Item Search

NameAudit NamePluginCategory
2.2.2.2 Ensure 'Accept cookies' is set to 'From websites I visit' or 'From current website only'AirWatch - CIS Apple iOS 11 v1.0.0 End User Owned L1MDM
2.2.2.2 Ensure 'Accept cookies' is set to 'From websites I visit' or 'From current website only'MobileIron - CIS Apple iOS 10 v2.0.0 End User Owned L1MDM

ACCESS CONTROL

2.2.2.2 Ensure 'Accept cookies' is set to 'From websites I visit' or `From current website only`MobileIron - CIS Apple iOS 12 v1.0.0 End User Owned L1MDM

ACCESS CONTROL

3.2 Ensure the PostgreSQL Audit Extension (pgAudit) is enabledCIS PostgreSQL 13 DB v1.2.0PostgreSQLDB

AUDIT AND ACCOUNTABILITY

3.2.2.2 Ensure 'Accept cookies' is set to 'From websites I visit' or 'From current website only'MobileIron - CIS Apple iPadOS 17 Institutionally Owned L1MDM

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

3.2.2.2 Ensure 'Accept cookies' is set to 'From websites I visit' or 'From current website only'AirWatch - CIS Apple iPadOS 18 v1.0.0 L1 Institutionally OwnedMDM

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

3.2.2.2 Ensure 'Accept cookies' is set to 'From websites I visit' or 'From current website only'AirWatch - CIS Apple iOS 14 and iPadOS 14 Institution Owned L1MDM

CONFIGURATION MANAGEMENT

3.2.2.2 Ensure 'Accept cookies' is set to 'From websites I visit' or 'From current website only'MobileIron - CIS Apple iOS 17 Institution Owned L1MDM

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

3.2.2.2 Ensure 'Accept cookies' is set to 'From websites I visit' or `From current website only`MobileIron - CIS Apple iOS 12 v1.0.0 Institution Owned L1MDM

ACCESS CONTROL

4.6 Ensure the set_user extension is installedCIS PostgreSQL 12 DB v1.1.0PostgreSQLDB

ACCESS CONTROL

5.3 Ensure login via "local" UNIX Domain Socket is configured correctlyCIS PostgreSQL 17 v1.0.0 L1 PostgreSQLPostgreSQLDB

IDENTIFICATION AND AUTHENTICATION

6.4 Ensure 'SIGHUP' Runtime Parameters are ConfiguredCIS PostgreSQL 15 DB v1.1.0PostgreSQLDB

CONFIGURATION MANAGEMENT

6.4 Ensure 'SIGHUP' Runtime Parameters are ConfiguredCIS PostgreSQL 13 DB v1.2.0PostgreSQLDB

CONFIGURATION MANAGEMENT

6.4 Ensure 'SIGHUP' Runtime Parameters are ConfiguredCIS PostgreSQL 14 DB v 1.2.0PostgreSQLDB

CONFIGURATION MANAGEMENT

6.4 Ensure 'SIGHUP' Runtime Parameters are ConfiguredCIS PostgreSQL 16 DB v1.0.0PostgreSQLDB

CONFIGURATION MANAGEMENT

ALMA-09-018720 - The firewalld service on AlmaLinux OS 9 must be active.DISA CloudLinux AlmaLinux OS 9 STIG v1r2Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

ALMA-09-031700 - AlmaLinux OS 9 must have the firewalld package installed.DISA CloudLinux AlmaLinux OS 9 STIG v1r2Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

CD12-00-000200 - PostgreSQL must produce audit records containing sufficient information to establish the outcome (success or failure) of the events.DISA STIG Crunchy Data PostgreSQL DB v3r1PostgreSQLDB

AUDIT AND ACCOUNTABILITY

CD12-00-000700 - Privileges to change PostgreSQL software modules must be limited.DISA STIG Crunchy Data PostgreSQL OS v3r1Unix

