Item Search

NameAudit NamePluginCategory
1.62 APPL-14-002006CIS Apple macOS 14 (Sonoma) STIG v1.0.0 CAT IIUnix

ACCESS CONTROL

2.2 Ensure the PostgreSQL pg_wheel group membership is correct - /etc/groupCIS PostgreSQL 11 OS v1.0.0Unix

ACCESS CONTROL

2.2 Ensure the PostgreSQL pg_wheel group membership is correct - /etc/groupsCIS PostgreSQL 9.5 OS v1.1.0Unix

ACCESS CONTROL

2.2.4 Set IP address for 'logging host'CIS Cisco IOS 15 L1 v4.1.1Cisco

AUDIT AND ACCOUNTABILITY

2.5 Ensure aufs storage driver is not usedCIS Docker Community Edition v1.1.0 L1 DockerUnix

CONFIGURATION MANAGEMENT

3.1.3 Ensure the logging collector is enabledCIS PostgreSQL 11 DB v1.0.0PostgreSQLDB

AUDIT AND ACCOUNTABILITY

3.2 Configure Security Auditing Flags per local organizational requirements - 'audit all failed events across all audit classes'CIS Apple macOS 10.13 L2 v1.1.0Unix

AUDIT AND ACCOUNTABILITY

3.2 Configure Security Auditing Flags per local organizational requirements - 'audit successful/failed administrative events'CIS Apple macOS 10.13 L2 v1.1.0Unix

AUDIT AND ACCOUNTABILITY

3.2 Configure Security Auditing Flags per local organizational requirements - 'audit successful/failed file attribute modification events'CIS Apple macOS 10.13 L2 v1.1.0Unix

AUDIT AND ACCOUNTABILITY

3.2 Configure Security Auditing Flags per local organizational requirements - 'audit successful/failed file deletion events'CIS Apple macOS 10.13 L2 v1.1.0Unix

AUDIT AND ACCOUNTABILITY

3.2 Configure Security Auditing Flags per local organizational requirements - 'audit successful/failed login/logout events'CIS Apple macOS 10.13 L2 v1.1.0Unix

AUDIT AND ACCOUNTABILITY

3.3 Ensure Auto-Scaling Launch Configuration for Web-Tier is configured to use an approved Amazon Machine ImageCIS Amazon Web Services Three-tier Web Architecture L1 1.0.0amazon_aws

CONFIGURATION MANAGEMENT

3.4 Ensure Auto-Scaling Launch Configuration for App-Tier is configured to use an approved Amazon Machine ImageCIS Amazon Web Services Three-tier Web Architecture L1 1.0.0amazon_aws

CONFIGURATION MANAGEMENT

4.1.9 Avoid non-default bindings to system:unauthenticatedCIS Google Kubernetes Engine GKE Autopilot v1.3.0 L1GCP

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

5.2 Ensure PostgreSQL is Bound to an IP AddressCIS PostgreSQL 14 DB v 1.3.0PostgreSQLDB

PLANNING, SYSTEM AND SERVICES ACQUISITION

5.2 Ensure PostgreSQL is Bound to an IP AddressCIS PostgreSQL 13 v1.3.0 L1 Database PostgreSQLDBPostgreSQLDB

PLANNING, SYSTEM AND SERVICES ACQUISITION

5.2 Ensure PostgreSQL is Bound to an IP AddressCIS PostgreSQL 15 v1.2.0 L1 OS Linux PostgreSQLDBPostgreSQLDB

PLANNING, SYSTEM AND SERVICES ACQUISITION

5.2 Ensure PostgreSQL is Bound to an IP AddressCIS PostgreSQL 16 v1.1.0 L1 OS Linux PostgreSQLDBPostgreSQLDB

PLANNING, SYSTEM AND SERVICES ACQUISITION

6.7 Ensure FIPS 140-2 OpenSSL Cryptography Is Used - openssl versionCIS PostgreSQL 10 OS v1.0.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION

7.1 Ensure 'Symmetric Key encryption algorithm' is set to 'AES_128' or higher in non-system databasesCIS SQL Server 2016 Database L1 DB v1.4.0MS_SQLDB

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

7.1 Ensure 'Symmetric Key encryption algorithm' is set to 'AES_128' or higher in non-system databasesCIS SQL Server 2017 Database L1 AWS RDS v1.3.0MS_SQLDB

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

7.1 Ensure 'Symmetric Key encryption algorithm' is set to 'AES_128' or higher in non-system databasesCIS SQL Server 2017 Database L1 DB v1.3.0MS_SQLDB

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

7.1 Ensure 'Symmetric Key encryption algorithm' is set to 'AES_128' or higher in non-system databasesCIS SQL Server 2016 Database L1 AWS RDS v1.4.0MS_SQLDB

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

7.3 Ensure WAL archiving is configured and functional - archive_modeCIS PostgreSQL 10 OS v1.0.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION

