Item Search

NameAudit NamePluginCategory
1.2 Use Dedicated Least Privileged Account for MariaDB Daemon/ServiceCIS MariaDB 10.6 on Linux L1 v1.1.0Unix

ACCESS CONTROL, MEDIA PROTECTION

1.2 Use Dedicated Least Privileged Account for MySQL Daemon/ServiceCIS MySQL 5.6 Community Linux OS L1 v2.0.0Unix

ACCESS CONTROL

1.2 Use Dedicated Least Privileged Account for MySQL Daemon/ServiceCIS MySQL 5.7 Enterprise Linux OS L1 v2.0.0Unix

ACCESS CONTROL

1.2 Use Dedicated Least Privileged Account for MySQL Daemon/ServiceCIS MySQL 5.7 Enterprise Windows OS L1 v2.0.0Windows

ACCESS CONTROL

1.2 Use Dedicated Least Privileged Account for MySQL Daemon/ServiceCIS Oracle MySQL Community Server 8.4 v1.1.0 L1 MySQL RDBMS on Linux UnixUnix

ACCESS CONTROL

2.5 Do not use the aufs storage driverCIS Docker 1.12.0 v1.0.0 L1 DockerUnix

CONFIGURATION MANAGEMENT

2.5 Do not use the aufs storage driverCIS Docker 1.13.0 v1.0.0 L1 DockerUnix

CONFIGURATION MANAGEMENT

2.6 Ensure Password Complexity is Configured - validate_password_dictionary_fileCIS MySQL 5.6 Community Database L1 v2.0.0MySQLDB

IDENTIFICATION AND AUTHENTICATION

2.6 Ensure Password Complexity is Configured - validate_password_lengthCIS MySQL 5.6 Enterprise Database L1 v2.0.0MySQLDB

IDENTIFICATION AND AUTHENTICATION

2.7 Ensure Password Complexity is Configured - validate_password_dictionary_fileCIS MySQL 5.7 Enterprise Database L1 v2.0.0MySQLDB

IDENTIFICATION AND AUTHENTICATION

2.7 Ensure Password Complexity is Configured - validate_password_mixed_case_countCIS MySQL 5.7 Community Database L1 v2.0.0MySQLDB

IDENTIFICATION AND AUTHENTICATION

3.2.4 Ensure Multi-AZ deployments are used for enhanced availability in Amazon RDSCIS Amazon Web Services Foundations v7.0.0 L1amazon_aws

CONFIGURATION MANAGEMENT, CONTINGENCY PLANNING, PLANNING, PROGRAM MANAGEMENT, SYSTEM AND SERVICES ACQUISITION, SYSTEM AND COMMUNICATIONS PROTECTION

4.2 (L2) Ensure device enrollment for personally owned devices is blocked by defaultCIS Microsoft 365 Foundations v6.0.1 L2 E5microsoft_azure

ACCESS CONTROL, CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

5.1.5 Ensure No World Writable Folders Exist in the System FolderCIS Apple macOS 14.0 Sonoma Cloud-tailored v1.1.0 L1Unix

ACCESS CONTROL, MEDIA PROTECTION

5.1.5 Ensure No World Writable Folders Exist in the System FolderCIS Apple macOS 13.0 Ventura Cloud-tailored v1.1.0 L1Unix

ACCESS CONTROL, MEDIA PROTECTION

5.1.5 Ensure No World Writable Folders Exist in the System FolderCIS Apple macOS 15.0 Sequoia Cloud-tailored v1.0.0 L1Unix

ACCESS CONTROL, MEDIA PROTECTION

5.2.2.3 (L1) Enable Conditional Access policies to block legacy authenticationCIS Microsoft 365 Foundations v6.0.1 L1 E3microsoft_azure

CONFIGURATION MANAGEMENT

5.2.2.3 (L1) Enable Conditional Access policies to block legacy authenticationCIS Microsoft 365 Foundations v6.0.1 L1 E5microsoft_azure

CONFIGURATION MANAGEMENT

6.2.3.20 Ensure the audit configuration is loaded regardless of errorsCIS Amazon Linux 2 v4.0.0 L2 ServerUnix

AUDIT AND ACCOUNTABILITY

6.2.3.35 Ensure the audit configuration is loaded regardless of errorsCIS Debian Linux 13 v1.0.0 L2 ServerUnix

AUDIT AND ACCOUNTABILITY

6.2.3.35 Ensure the audit configuration is loaded regardless of errorsCIS Debian Linux 13 v1.0.0 L2 WorkstationUnix

AUDIT AND ACCOUNTABILITY

6.3.3.20 Ensure the audit configuration is loaded regardless of errorsCIS Red Hat Enterprise Linux 8 v4.0.0 L2 ServerUnix