CONFIGURATION MANAGEMENT

CD12-00-000710 - PostgreSQL must limit privileges to change functions and triggers, and links to software external to PostgreSQL.DISA STIG Crunchy Data PostgreSQL OS v3r1Unix

CONFIGURATION MANAGEMENT

CD12-00-000800 - If passwords are used for authentication, PostgreSQL must transmit only encrypted representations of passwords.DISA STIG Crunchy Data PostgreSQL OS v3r1Unix

IDENTIFICATION AND AUTHENTICATION

CD12-00-000900 - PostgreSQL must enforce approved authorizations for logical access to information and system resources in accordance with applicable access control policies.DISA STIG Crunchy Data PostgreSQL OS v3r1Unix

ACCESS CONTROL

CD12-00-002300 - The audit information produced by PostgreSQL must be protected from unauthorized deletion.DISA STIG Crunchy Data PostgreSQL OS v3r1Unix

AUDIT AND ACCOUNTABILITY

CD12-00-003100 - Database objects (including but not limited to tables, indexes, storage, trigger procedures, functions, links to software external to PostgreSQL, etc.) must be owned by database/DBMS principals authorized for ownership.DISA STIG Crunchy Data PostgreSQL OS v3r1Unix

CONFIGURATION MANAGEMENT

CD12-00-007200 - PostgreSQL must maintain the confidentiality and integrity of information during preparation for transmission.DISA STIG Crunchy Data PostgreSQL DB v3r1PostgreSQLDB

SYSTEM AND COMMUNICATIONS PROTECTION

CD12-00-008700 - PostgreSQL must implement cryptographic mechanisms to prevent unauthorized modification of organization-defined information at rest (to include, at a minimum, PII and classified information) on organization-defined information system components.DISA STIG Crunchy Data PostgreSQL DB v3r1PostgreSQLDB

SYSTEM AND COMMUNICATIONS PROTECTION

CIS_IBM_DB2_10_v1.1.0_Level_2_OS_Windows.audit from CIS DB2 10.x Windows OSCIS IBM DB2 v10 v1.1.0 Windows OS Level 2Windows
CIS_PostgreSQL_9.6_v1.0.0_L1_OS_Linux.audit from CIS Benchmark for PostgreSQL 9.6CIS PostgreSQL 9.6 OS v1.0.0Unix
CIS_PostgreSQL_10_v1.0.0_L1_OS_Linux.audit from CIS Benchmark for PostgreSQL 10CIS PostgreSQL 10 OS v1.0.0Unix
CIS_PostgreSQL_11_v1.0.0_L1_OS_Linux.audit from CIS Benchmark for PostgreSQL 11CIS PostgreSQL 11 OS v1.0.0Unix
CIS_PostgreSQL_12_v1.1.0_L1_OS_Linux.audit from CIS PostgreSQL 12 Benchmark v1.1.0CIS PostgreSQL 12 OS v1.1.0Unix
CIS_PostgreSQL_13_v1.2.0_L1_OS_Linux.audit from CIS PostgreSQL 13 Benchmark v1.2.0CIS PostgreSQL 13 OS v1.2.0Unix
CIS_PostgreSQL_15_v1.1.0_L1_OS_Linux.audit from CIS PostgreSQL 15 Benchmark v1.1.0CIS PostgreSQL 15 OS v1.1.0Unix
EP11-00-000700 - The EDB Postgres Advanced Server must integrate with an organization-level authentication/access mechanism providing account management and automation for all users, groups, roles, and any other principals.EDB PostgreSQL Advanced Server v11 Windows OS Audit v2r4Windows

ACCESS CONTROL

EP11-00-002300 - The EDB Postgres Advanced Server must by default shut down upon audit failure, to include the unavailability of space for more audit log records; or must be configurable to shut down upon audit failure.EDB PostgreSQL Advanced Server v11 Windows OS Audit v2r4Windows

