Item Search

NameAudit NamePluginCategory
1.2 Use the updated Linux KernelCIS Docker 1.12.0 v1.0.0 L1 LinuxUnix

SYSTEM AND INFORMATION INTEGRITY

1.2.5 Disable yum-updatesdCIS Red Hat Enterprise Linux 5 L2 v2.2.1Unix

SYSTEM AND INFORMATION INTEGRITY

2.1.15 Disable daytime-streamCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

CONFIGURATION MANAGEMENT

2.1.16 Disable echo-dgramCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

CONFIGURATION MANAGEMENT

2.1.17 Disable echo-streamCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

CONFIGURATION MANAGEMENT

2.2.15 Ensure 'Debug programs' is set to 'Administrators'CIS Microsoft Windows 8.1 v2.4.1 L1Windows

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

2.2.21 Ensure 'Enable computer and user accounts to be trusted for delegation' is set to 'No One'CIS Microsoft Windows 8.1 v2.4.1 L1Windows

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

2.2.25 Ensure 'Increase scheduling priority' is set to 'Administrators' - Window Manager\Window Manager Group'CIS Microsoft Windows 8.1 v2.4.1 L1Windows

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

2.2.30 Ensure 'Manage auditing and security log' is set to 'Administrators'CIS Microsoft Windows 8.1 v2.4.1 L1Windows

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

4.5 Configure Solaris Auditing - active audit policies = argv,cnt,zonenameCIS Solaris 11.1 L1 v1.0.0Unix

AUDIT AND ACCOUNTABILITY

4.5 Configure Solaris Auditing - active non-attributable flags = loCIS Solaris 11.1 L1 v1.0.0Unix

AUDIT AND ACCOUNTABILITY

4.5 Configure Solaris Auditing - active user flags = cis,ex,aa,ua,as,ss,lo,ftCIS Solaris 11 L1 v1.1.0Unix

AUDIT AND ACCOUNTABILITY

4.5 Configure Solaris Auditing - audit condition = auditingCIS Solaris 11.1 L1 v1.0.0Unix

AUDIT AND ACCOUNTABILITY

4.5 Configure Solaris Auditing - audit_flags root = lo,ad,ft,ex,cis:noCIS Solaris 11.1 L1 v1.0.0Unix

AUDIT AND ACCOUNTABILITY

4.5 Configure Solaris Auditing - configured audit policies = argv,cnt,zonenameCIS Solaris 11.1 L1 v1.0.0Unix

AUDIT AND ACCOUNTABILITY

4.5 Configure Solaris Auditing - configured audit policies = argv,cnt,zonenameCIS Solaris 11 L1 v1.1.0Unix

AUDIT AND ACCOUNTABILITY

4.5 Configure Solaris Auditing - configured user flags = cis,ex,aa,ua,as,ss,lo,ftCIS Solaris 11 L1 v1.1.0Unix

AUDIT AND ACCOUNTABILITY

4.6 Ensure only authorized users and groups belong to the esxAdminsGroup groupCIS VMware ESXi 6.7 v1.3.0 Level 1VMware

ACCESS CONTROL

4.7 (L1) Ensure only authorized users and groups belong to the esxAdminsGroup groupCIS VMware ESXi 7.0 v1.4.0 L1VMware

ACCESS CONTROL

5.1 Ensure 'Maximum number of error log files' is set to greater than or equal to '12'CIS SQL Server 2022 Database L1 DB v1.1.0MS_SQLDB

AUDIT AND ACCOUNTABILITY

5.1 Ensure 'Maximum number of error log files' is set to greater than or equal to '12'CIS Microsoft SQL Server 2019 v1.5.0 L1 Database EngineMS_SQLDB

AUDIT AND ACCOUNTABILITY

5.8 Ensure 'REPLICATION SLAVE' is Not Granted to Non-Administrative UsersCIS Oracle MySQL Enterprise Edition 8.0 v1.4.0 L1 DatabaseMySQLDB

ACCESS CONTROL, MEDIA PROTECTION

5.8 Ensure 'REPLICATION SLAVE' is Not Granted to Non-Administrative UsersCIS Oracle MySQL Community Server 8.4 v1.0.0 L1 DatabaseMySQLDB

ACCESS CONTROL, MEDIA PROTECTION

5.8 Ensure 'REPLICATION SLAVE' is Not Granted to Non-Administrative UsersCIS MySQL 8.0 Community Database L1 v1.1.0MySQLDB

