Item Search

NameAudit NamePluginCategory
1.5.2 Set Permissions on /etc/grub.confCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

ACCESS CONTROL

1.8.6.1 Ensure 'Default File Format' is set to Enabled (Word Document (.docx))CIS Microsoft Office Word 2013 v1.1.0Windows

CONFIGURATION MANAGEMENT

1.8.6.1 Ensure 'Default File Format' is set to Enabled (Word Document (.docx))CIS Microsoft Office Word 2016 v1.1.0Windows

CONFIGURATION MANAGEMENT

2.2.7 Ensure 'Back up files and directories' is set to 'Administrators'CIS Microsoft Windows 8.1 v2.4.1 L1Windows

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

2.2.10 Ensure 'Create a pagefile' is set to 'Administrators'CIS Microsoft Windows 8.1 v2.4.1 L1Windows

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

2.2.12 Ensure 'Create global objects' is set to 'Administrators, LOCAL SERVICE, NETWORK SERVICE, SERVICE'CIS Microsoft Windows 8.1 v2.4.1 L1Windows

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

2.2.14 Configure 'Create symbolic links'CIS Microsoft Windows 8.1 v2.4.1 L1Windows

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

2.2.22 Ensure 'Force shutdown from a remote system' is set to 'Administrators'CIS Microsoft Windows 8.1 v2.4.1 L1Windows

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

2.2.25 Ensure 'Increase scheduling priority' is set to 'Administrators' - AdministratorsCIS Microsoft Windows 8.1 v2.4.1 L1Windows

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

2.2.26 Ensure 'Load and unload device drivers' is set to 'Administrators'CIS Microsoft Windows 8.1 v2.4.1 L1Windows

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

2.5 Ensure firewall filters contain explicit deny and log termCIS Juniper OS Benchmark v2.1.0 L2Juniper

SYSTEM AND COMMUNICATIONS PROTECTION

2.6 Ensure firewall filters contain explicit deny and log termCIS Juniper OS Benchmark v2.1.0 L2Juniper

SYSTEM AND COMMUNICATIONS PROTECTION

3.1.3 Forbid Dial in AccessCIS Juniper OS Benchmark v2.1.0 L2Juniper

IDENTIFICATION AND AUTHENTICATION, SYSTEM AND INFORMATION INTEGRITY

3.1.4 Prevent Other Programs from Using Avahi's Port - disallow-other-stacks=yesCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

CONFIGURATION MANAGEMENT

3.5 Ensure proxy-arp is disabledCIS Juniper OS Benchmark v2.1.0 L2Juniper

SYSTEM AND COMMUNICATIONS PROTECTION

3.8 Disable NFS and RPC - nfslockCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

CONFIGURATION MANAGEMENT

3.8 Disable NFS and RPC - portmapCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

CONFIGURATION MANAGEMENT

3.8 Disable NFS and RPC - rpcgssdCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

CONFIGURATION MANAGEMENT

3.8 Disable NFS and RPC - rpcidmapdCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

CONFIGURATION MANAGEMENT

3.10 Ensure inbound firewall filter is set for Loopback interfaceCIS Juniper OS Benchmark v2.1.0 L2Juniper

CONFIGURATION MANAGEMENT

4.1.6 Ensure RPKI is set for Origin Validation of EBGP peersCIS Juniper OS Benchmark v2.1.0 L2Juniper

SYSTEM AND COMMUNICATIONS PROTECTION

4.2.2 Ensure IS-IS neighbor authentication is set to SHA1CIS Juniper OS Benchmark v2.1.0 L2Juniper

IDENTIFICATION AND AUTHENTICATION

4.5 Configure Solaris AuditingCIS Oracle Solaris 11.4 L1 v1.1.0Unix

AUDIT AND ACCOUNTABILITY

4.7.2 Ensure authentication is set to AES-CMACCIS Juniper OS Benchmark v2.1.0 L2Juniper

IDENTIFICATION AND AUTHENTICATION

4.12.2 Ensure LLDP-MED is Disabled if not RequiredCIS Juniper OS Benchmark v2.1.0 L2Juniper

CONFIGURATION MANAGEMENT

5.1 Ensure 'Maximum number of error log files' is set to greater than or equal to '12'CIS SQL Server 2008 R2 DB Engine L1 v1.7.0MS_SQLDB

