Item Search

NameAudit NamePluginCategory
1.2 Review the default loginCIS Sybase 15.0 L1 OS Windows v1.1.0Windows

ACCESS CONTROL

1.8 Ensure That Separation of Duties Is Enforced While Assigning Service Account Related Roles to UsersCIS Google Cloud Platform v3.0.0 L2GCP

ACCESS CONTROL, MEDIA PROTECTION

2.3.3.10 Ensure Media Sharing Is DisabledCIS Apple macOS 15.0 Sequoia v1.0.0 L2Unix

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

2.7 Lock Out Accounts if Not Currently in UseCIS MariaDB 10.6 Database L2 v1.1.0MySQLDB

ACCESS CONTROL

2.7 Lock Out Accounts if Not Currently in UseCIS MariaDB 10.6 on Linux L2 v1.1.0Unix

ACCESS CONTROL

2.8 Lock Out Accounts if Not Currently in UseCIS MySQL 5.7 Community Database L2 v2.0.0MySQLDB

ACCESS CONTROL

2.10 Ensure the default cgroup usage has been confirmedCIS Docker v1.7.0 L2 Docker - LinuxUnix

SYSTEM AND SERVICES ACQUISITION

2.11 Lock Out Accounts if Not Currently in UseCIS MySQL 8.0 Community Database L2 v1.1.0MySQLDB

ACCESS CONTROL

2.11 Lock Out Accounts if Not Currently in UseCIS Oracle MySQL Enterprise Edition 8.4 v1.0.0 L2 MySQL RDBMSMySQLDB

ACCESS CONTROL

3.1.3.2 Authenticate OSPF peers with MD5 authentication keysCIS Cisco NX-OS v1.2.0 L2Cisco

ACCESS CONTROL, CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

3.8 Ensure that object-level logging for write events is enabled for S3 bucketsCIS Amazon Web Services Foundations v5.0.0 L2amazon_aws

AUDIT AND ACCOUNTABILITY

3.9 Ensure that object-level logging for read events is enabled for S3 bucketsCIS Amazon Web Services Foundations v5.0.0 L2amazon_aws

AUDIT AND ACCOUNTABILITY

4.1.1.2 Ensure Logging Service is RunningCIS Google Container-Optimized OS v1.2.0 L2 ServerUnix

AUDIT AND ACCOUNTABILITY

4.2 Ensure excessive administrative privileges are revokedCIS PostgreSQL 12 DB v1.1.0PostgreSQLDB

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

4.2 Ensure excessive administrative privileges are revokedCIS PostgreSQL 9.6 OS v1.0.0Unix

ACCESS CONTROL

4.2 Ensure excessive administrative privileges are revokedCIS PostgreSQL 10 DB v1.0.0PostgreSQLDB

ACCESS CONTROL

4.2 Ensure excessive administrative privileges are revokedCIS PostgreSQL 16 DB v1.0.0PostgreSQLDB

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

4.2 Ensure excessive administrative privileges are revokedCIS PostgreSQL 11 DB v1.0.0PostgreSQLDB

CONFIGURATION MANAGEMENT

4.2 Ensure excessive administrative privileges are revokedCIS PostgreSQL 15 DB v1.1.0PostgreSQLDB

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

4.3 Ensure excessive administrative privileges are revokedCIS PostgreSQL 17 v1.0.0 L1 PostgreSQLPostgreSQLDB

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

4.3 Ensure excessive administrative privileges are revokedCIS PostgreSQL 13 DB v1.2.0PostgreSQLDB

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

4.3 Ensure excessive administrative privileges are revokedCIS PostgreSQL 14 DB v 1.2.0PostgreSQLDB

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

4.3 Ensure excessive administrative privileges are revokedCIS PostgreSQL 9.5 OS v1.1.0Unix

ACCESS CONTROL

4.3 Ensure usage of the 'root' account is monitoredCIS Amazon Web Services Foundations v5.0.0 L1amazon_aws

AUDIT AND ACCOUNTABILITY

4.7 Ensure disabling or scheduled deletion of customer created CMKs is monitoredCIS Amazon Web Services Foundations v5.0.0 L2amazon_aws

AUDIT AND ACCOUNTABILITY

4.11 Ensure Network Access Control List (NACL) changes are monitoredCIS Amazon Web Services Foundations v5.0.0 L2amazon_aws

AUDIT AND ACCOUNTABILITY

4.13 Ensure route table changes are monitoredCIS Amazon Web Services Foundations v5.0.0 L1amazon_aws

AUDIT AND ACCOUNTABILITY

5.6 Ensure Cloudwatch Log Group for Web Tier has a retention periodCIS Amazon Web Services Three-tier Web Architecture L1 1.0.0amazon_aws