AUDIT AND ACCOUNTABILITY

6.3.3.20 Ensure the audit configuration is loaded regardless of errorsCIS Rocky Linux 8 v3.0.0 L2 ServerUnix

AUDIT AND ACCOUNTABILITY

6.3.3.20 Ensure the audit configuration is loaded regardless of errorsCIS Rocky Linux 8 v3.0.0 L2 WorkstationUnix

AUDIT AND ACCOUNTABILITY

6.3.3.20 Ensure the audit configuration is loaded regardless of errorsCIS AlmaLinux OS 8 v4.0.0 L2 ServerUnix

AUDIT AND ACCOUNTABILITY

6.3.3.20 Ensure the audit configuration is loaded regardless of errorsCIS Oracle Linux 8 v4.0.0 L2 ServerUnix

AUDIT AND ACCOUNTABILITY

6.3.3.20 Ensure the audit configuration is loaded regardless of errorsCIS Red Hat Enterprise Linux 8 v4.0.0 L2 WorkstationUnix

AUDIT AND ACCOUNTABILITY

6.3.3.20 Ensure the audit configuration is loaded regardless of errorsCIS Oracle Linux 8 v4.0.0 L2 WorkstationUnix

AUDIT AND ACCOUNTABILITY

6.3.3.20 Ensure the audit configuration is loaded regardless of errorsCIS AlmaLinux OS 8 v4.0.0 L2 WorkstationUnix

AUDIT AND ACCOUNTABILITY

6.3.3.35 Ensure the audit configuration is loaded regardless of errorsCIS Oracle Linux 10 v1.0.0 L2 ServerUnix

AUDIT AND ACCOUNTABILITY

6.3.3.35 Ensure the audit configuration is loaded regardless of errorsCIS Red Hat Enterprise Linux 10 v1.0.1 L2 WorkstationUnix

AUDIT AND ACCOUNTABILITY

6.3.3.35 Ensure the audit configuration is loaded regardless of errorsCIS Rocky Linux 10 v1.0.0 L2 ServerUnix

AUDIT AND ACCOUNTABILITY

6.3.3.35 Ensure the audit configuration is loaded regardless of errorsCIS AlmaLinux OS 10 v1.0.0 L2 WorkstationUnix

AUDIT AND ACCOUNTABILITY

6.3.3.35 Ensure the audit configuration is loaded regardless of errorsCIS Red Hat Enterprise Linux 10 v1.0.1 L2 ServerUnix

AUDIT AND ACCOUNTABILITY

6.3.3.35 Ensure the audit configuration is loaded regardless of errorsCIS Rocky Linux 10 v1.0.0 L2 WorkstationUnix

AUDIT AND ACCOUNTABILITY

6.3.3.35 Ensure the audit configuration is loaded regardless of errorsCIS AlmaLinux OS 10 v1.0.0 L2 ServerUnix

AUDIT AND ACCOUNTABILITY

6.3.3.35 Ensure the audit configuration is loaded regardless of errorsCIS Oracle Linux 10 v1.0.0 L2 WorkstationUnix

AUDIT AND ACCOUNTABILITY

7.2.9 Audit AutofillCIS Apple macOS 11.0 Big Sur v4.0.0 L2Unix

CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

8.2 Review Role MembersCIS IBM DB2 v10 v1.1.0 Database Level 1IBM_DB2DB
8.2 Review Role MembersCIS IBM DB2 v10 v1.1.0 Database Level 2IBM_DB2DB
11.2 Ensure Apache Processes Run in the httpd_t Confined ContextCIS Apache HTTP Server 2.2 L2 v3.6.0 MiddlewareUnix

ACCESS CONTROL

DG0007-ORACLE11 - The database should be secured in accordance with DoD, vendor and/or commercially accepted practices where applicable.DISA STIG Oracle 11 Installation v9r1 LinuxUnix
Ensure 'logging to monitor' is disabledTenable Cisco Firepower Best Practices AuditCisco

CONFIGURATION MANAGEMENT

Ensure 'SNMP traps' is enabled - linkupTenable Cisco Firepower Best Practices AuditCisco

CONFIGURATION MANAGEMENT

Ensure 'syslog hosts' is configured correctlyTenable Cisco Firepower Best Practices AuditCisco

AUDIT AND ACCOUNTABILITY

Ensure 'TACACS+/RADIUS' is configured correctly - protocolTenable Cisco Firepower Best Practices AuditCisco

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY, IDENTIFICATION AND AUTHENTICATION

Ensure DNS services are configured correctly - name-serverTenable Cisco Firepower Best Practices AuditCisco

SYSTEM AND COMMUNICATIONS PROTECTION

Ensure non-default application inspection is configured correctlyTenable Cisco Firepower Best Practices AuditCisco

SYSTEM AND INFORMATION INTEGRITY

Network Security - Ensure Source Routing has not been configuredJuniper Hardening JunOS 12 Devices ChecklistJuniper

CONFIGURATION MANAGEMENT

WG170 A22 - Each readable web document directory must contain either a default, home, index, or equivalent file.DISA STIG Apache Site 2.2 Unix v1r11 MiddlewareUnix