Item Search

NameAudit NamePluginCategory
1.1 Ensure a customer created Customer Master Key (CMK) is created for the Web-tierCIS Amazon Web Services Three-tier Web Architecture L2 1.0.0amazon_aws

ACCESS CONTROL

1.1.3.2.1.1 Ensure 'Allow Trusted Locations on the network' is set to DisabledCIS Microsoft Office Access 2016 v1.0.1Windows

CONFIGURATION MANAGEMENT

1.2 Ensure a customer created Customer Master Key (CMK) is created for the App-tierCIS Amazon Web Services Three-tier Web Architecture L2 1.0.0amazon_aws

ACCESS CONTROL

1.3 Ensure a customer created Customer Master Key (CMK) is created for the Database-TierCIS Amazon Web Services Three-tier Web Architecture L2 1.0.0amazon_aws

ACCESS CONTROL

1.4 Ensure Install of macOS Updates Is EnabledCIS Apple macOS 14.0 Sonoma Cloud-tailored v1.1.0 L1Unix

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

1.4 Ensure Install of macOS Updates Is EnabledCIS Apple macOS 13.0 Ventura v3.0.0 L1Unix

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

1.4 Ensure Install of macOS Updates Is EnabledCIS Apple macOS 14.0 Sonoma v2.0.0 L1Unix

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

1.4 Ensure Install of macOS Updates Is EnabledCIS Apple macOS 15.0 Sequoia Cloud-tailored v1.0.0 L1Unix

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

1.4 Ensure Install of macOS Updates Is EnabledCIS Apple macOS 13.0 Ventura Cloud-tailored v1.1.0 L1Unix

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

1.4 Ensure Install of macOS Updates Is EnabledCIS Apple macOS 15.0 Sequoia v1.0.0 L1Unix

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

1.4.7.2.3.1 Ensure 'Allow Trusted Locations on The Network' to DisabledCIS Microsoft Office Excel 2013 v1.0.1Windows

CONFIGURATION MANAGEMENT

1.4.7.2.3.1 Ensure 'Allow Trusted Locations on The Network' to DisabledCIS Microsoft Office Excel 2016 v1.0.1Windows

CONFIGURATION MANAGEMENT

1.5 Enable macOS update installsCIS Apple macOS 10.13 L1 v1.1.0Unix

SYSTEM AND INFORMATION INTEGRITY

1.6 Ensure Install of macOS Updates Is EnabledCIS Apple macOS 12.0 Monterey Cloud-tailored v1.1.0 L1Unix

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

1.6 Ensure Install of macOS Updates Is EnabledCIS Apple macOS 10.15 Catalina v3.0.0 L1Unix

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

1.6 Ensure Install of macOS Updates Is EnabledCIS Apple macOS 12.0 Monterey v4.0.0 L1Unix

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

1.6 Ensure Install of macOS Updates Is EnabledCIS Apple macOS 11.0 Big Sur v4.0.0 L1Unix

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

1.8.7.2.3.1 Ensure 'Allow Trusted Locations on the Network' is set to DisabledCIS Microsoft Office Word 2016 v1.1.0Windows

CONFIGURATION MANAGEMENT

1.17 Ensure CloudFront to Origin connection is configured using TLS1.1+ as the SSL\TLS protocolCIS Amazon Web Services Three-tier Web Architecture L2 1.0.0amazon_aws

SYSTEM AND COMMUNICATIONS PROTECTION

2.1.1 Ensure Trusted Execution Path is enabledCIS IBM AIX 7 v1.0.0 L2Unix

ACCESS CONTROL, SYSTEM AND INFORMATION INTEGRITY

2.1.4 Ensure that S3 is configured with 'Block Public Access' enabledCIS Amazon Web Services Foundations v5.0.0 L1amazon_aws

ACCESS CONTROL, MEDIA PROTECTION

2.2.3 Ensure that RDS instances are not publicly accessibleCIS Amazon Web Services Foundations v5.0.0 L1amazon_aws

ACCESS CONTROL, MEDIA PROTECTION

2.3.1 Ensure that encryption is enabled for EFS file systemsCIS Amazon Web Services Foundations v5.0.0 L1amazon_aws

IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

2.3.3.10 Ensure Media Sharing Is DisabledCIS Apple macOS 13.0 Ventura v3.0.0 L2Unix

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

2.3.3.10 Ensure Media Sharing Is DisabledCIS Apple macOS 14.0 Sonoma v2.0.0 L2Unix

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

2.4.12 Ensure Media Sharing Is DisabledCIS Apple macOS 12.0 Monterey v4.0.0 L2Unix

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

2.16 Ensure 'AUTO_CLOSE' is set to 'OFF' on contained databasesCIS SQL Server 2012 Database L1 AWS RDS v1.6.0MS_SQLDB

CONFIGURATION MANAGEMENT

3.2 Ensure each Auto-Scaling Group is configured for multiple Availability ZonesCIS Amazon Web Services Three-tier Web Architecture L1 1.0.0amazon_aws