AUDIT AND ACCOUNTABILITY

5.1 Ensure 'Maximum number of error log files' is set to greater than or equal to '12'CIS SQL Server 2014 Database L1 DB v1.5.0MS_SQLDB

AUDIT AND ACCOUNTABILITY

5.2.5 Ensure Complex Password Must Contain Special Character Is ConfiguredCIS Apple macOS 10.15 Catalina v3.0.0 L2Unix

IDENTIFICATION AND AUTHENTICATION

5.3.4 Enable Auditing for Processes That Start Prior to auditdCIS Red Hat Enterprise Linux 5 L2 v2.2.1Unix

AUDIT AND ACCOUNTABILITY

5.9 Ensure SNMP is set to OOB management onlyCIS Juniper OS Benchmark v2.1.0 L2Juniper

SYSTEM AND COMMUNICATIONS PROTECTION

6.2.12 Set Idle Timeout Interval for User Login - ClientAliveCountMaxCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

ACCESS CONTROL

6.2.12 Set Idle Timeout Interval for User Login - ClientAliveInterval <= 300CIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

ACCESS CONTROL

6.10.1.10 Ensure Only Suite B Key Exchange Methods are set for SSH - key-exchange restrictionCIS Juniper OS Benchmark v2.1.0 L2Juniper

IDENTIFICATION AND AUTHENTICATION

7.5 Lock Inactive User Accounts - INACTIVE=35CIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

ACCESS CONTROL

8.3.4 (L1) Ensure standard processes are used for VM deploymentCIS VMware ESXi 7.0 v1.4.0 L1VMware

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

8.3.4 Ensure standard processes are used for VM deploymentCIS VMware ESXi 6.7 v1.3.0 Level 1VMware

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

9.1.1 Verify System File PermissionsCIS Red Hat Enterprise Linux 5 L2 v2.2.1Unix

ACCESS CONTROL

9.1.2 Verify Permissions on /etc/passwdCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

ACCESS CONTROL

9.1.3 Verify Permissions on /etc/shadowCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

ACCESS CONTROL

9.1.4 Verify Permissions on /etc/gshadowCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

ACCESS CONTROL

ALMA-09-012010 - AlmaLinux OS 9 cron configuration directories must have a mode of 0700 or less permissive.DISA CloudLinux AlmaLinux OS 9 STIG v1r2Unix

CONFIGURATION MANAGEMENT

CIS_Kubernetes_v1.10.0_Level_1_Master.audit from CIS Kubernetes Benchmark v1.10.0CIS Kubernetes v1.10.0 L1 MasterUnix
CIS_NGINX_v2.1.0_Level_2_Proxy.audit from CIS NGINX Benchmark v2.1.0CIS NGINX Benchmark v2.1.0 L2 ProxyUnix
MYS8-00-009800 - The MySQL Database Server 8.0 must provide a warning to appropriate support staff when allocated audit record storage volume reaches 75 percent of maximum audit record storage capacity.DISA Oracle MySQL 8.0 v2r2 DBMySQLDB

AUDIT AND ACCOUNTABILITY

O121-OS-011200 - The OS must limit privileges to change the DBMS software resident within software libraries (including privileged programs).DISA STIG Oracle 12c v3r2 LinuxUnix

CONFIGURATION MANAGEMENT

OH12-1X-000234 - OHS must not have the directive PlsqlDatabasePassword set in clear text.DISA STIG Oracle HTTP Server 12.1.3 v2r3Unix

CONFIGURATION MANAGEMENT

SQL2-00-009900 - OS and domain accounts utilized to run external procedures called by SQL Server must have limited privileges.DISA STIG SQL Server 2012 Database OS Audit v1r20Windows

CONFIGURATION MANAGEMENT

WG205 A22 - The web document (home) directory must be in a separate partition from the web server's system files.DISA STIG Apache Site 2.2 Unix v1r11Unix

CONFIGURATION MANAGEMENT

WG205 A22 - The web document (home) directory must be in a separate partition from the web server's system files.DISA STIG Apache Site 2.2 Unix v1r11 MiddlewareUnix

CONFIGURATION MANAGEMENT

WG205 W22 - The web document (home) directory must be in a separate partition from the web server's system files. - 'ErrorLog'DISA STIG Apache Site 2.2 Windows v1r13Windows

AUDIT AND ACCOUNTABILITY