 'host' TCP/IP Socket is configured correctlyCIS PostgreSQL 13 OS v1.2.0Unix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

6.1 Ensure 'Attack Vectors' Runtime Parameters are ConfiguredCIS PostgreSQL 9.5 OS v1.1.0Unix
6.7 Ensure FIPS 140-2 OpenSSL Cryptography Is Used - fips_enabledCIS PostgreSQL 11 OS v1.0.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION

6.7 Ensure FIPS 140-2 OpenSSL Cryptography Is Used - fips_enabledCIS PostgreSQL 9.5 OS v1.1.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION

6.7 Ensure FIPS 140-2 OpenSSL Cryptography Is Used - openssl versionCIS PostgreSQL 9.5 OS v1.1.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION

7.1 Ensure 'Symmetric Key encryption algorithm' is set to 'AES_128' or higher in non-system databasesCIS SQL Server 2017 Database L1 DB v1.3.0MS_SQLDB

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

7.1 Ensure 'Symmetric Key encryption algorithm' is set to 'AES_128' or higher in non-system databasesCIS SQL Server 2022 Database L1 DB v1.1.0MS_SQLDB

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

7.1 Ensure 'Symmetric Key encryption algorithm' is set to 'AES_128' or higher in non-system databasesCIS SQL Server 2016 Database L1 AWS RDS v1.4.0MS_SQLDB

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

7.1 Ensure 'Symmetric Key encryption algorithm' is set to 'AES_128' or higher in non-system databasesCIS SQL Server 2017 Database L1 AWS RDS v1.3.0MS_SQLDB

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

7.3 Ensure base backups are configured and functionalCIS PostgreSQL 15 OS v1.1.0Unix

CONTINGENCY PLANNING

8.2 Ensure the backup and restore tool, 'pgBackRest', is installed and configuredCIS PostgreSQL 16 OS v1.0.0Unix

CONTINGENCY PLANNING

8.2 Ensure the backup and restore tool, 'pgBackRest', is installed and configuredCIS PostgreSQL 15 OS v1.1.0Unix

CONTINGENCY PLANNING

9.6 Ensure Signing Keys are Scheduled to be Replaced Periodically - ZSKCIS BIND DNS v1.0.0 L2 Authoritative Name ServerUnix

SYSTEM AND COMMUNICATIONS PROTECTION

9.6 Ensure Timeout Limits for the Request Body Are Set Properly - mod_reqtimeoutCIS Apache HTTP Server 2.2 L1 v3.6.0 MiddlewareUnix

CONFIGURATION MANAGEMENT

9.6 Ensure Timeout Limits for the Request Body Are Set Properly - RequestReadTimeoutCIS Apache HTTP Server 2.2 L2 v3.6.0Unix

CONFIGURATION MANAGEMENT

Adtran : Device InfoTNS Adtran AOS Best Practice AuditAdtran

CONFIGURATION MANAGEMENT

Adtran : Device VersionTNS Adtran AOS Best Practice AuditAdtran

CONFIGURATION MANAGEMENT

CD12-00-010200 - PostgreSQL must enforce authorized access to all PKI private keys stored/utilized by PostgreSQL.DISA STIG Crunchy Data PostgreSQL OS v3r1Unix

IDENTIFICATION AND AUTHENTICATION

EP11-00-001100 - The EDB Postgres Advanced Server must allow only the ISSM (or individuals or roles appointed by the ISSM) to select which auditable events are to be audited.EDB PostgreSQL Advanced Server v11 Windows OS Audit v2r4Windows

AUDIT AND ACCOUNTABILITY

EX13-EG-003016 - A DoD-approved third party Exchange-aware malicious code protection application must be implemented.DISA Microsoft Exchange 2013 Edge Transport Server STIG v1r6Windows

SYSTEM AND INFORMATION INTEGRITY

EX13-MB-003031 - A DoD-approved third party Exchange-aware malicious code protection application must be implemented.DISA Microsoft Exchange 2013 Mailbox Server STIG v2r3Windows

SYSTEM AND INFORMATION INTEGRITY

EX16-ED-000730 - The application must configure malicious code protection mechanisms to perform periodic scans of the information system every seven days.DISA Microsoft Exchange 2016 Edge Transport Server STIG v2r5Windows

SYSTEM AND INFORMATION INTEGRITY

EX16-ED-000730 - The application must configure malicious code protection mechanisms to perform periodic scans of the information system every seven days.DISA Microsoft Exchange 2016 Edge Transport Server STIG v2r6Windows

SYSTEM AND INFORMATION INTEGRITY

EX16-ED-000760 - The application must be configured to block and quarantine malicious code upon detection, then send an immediate alert to appropriate individuals.DISA Microsoft Exchange 2016 Edge Transport Server STIG v2r5Windows

SYSTEM AND INFORMATION INTEGRITY

EX16-ED-002410 - The application must update malicious code protection mechanisms whenever new releases are available in accordance with organizational configuration management policy and procedures.DISA Microsoft Exchange 2016 Edge Transport Server STIG v2r6Windows

SYSTEM AND INFORMATION INTEGRITY

Extreme : Device InfoTNS Extreme ExtremeXOS Best Practice AuditExtreme_ExtremeXOS

CONFIGURATION MANAGEMENT

Extreme : switch InfoTNS Extreme ExtremeXOS Best Practice AuditExtreme_ExtremeXOS

CONFIGURATION MANAGEMENT

Huawei: HTTPS Server is configuredTNS Huawei VRP Best Practice AuditHuawei

CONFIGURATION MANAGEMENT

Huawei: HTTPS Server is not configuredTNS Huawei VRP Best Practice AuditHuawei

CONFIGURATION MANAGEMENT

Huawei: Review Device Info/VersionTNS Huawei VRP Best Practice AuditHuawei

CONFIGURATION MANAGEMENT

PGS9-00-005100 - PostgreSQL must generate audit records when successful logons or connections occur.DISA STIG PostgreSQL 9.x on RHEL DB v2r5PostgreSQLDB

AUDIT AND ACCOUNTABILITY

TNS_Best_Practices_Jetty_9_v1.0.0.auditTNS Best Practice Jetty 9 LinuxUnix
TNS_IBM_HTTP_Server_Best_Practice.auditTNS IBM HTTP Server Best PracticeWindows
TNS_IBM_HTTP_Server_Linux_Best_Practice.auditTNS IBM HTTP Server Best PracticeUnix
WatchGuard : Review ABS Policy ListingTNS Best Practice WatchGuard Audit 1.0.0WatchGuard

ACCESS CONTROL