AUDIT AND ACCOUNTABILITY

6.1 Ensure Root Domain Alias Record Points to ELBCIS Amazon Web Services Three-tier Web Architecture L2 1.0.0amazon_aws

SYSTEM AND COMMUNICATIONS PROTECTION

6.3 Ensure storage area network (SAN) resources are segregated properlyCIS VMware ESXi 6.5 v1.0.0 Level 1VMware

SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY

6.8 Run a host and/or network-based packet firewallCIS Sybase 15.0 L2 DB v1.1.0SybaseDB
6.9 Ensure Elastic IPs for the NAT Gateways are allocatedCIS Amazon Web Services Three-tier Web Architecture L1 1.0.0amazon_aws

SYSTEM AND COMMUNICATIONS PROTECTION

6.13 Ensure Routing Table associated with Web tier ELB subnet have the default route (0.0.0.0/0) defined to allow connectivityCIS Amazon Web Services Three-tier Web Architecture L1 1.0.0amazon_aws

SYSTEM AND COMMUNICATIONS PROTECTION

6.14 Ensure Routing Table associated with Web tier subnet have the default route (0.0.0.0/0) defined to allow connectivityCIS Amazon Web Services Three-tier Web Architecture L1 1.0.0amazon_aws

SYSTEM AND COMMUNICATIONS PROTECTION

6.15 Ensure Routing Table associated with App tier subnet have the default route (0.0.0.0/0) defined to allow connectivityCIS Amazon Web Services Three-tier Web Architecture L1 1.0.0amazon_aws

SYSTEM AND COMMUNICATIONS PROTECTION

6.17 Use a Web-Tier ELB Security Group to accept only HTTP/HTTPSCIS Amazon Web Services Three-tier Web Architecture L1 1.0.0amazon_aws

SYSTEM AND COMMUNICATIONS PROTECTION

6.21 Create the App tier ELB Security Group and ensure only accepts HTTP/HTTPSCIS Amazon Web Services Three-tier Web Architecture L1 1.0.0amazon_aws

SYSTEM AND COMMUNICATIONS PROTECTION

6.27 Ensure EC2 instances within Web Tier have no Elastic / Public IP addresses associatedCIS Amazon Web Services Three-tier Web Architecture L1 1.0.0amazon_aws

SYSTEM AND COMMUNICATIONS PROTECTION

6.28 Ensure EC2 instances within App Tier have no Elastic / Public IP addresses associatedCIS Amazon Web Services Three-tier Web Architecture L1 1.0.0amazon_aws

SYSTEM AND COMMUNICATIONS PROTECTION

6.30 Ensure RDS Database is not publically accessibleCIS Amazon Web Services Three-tier Web Architecture L2 1.0.0amazon_aws

SYSTEM AND COMMUNICATIONS PROTECTION

9.22 Find SUID/SGID System ExecutablesCIS Solaris 11.2 L1 v1.1.0Unix

ACCESS CONTROL

9.22 Find SUID/SGID System ExecutablesCIS Oracle Solaris 11.4 L1 v1.1.0Unix

CONFIGURATION MANAGEMENT

9.23 Find SUID/SGID System ExecutablesCIS Solaris 11.1 L1 v1.0.0Unix

ACCESS CONTROL

9.23 Find SUID/SGID System ExecutablesCIS Solaris 11 L1 v1.1.0Unix

ACCESS CONTROL

EX13-EG-000180 - The Exchange Sender filter must block unaccepted domains.DISA Microsoft Exchange 2013 Edge Transport Server STIG v1r6Windows

SYSTEM AND INFORMATION INTEGRITY

EX16-ED-000360 - The Exchange Sender filter must block unaccepted domains.DISA Microsoft Exchange 2016 Edge Transport Server STIG v2r5Windows

SYSTEM AND INFORMATION INTEGRITY

EX19-ED-000126 - The Exchange sender filter must block unaccepted domains.DISA Microsoft Exchange 2019 Edge Server STIG v2r2Windows

SYSTEM AND INFORMATION INTEGRITY

SOL-11.1-070160 - User .netrc files must not exist.DISA STIG Solaris 11 SPARC v3r1Unix

CONFIGURATION MANAGEMENT

SOL-11.1-070160 - User .netrc files must not exist.DISA STIG Solaris 11 X86 v3r1Unix

CONFIGURATION MANAGEMENT

SQL2-00-010500 - SQL Server auditing configuration maximum number of files must be configured to reduce the likelihood of storage capacity being exceeded, while meeting organization-defined auditing requirements - 'max_size'DISA STIG SQL Server 2012 DB Instance Security v1r20MS_SQLDB

AUDIT AND ACCOUNTABILITY