ACCESS CONTROL, MEDIA PROTECTION

6.2.2 Set LogLevel to INFOCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

AUDIT AND ACCOUNTABILITY

6.2.4 Disable SSH X11 ForwardingCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

CONFIGURATION MANAGEMENT

6.2.5 Set SSH MaxAuthTries to 4 or LessCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

ACCESS CONTROL

6.2.6 Set SSH IgnoreRhosts to YesCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

CONFIGURATION MANAGEMENT

6.2.7 Set SSH HostbasedAuthentication to NoCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

CONFIGURATION MANAGEMENT

6.2.8 Disable SSH Root LoginCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

ACCESS CONTROL

6.2.9 Set SSH PermitEmptyPasswords to NoCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

IDENTIFICATION AND AUTHENTICATION

6.2.10 Do Not Allow Users to Set Environment Options - PermitUserEnvironment noCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

CONFIGURATION MANAGEMENT

6.2.14 Set SSH Banner - Banner /etc/issueCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

CONFIGURATION MANAGEMENT

6.4 Restrict root Login to System ConsoleCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

ACCESS CONTROL

7.1 (L1) Virtual machines must enable Secure BootCIS VMware ESXi 8.0 v1.1.0 L1VMware

CONFIGURATION MANAGEMENT, MAINTENANCE

9.1.5 Verify Permissions on /etc/groupCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

ACCESS CONTROL

17.2.5 Ensure 'Audit Other Account Management Events' is set to include 'Success' (STIG only)CIS Microsoft Windows Server 2019 STIG v3.0.0 STIG DCWindows

AUDIT AND ACCOUNTABILITY

ALMA-09-003430 - AlmaLinux OS 9 must implement DOD-approved systemwide cryptographic policies to protect the confidentiality of SSH server connections.DISA CloudLinux AlmaLinux OS 9 STIG v1r2Unix

ACCESS CONTROL

ALMA-09-006730 - The Ctrl-Alt-Delete key sequence must be disabled on AlmaLinux OS 9.DISA CloudLinux AlmaLinux OS 9 STIG v1r2Unix

ACCESS CONTROL

ALMA-09-006950 - The AlmaLinux OS 9 debug-shell systemd service must be disabled.DISA CloudLinux AlmaLinux OS 9 STIG v1r2Unix

ACCESS CONTROL

JBOS-AS-000135 - JBoss ROOT logger must be configured to utilize the appropriate logging level.DISA JBoss EAP 6.3 STIG v2r5Unix

AUDIT AND ACCOUNTABILITY

JBOS-AS-000320 - The JBoss server must be configured to restrict access to the web servers private key to authenticated system administrators.DISA JBoss EAP 6.3 STIG v2r5Unix

IDENTIFICATION AND AUTHENTICATION

MADB-10-009100 - When invalid inputs are received, MariaDB must behave in a predictable and documented manner that reflects organizational and system objectives.DISA MariaDB Enterprise 10.x v2r3 DBMySQLDB

SYSTEM AND INFORMATION INTEGRITY

MYS8-00-012000 - The MySQL Database Server 8.0 must implement cryptographic mechanisms to prevent unauthorized modification of organization-defined information at rest (to include, at a minimum, PII and classified information) on organization-defined information system components.DISA Oracle MySQL 8.0 v2r2 DBMySQLDB

SYSTEM AND COMMUNICATIONS PROTECTION

MYS8-00-012100 - The MySQL Database Server 8.0 must implement cryptographic mechanisms preventing the unauthorized disclosure of organization-defined information at rest on organization-defined information system components.DISA Oracle MySQL 8.0 v2r2 DBMySQLDB

SYSTEM AND COMMUNICATIONS PROTECTION

O121-OS-011200 - The OS must limit privileges to change the DBMS software resident within software libraries (including privileged programs).DISA STIG Oracle 12c v3r2 WindowsWindows

CONFIGURATION MANAGEMENT

TCAT-AS-000750 - Tomcat must use FIPS-validated ciphers on secured connectors.DISA STIG Apache Tomcat Application Server 9 v3r2 MiddlewareUnix

IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

vCenter : apply-os-patchesVMWare vSphere 5.X Hardening GuideVMware
VM : secure-guest-osVMWare vSphere 5.X Hardening GuideVMware
VUM : patch-vum-osVMWare vSphere 5.X Hardening GuideVMware