SYSTEM AND INFORMATION INTEGRITY

3.10 Secure MySQL KeyringCIS Oracle MySQL Enterprise Edition 8.4 v1.0.0 L1 MySQL OS LinuxUnix

ACCESS CONTROL, MEDIA PROTECTION

3.10 Secure MySQL KeyringCIS MySQL 8.0 Enterprise Linux OS L1 v1.4.0Unix

ACCESS CONTROL, MEDIA PROTECTION

3.12 Configure HTTP to HTTPS Redirects with a CloudFront Viewer Protocol PolicyCIS Amazon Web Services Three-tier Web Architecture L2 1.0.0amazon_aws

SYSTEM AND COMMUNICATIONS PROTECTION

3.13 Ensure all CloudFront Distributions require HTTPS between CloudFront and your Web-Tier ELB originCIS Amazon Web Services Three-tier Web Architecture L2 1.0.0amazon_aws

SYSTEM AND COMMUNICATIONS PROTECTION

4.5 Ensure CloudTrail configuration changes are monitoredCIS Amazon Web Services Foundations v5.0.0 L1amazon_aws

AUDIT AND ACCOUNTABILITY

4.12 Ensure changes to network gateways are monitoredCIS Amazon Web Services Foundations v5.0.0 L1amazon_aws

AUDIT AND ACCOUNTABILITY

4.14 Ensure VPC changes are monitoredCIS Amazon Web Services Foundations v5.0.0 L1amazon_aws

AUDIT AND ACCOUNTABILITY

5.2 Ensure AWS Elastic Load Balancer logging is enabledCIS Amazon Web Services Three-tier Web Architecture L1 1.0.0amazon_aws

AUDIT AND ACCOUNTABILITY

6.6 Ensure subnets for the Web tier are createdCIS Amazon Web Services Three-tier Web Architecture L1 1.0.0amazon_aws

SYSTEM AND COMMUNICATIONS PROTECTION

6.7 Ensure subnets for the App tier are createdCIS Amazon Web Services Three-tier Web Architecture L1 1.0.0amazon_aws

SYSTEM AND COMMUNICATIONS PROTECTION

6.24 Create the Data tier Security Group and ensure it allows inbound connections from App tier Security Group for explicit portsCIS Amazon Web Services Three-tier Web Architecture L1 1.0.0amazon_aws

SYSTEM AND COMMUNICATIONS PROTECTION

9.24 Find Un-owned Files and DirectoriesCIS Solaris 11.1 L1 v1.0.0Unix

ACCESS CONTROL

EX13-MB-000175 - Exchange Message size restrictions must be controlled on Receive connectors.DISA Microsoft Exchange 2013 Mailbox Server STIG v2r3Windows

SYSTEM AND COMMUNICATIONS PROTECTION

EX13-MB-000205 - Exchange Message size restrictions must be controlled on Send connectors.DISA Microsoft Exchange 2013 Mailbox Server STIG v2r3Windows

SYSTEM AND COMMUNICATIONS PROTECTION

EX16-ED-000240 - Exchange message size restrictions must be controlled on Send connectors.DISA Microsoft Exchange 2016 Edge Transport Server STIG v2r6Windows

SYSTEM AND COMMUNICATIONS PROTECTION

EX16-MB-000350 - Exchange Message size restrictions must be controlled on Receive connectors.DISA Microsoft Exchange 2016 Mailbox Server STIG v2r6Windows

SYSTEM AND COMMUNICATIONS PROTECTION

EX19-MB-000124 - Exchange Message size restrictions must be controlled on Receive connectors.DISA Microsoft Exchange 2019 Mailbox Server STIG v2r2Windows

SYSTEM AND COMMUNICATIONS PROTECTION

F5BI-DM-000277 - The BIG-IP appliance must create backups of system-level information contained in the information system when changes occur or weekly, whichever is sooner.DISA F5 BIG-IP Device Management STIG v2r4F5

CONFIGURATION MANAGEMENT, CONTINGENCY PLANNING

FGFW-ND-000185 - The FortiGate device must support organizational requirements to conduct backups of information system documentation, including security-related documentation, when changes occur or weekly, whichever is sooner.DISA Fortigate Firewall NDM STIG v1r4FortiGate

CONFIGURATION MANAGEMENT, CONTINGENCY PLANNING

WBLC-01-000033 - Oracle WebLogic must enforce the organization-defined time period during which the limit of consecutive invalid access attempts by a user is counted.Oracle WebLogic Server 12c Windows v2r2Windows

CONFIGURATION MANAGEMENT

WBLC-01-000033 - Oracle WebLogic must enforce the organization-defined time period during which the limit of consecutive invalid access attempts by a user is counted.Oracle WebLogic Server 12c Linux v2r2Unix

CONFIGURATION MANAGEMENT

WBLC-01-000033 - Oracle WebLogic must enforce the organization-defined time period during which the limit of consecutive invalid access attempts by a user is counted.Oracle WebLogic Server 12c Linux v2r2 MiddlewareUnix

CONFIGURATION MANAGEMENT