Item Search

NameAudit NamePluginCategory
1.2.1 Ensure GPG keys are configuredCIS Amazon Linux 2 STIG v2.0.0 L1 WorkstationUnix

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

1.2.1 Ensure GPG keys are configuredCIS SUSE Linux Enterprise 12 v3.2.1 L1 ServerUnix

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

1.2.1.2 Ensure gpgcheck is globally activatedCIS AlmaLinux OS 9 v2.0.0 L1 ServerUnix

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

1.2.2 Ensure gpgcheck is globally activatedCIS Oracle Linux 6 Server L1 v2.0.0Unix

SYSTEM AND INFORMATION INTEGRITY

1.2.2 Ensure gpgcheck is globally activatedCIS Red Hat 6 Workstation L1 v3.0.0Unix

SYSTEM AND INFORMATION INTEGRITY

1.2.2 Ensure gpgcheck is globally activatedCIS Amazon Linux 2023 Server L1 v1.0.0Unix

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

1.2.2 Ensure gpgcheck is globally activatedCIS Red Hat EL8 Server L1 v3.0.0Unix

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

1.2.3 Ensure gpgcheck is globally activatedCIS Aliyun Linux 2 L1 v1.0.0Unix

SYSTEM AND INFORMATION INTEGRITY

1.2.3 Ensure gpgcheck is globally activated - /etc/yum.repos.d/*.repoCIS Fedora 19 Family Linux Server L1 v1.0.0Unix

SYSTEM AND INFORMATION INTEGRITY

1.3.3 Ensure GPG keys are configuredCIS Ubuntu Linux 20.04 LTS Workstation L1 v2.0.1Unix

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

1.3.3 Ensure GPG keys are configuredCIS Ubuntu Linux 18.04 LTS v2.2.0 L1 WorkstationUnix

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

1.7.3 Ensure GDM disable-user-list option is enabledCIS Ubuntu Linux 22.04 LTS v2.0.0 L1 WorkstationUnix

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

1.7.3 Ensure GDM disable-user-list option is enabledCIS Red Hat Enterprise Linux 7 v4.0.0 L1 ServerUnix

IDENTIFICATION AND AUTHENTICATION

1.7.3 Ensure GDM disable-user-list option is enabledCIS Red Hat Enterprise Linux 7 v4.0.0 L1 WorkstationUnix

IDENTIFICATION AND AUTHENTICATION

1.7.3 Ensure GDM disable-user-list option is enabledCIS CentOS Linux 7 v4.0.0 L1 ServerUnix

IDENTIFICATION AND AUTHENTICATION

1.7.3 Ensure GDM disable-user-list option is enabledCIS CentOS Linux 7 v4.0.0 L1 WorkstationUnix

IDENTIFICATION AND AUTHENTICATION

1.8.3 Ensure GDM disable-user-list option is enabledCIS AlmaLinux OS 9 v2.0.0 L1 ServerUnix

IDENTIFICATION AND AUTHENTICATION

1.8.3 Ensure GDM disable-user-list option is enabledCIS Oracle Linux 9 v2.0.0 L1 ServerUnix

IDENTIFICATION AND AUTHENTICATION

1.8.3 Ensure GDM disable-user-list option is enabledCIS SUSE Linux Enterprise 15 v2.0.1 L1 WorkstationUnix

IDENTIFICATION AND AUTHENTICATION

1.8.3 Ensure GDM disable-user-list option is enabledCIS Rocky Linux 8 Workstation L1 v2.0.0Unix

IDENTIFICATION AND AUTHENTICATION

1.8.3 Ensure GDM disable-user-list option is enabledCIS Oracle Linux 9 v2.0.0 L1 WorkstationUnix

IDENTIFICATION AND AUTHENTICATION

1.8.3 Ensure GDM disable-user-list option is enabledCIS Red Hat Enterprise Linux 9 v2.0.0 L1 WorkstationUnix

IDENTIFICATION AND AUTHENTICATION

AIOS-18-010850 - Apple iOS/iPadOS 18 must implement the management setting: not allow use of iPhone widgets on Mac.MobileIron - DISA Apple iOS/iPadOS 18 v1r1MDM

CONFIGURATION MANAGEMENT

AIOS-18-014900 - Apple iOS/iPadOS 18 must disable the installation of alternative marketplace apps.MobileIron - DISA Apple iOS/iPadOS 18 v1r1MDM

CONFIGURATION MANAGEMENT

CASA-FW-000230 - The Cisco ASA must be configured to filter inbound traffic on all external interfaces - ACLDISA STIG Cisco ASA FW v2r1Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

CISC-RT-000570 - The Cisco BGP router must be configured to limit the prefix size on any inbound route advertisement to /24 or the least significant prefixes issued to the customer.DISA Cisco IOS Router RTR STIG v3r3Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

DTOO127 - Add-ins to Office applications must be signed by a Trusted PublisherDISA STIG Microsoft Office Access 2016 v1r1Windows

CONFIGURATION MANAGEMENT

GEN000000-AIX00020 - AIX Trusted Computing Base (TCB) software must be implemented.DISA STIG AIX 6.1 v1r14Unix

ACCESS CONTROL, SYSTEM AND SERVICES ACQUISITION

GEN000950 - The root account's list of preloaded libraries must be empty.DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

CONFIGURATION MANAGEMENT

GEN000950 - The root accounts list of preloaded libraries must be empty.DISA STIG for Oracle Linux 5 v2r1Unix

CONFIGURATION MANAGEMENT

GEN001610 - Run control scripts' lists of preloaded libraries must contain only absolute paths.DISA STIG AIX 5.3 v1r2Unix

CONFIGURATION MANAGEMENT

GEN001850 - Global initialization files lists of preloaded libraries must contain only authorized paths - '/etc/bashrc'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

CONFIGURATION MANAGEMENT

GEN001850 - Global initialization files lists of preloaded libraries must contain only authorized paths - '/etc/csh.logout'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

CONFIGURATION MANAGEMENT

GEN001850 - Global initialization files lists of preloaded libraries must contain only authorized paths - '/etc/environment'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

CONFIGURATION MANAGEMENT

GEN001850 - Global initialization files' lists of preloaded libraries must contain only absolute paths - '/etc/security/environ'DISA STIG AIX 5.3 v1r2Unix

CONFIGURATION MANAGEMENT

GEN001902 - Local initialization files' lists of preloaded libraries must contain only absolute paths.DISA STIG AIX 5.3 v1r2Unix

CONFIGURATION MANAGEMENT

GEN002800 - The audit system must be configured to audit login, logout, and session initiation - flags +lo and -loDISA STIG Solaris 10 X86 v2r4Unix

AUDIT AND ACCOUNTABILITY

GEN002800 - The audit system must be configured to audit login, logout, and session initiation - naflags +lo and -loDISA STIG Solaris 10 X86 v2r4Unix

AUDIT AND ACCOUNTABILITY

GEN002800 - The audit system must be configured to audit login, logout, and session initiation - naflags loDISA STIG Solaris 10 X86 v2r4Unix

AUDIT AND ACCOUNTABILITY

Require that application add-ins are signed by Trusted Publisher - powerpointMSCT M365 Apps for enterprise 2312 v1.0.0Windows

SYSTEM AND INFORMATION INTEGRITY

Require that application add-ins are signed by Trusted Publisher - publisherMSCT M365 Apps for enterprise 2412 v1.0.0Windows

SYSTEM AND INFORMATION INTEGRITY

Require that application add-ins are signed by Trusted Publisher - requireaddinsigMSCT M365 Apps for enterprise 2312 v1.0.0Windows

SYSTEM AND INFORMATION INTEGRITY

Require that application add-ins are signed by Trusted Publisher - requireaddinsig - excelMicrosoft 365 Apps for Enterprise 2306 v1.0.0Windows

SYSTEM AND INFORMATION INTEGRITY

Require that application add-ins are signed by Trusted Publisher - requireaddinsig - ms projectMSCT Microsoft 365 Apps for Enterprise 2206 v1.0.0Windows

SYSTEM AND INFORMATION INTEGRITY

Require that application add-ins are signed by Trusted Publisher - wordMSCT M365 Apps for enterprise 2312 v1.0.0Windows

SYSTEM AND INFORMATION INTEGRITY

SOL-11.1-020140 - The TFTP service daemon must not be installed unless required.DISA STIG Solaris 11 SPARC v3r1Unix

CONFIGURATION MANAGEMENT

SOL-11.1-020140 - The TFTP service daemon must not be installed unless required.DISA STIG Solaris 11 X86 v3r1Unix

CONFIGURATION MANAGEMENT

SYMP-AG-000660 - Symantec ProxySG providing content filtering must send an alert to, at a minimum, the ISSO and ISSM when detection events occur.DISA Symantec ProxySG Benchmark ALG v1r3BlueCoat

SYSTEM AND INFORMATION INTEGRITY

System settings: Use Certificate Rules on Windows Executables for Software Restriction PoliciesMSCT Windows Server 2012 R2 MS v1.0.0Windows

SYSTEM AND INFORMATION INTEGRITY

System settings: Use Certificate Rules on Windows Executables for Software Restriction PoliciesMSCT Windows Server 2012 R2 DC v1.0.0Windows

SYSTEM AND INFORMATION INTEGRITY