7.3 Ensure WAL archiving is configured and functional - archive_modeCIS PostgreSQL 11 OS v1.0.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION

7.4 Ensure WAL archiving is configured and functional- archive_commandCIS PostgreSQL 9.5 OS v1.1.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION

7.10 Repairing permissions is no longer neededCIS Apple macOS 10.12 L1 v1.2.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION

7.10 Repairing permissions is no longer neededCIS Apple macOS 10.13 L1 v1.1.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION

8.1.2 Remove OS Information from Login Warning Banners - /etc/motdCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

CONFIGURATION MANAGEMENT

8.7 Secure the permissions of the IBMLDAPSecurity.ini fileCIS IBM DB2 9 Benchmark v3.0.1 Level 1 OS WindowsWindows
8.7 Secure the permissions of the IBMLDAPSecurity.ini fileCIS IBM DB2 9 Benchmark v3.0.1 Level 1 OS LinuxUnix
9.6 Ensure Timeout Limits for the Request Body Are Set Properly - mod_reqtimeoutCIS Apache HTTP Server 2.2 L1 v3.6.0 MiddlewareUnix

CONFIGURATION MANAGEMENT

9.7 Secure the permission of the SSLconfig.ini fileCIS IBM DB2 v10 v1.1.0 Windows OS Level 1Windows
9.7 Secure the permission of the SSLconfig.ini fileCIS IBM DB2 v10 v1.1.0 Windows OS Level 2Windows
9.7 Secure the permission of the SSLconfig.ini fileCIS IBM DB2 v10 v1.1.0 Linux OS Level 1Unix
9.7 Secure the permission of the SSLconfig.ini fileCIS IBM DB2 v10 v1.1.0 Linux OS Level 2Unix
11.2 Remove OS Information from Login Warning Banners - /etc/issueCIS Debian Linux 7 L1 v1.0.0Unix

CONFIGURATION MANAGEMENT

11.2 Remove OS Information from Login Warning Banners - /etc/motdCIS Debian Linux 7 L1 v1.0.0Unix

CONFIGURATION MANAGEMENT

BIND-9X-001490 - On the BIND 9.x server, the platform on which the name server software is hosted must be configured to send outgoing DNS messages from a random port.DISA BIND 9.x STIG v3r1Unix

CONFIGURATION MANAGEMENT

CD12-00-010200 - PostgreSQL must enforce authorized access to all PKI private keys stored/utilized by PostgreSQL.DISA STIG Crunchy Data PostgreSQL OS v3r1Unix

IDENTIFICATION AND AUTHENTICATION

Ensure that the 'skip_show_database' database flag for a Cloud Databases Mysql instance is set to '1'Tenable Best Practices RackSpace v2.0.0Rackspace

SYSTEM AND COMMUNICATIONS PROTECTION

Ensure that the 'sql_mode' database flag for a Cloud Databases Mysql instance is setTenable Best Practices RackSpace v2.0.0Rackspace

SYSTEM AND COMMUNICATIONS PROTECTION

Ensure that the 'wait_timeout' database flag for a Cloud Databases Mysql instance is setTenable Best Practices RackSpace v2.0.0Rackspace

SYSTEM AND COMMUNICATIONS PROTECTION

EP11-00-001100 - The EDB Postgres Advanced Server must allow only the ISSM (or individuals or roles appointed by the ISSM) to select which auditable events are to be audited.EDB PostgreSQL Advanced Server v11 Windows OS Audit v2r4Windows

AUDIT AND ACCOUNTABILITY

EX19-ED-000142 - Exchange must have anti-spam filtering configured.DISA Microsoft Exchange 2019 Edge Server STIG v2r2Windows

SYSTEM AND INFORMATION INTEGRITY

OL08-00-030700 - OL 8 must take appropriate action when the internal event queue is full.DISA Oracle Linux 8 STIG v2r7Unix

AUDIT AND ACCOUNTABILITY

OL09-00-005025 - OL 9 must encrypt via the gtls driver the transfer of audit records offloaded onto a different system or media from the system being audited via rsyslog.DISA Oracle Linux 9 STIG v1r4Unix

AUDIT AND ACCOUNTABILITY

PGS9-00-008100 - PostgreSQL must use NSA-approved cryptography to protect classified information in accordance with the data owners requirements.DISA STIG PostgreSQL 9.x on RHEL DB v2r5PostgreSQLDB

SYSTEM AND COMMUNICATIONS PROTECTION

PGS9-00-010200 - PostgreSQL must enforce authorized access to all PKI private keys stored/utilized by PostgreSQL.DISA STIG PostgreSQL 9.x on RHEL OS v2r5Unix

IDENTIFICATION AND AUTHENTICATION

PGS9-00-011400 - PostgreSQL must maintain the authenticity of communications sessions by guarding against man-in-the-middle attacks that guess at Session ID values.DISA STIG PostgreSQL 9.x on RHEL DB v2r5PostgreSQLDB

SYSTEM AND COMMUNICATIONS PROTECTION