AUDIT AND ACCOUNTABILITY

EP11-00-002400 - The EDB Postgres Advanced Server must be configurable to overwrite audit log records, oldest first (First-In-First-Out - FIFO), in the event of unavailability of space for more audit log records.EDB PostgreSQL Advanced Server v11 Windows OS Audit v2r4Windows

AUDIT AND ACCOUNTABILITY

EP11-00-002700 - The audit information produced by the EDB Postgres Advanced Server must be protected from unauthorized modification.EDB PostgreSQL Advanced Server v11 Windows OS Audit v2r4Windows

AUDIT AND ACCOUNTABILITY

EP11-00-002900 - The EDB Postgres Advanced Server must protect its audit features from unauthorized access.EDB PostgreSQL Advanced Server v11 Windows OS Audit v2r4Windows

AUDIT AND ACCOUNTABILITY

EP11-00-003400 - Database software, including EDB Postgres Advanced Server configuration files, must be stored in dedicated directories, separate from the host OS and other applications.EDB PostgreSQL Advanced Server v11 Windows OS Audit v2r4Windows

CONFIGURATION MANAGEMENT

EP11-00-003600 - The role(s)/group(s) used to modify database structure (including but not necessarily limited to tables, indexes, storage, etc.) and logic modules (stored procedures, functions, triggers, links to software external to the EDB Postgres Advanced Server, etc.) must be restricted to authorized users.EDB PostgreSQL Advanced Server v11 Windows OS Audit v2r4Windows

CONFIGURATION MANAGEMENT

EP11-00-004500 - The EDB Postgres Advanced Server, when utilizing PKI-based authentication, must validate certificates by performing RFC 5280-compliant certification path validation.EDB PostgreSQL Advanced Server v11 Windows OS Audit v2r4Windows

IDENTIFICATION AND AUTHENTICATION

EP11-00-004600 - The EDB Postgres Advanced Server must enforce authorized access to all PKI private keys stored/utilized by the EDB Postgres Advanced Server.EDB PostgreSQL Advanced Server v11 Windows OS Audit v2r4Windows

IDENTIFICATION AND AUTHENTICATION

EP11-00-004850 - The EDB Postgres Advanced Server password file must not be used.EDB PostgreSQL Advanced Server v11 Windows OS Audit v2r4Windows

CONFIGURATION MANAGEMENT

EP11-00-009200 - The EDB Postgres Advanced Server must implement cryptographic mechanisms to prevent unauthorized modification of organization-defined information at rest (to include, at a minimum, PII and classified information) on organization-defined information system components.EDB PostgreSQL Advanced Server v11 Windows OS Audit v2r4Windows

SYSTEM AND COMMUNICATIONS PROTECTION

EP11-00-012700 - The EDB Postgres Advanced Server must implement NIST FIPS 140-2 or 140-3 validated cryptographic modules to provision digital signatures.EDB PostgreSQL Advanced Server v11 Windows OS Audit v2r4Windows

SYSTEM AND COMMUNICATIONS PROTECTION

PGS9-00-004400 - PostgreSQL must generate audit records when categorized information (e.g., classification levels/security levels) is accessed.DISA STIG PostgreSQL 9.x on RHEL DB v2r5PostgreSQLDB

AUDIT AND ACCOUNTABILITY

PGS9-00-005500 - PostgreSQL must be able to generate audit records when privileges/permissions are retrieved.DISA STIG PostgreSQL 9.x on RHEL DB v2r5PostgreSQLDB

AUDIT AND ACCOUNTABILITY

PGS9-00-006000 - PostgreSQL must be able to generate audit records when security objects are accessed.DISA STIG PostgreSQL 9.x on RHEL DB v2r5PostgreSQLDB

AUDIT AND ACCOUNTABILITY

RHEL-09-251010 - RHEL 9 must have the firewalld package installed.DISA Red Hat Enterprise Linux 9 STIG v2r4Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

RHEL-09-251015 - The firewalld service on RHEL 9 must be active.DISA Red Hat Enterprise Linux 9 STIG v2r4Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT