Item Search

NameAudit NamePluginCategory
1.1.1 - AirWatch - Update firmware to latest versionAirWatch - CIS Apple iOS 8 v1.0.0 L1MDM

ACCESS CONTROL

1.1.1 - AirWatch - Update firmware to latest versionAirWatch - CIS Apple iOS 9 v1.0.0 L1MDM

ACCESS CONTROL

1.1.1 - MobileIron - Update firmware to latest versionMobileIron - CIS Apple iOS 9 v1.0.0 L1MDM

CONFIGURATION MANAGEMENT

1.1.2.1 console authenticationCIS Cisco IOS XR 7.x v1.0.1 L1Cisco

ACCESS CONTROL

1.2 Apply Latest OS PatchesCIS Solaris 10 L1 v5.2Unix
2.1.1.3.2.4 Ensure 'Require that application add-ins are signed by Trusted Publisher' is set to 'Enabled'CIS Microsoft Office Enterprise v1.2.0 L1Windows

CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY

2.3.10.9 (L1) Ensure 'Network access: Restrict anonymous access to Named Pipes and Shares' is set to 'Enabled'CIS Microsoft Windows 8.1 v2.4.1 L1 BitlockerWindows

ACCESS CONTROL

2.3.10.9 Ensure 'Network access: Restrict anonymous access to Named Pipes and Shares' is set to 'Enabled'CIS Windows 7 Workstation Level 1 + Bitlocker v3.2.0Windows

ACCESS CONTROL

4.1.3.8 Ensure events that modify user/group information are collectedCIS CentOS Linux 8 Workstation L2 v2.0.0Unix

AUDIT AND ACCOUNTABILITY

4.1.3.8 Ensure events that modify user/group information are collectedCIS Fedora 28 Family Linux Server L2 v2.0.0Unix

AUDIT AND ACCOUNTABILITY

4.1.6 Ensure events that modify the system's network environment are collected - 64b sethostnameCIS Amazon Linux v2.1.0 L2Unix

AUDIT AND ACCOUNTABILITY

4.1.6 Ensure events that modify the system's network environment are collected - auditctl 64b sethostnameCIS Amazon Linux v2.1.0 L2Unix

AUDIT AND ACCOUNTABILITY

5.2.3.8 Ensure events that modify user/group information are collectedCIS CentOS Linux 7 v4.0.0 L2 WorkstationUnix

AUDIT AND ACCOUNTABILITY

5.2.3.8 Ensure events that modify user/group information are collectedCIS AlmaLinux OS 8 Server L2 v3.0.0Unix

AUDIT AND ACCOUNTABILITY

5.2.3.8 Ensure events that modify user/group information are collectedCIS Rocky Linux 8 Server L2 v2.0.0Unix

AUDIT AND ACCOUNTABILITY

6.3.1 Review Organization's Policies Against Db2 RCAC PoliciesCIS IBM DB2 11 v1.1.0 Database Level 1IBM_DB2DB

ACCESS CONTROL, MEDIA PROTECTION

6.3.3.2 Ensure actions as another user are always loggedCIS Ubuntu Linux 22.04 LTS v2.0.0 L2 ServerUnix

AUDIT AND ACCOUNTABILITY

7.3 Enable Extension Block ListCIS Mozilla Firefox 38 ESR Linux L1 v1.0.0Unix

CONFIGURATION MANAGEMENT

7.3 Enable Extension Block ListCIS Mozilla Firefox 38 ESR Windows L1 v1.0.0Windows

CONFIGURATION MANAGEMENT

FireEye - AAA is enabledTNS FireEyeFireEye

IDENTIFICATION AND AUTHENTICATION

FireEye - Email encryption certificates are verifiedTNS FireEyeFireEye

IDENTIFICATION AND AUTHENTICATION

FireEye - Greylists are enabledTNS FireEyeFireEye

CONFIGURATION MANAGEMENT

FireEye - Guest imagesTNS FireEyeFireEye

CONFIGURATION MANAGEMENT

FireEye - Remote syslog is enabledTNS FireEyeFireEye

AUDIT AND ACCOUNTABILITY

FireEye - Remote syslog logging level includes all errors and warningsTNS FireEyeFireEye

AUDIT AND ACCOUNTABILITY

FireEye - SNMP uses a secure community stringTNS FireEyeFireEye

IDENTIFICATION AND AUTHENTICATION

FireEye - SSH connections must be SSHv2TNS FireEyeFireEye

CONFIGURATION MANAGEMENT

FireEye - User 'admin' SSH access is disabledTNS FireEyeFireEye

ACCESS CONTROL

FireEye - YARA policy applies both customer and FireEye rulesTNS FireEyeFireEye

SECURITY ASSESSMENT AND AUTHORIZATION

JUSX-IP-000016 - To protect against unauthorized data mining, the Juniper Networks SRX Series Gateway IDPS must detect SQL injection attacks launched against data storage objects, including, at a minimum, databases, database records, and database fields.DISA Juniper SRX Services Gateway IDPS v2r1Juniper

ACCESS CONTROL

PHTN-40-000012 The Photon operating system must monitor remote access logins.DISA VMware vSphere 8.0 vCenter Appliance Photon OS 4.0 STIG v2r1Unix

ACCESS CONTROL

RHEL-07-010100 - The Red Hat Enterprise Linux operating system must initiate a session lock for the screensaver after a period of inactivity for graphical user interfaces.DISA Red Hat Enterprise Linux 7 STIG v3r15Unix

ACCESS CONTROL

RHEL-07-010101 - The Red Hat Enterprise Linux operating system must prevent a user from overriding the screensaver idle-activation-enabled setting for the graphical user interface.DISA Red Hat Enterprise Linux 7 STIG v3r15Unix

ACCESS CONTROL

RHEL-07-010250 - The Red Hat Enterprise Linux operating system must be configured so that passwords for new users are restricted to a 60-day maximum lifetime.DISA Red Hat Enterprise Linux 7 STIG v3r15Unix

IDENTIFICATION AND AUTHENTICATION

RHEL-07-020101 - The Red Hat Enterprise Linux operating system must be configured so that the Datagram Congestion Control Protocol (DCCP) kernel module is disabled unless required.DISA Red Hat Enterprise Linux 7 STIG v3r15Unix

IDENTIFICATION AND AUTHENTICATION

RHEL-07-020610 - The Red Hat Enterprise Linux operating system must be configured so that all local interactive user accounts, upon creation, are assigned a home directory.DISA Red Hat Enterprise Linux 7 STIG v3r15Unix

CONFIGURATION MANAGEMENT

RHEL-07-020630 - The Red Hat Enterprise Linux operating system must be configured so that all local interactive user home directories have mode 0750 or less permissive.DISA Red Hat Enterprise Linux 7 STIG v3r15Unix

CONFIGURATION MANAGEMENT

RHEL-07-020640 - The Red Hat Enterprise Linux operating system must be configured so that all local interactive user home directories are owned by their respective users.DISA Red Hat Enterprise Linux 7 STIG v3r15Unix

CONFIGURATION MANAGEMENT

RHEL-07-021600 - The Red Hat Enterprise Linux operating system must be configured so that the file integrity tool is configured to verify Access Control Lists (ACLs).DISA Red Hat Enterprise Linux 7 STIG v3r15Unix

CONFIGURATION MANAGEMENT

RHEL-07-030870 - The Red Hat Enterprise Linux operating system must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/passwd.DISA Red Hat Enterprise Linux 7 STIG v3r15Unix

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

RHEL-07-030871 - The Red Hat Enterprise Linux operating system must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/group.DISA Red Hat Enterprise Linux 7 STIG v3r15Unix

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

RHEL-07-030873 - The Red Hat Enterprise Linux operating system must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/shadow.DISA Red Hat Enterprise Linux 7 STIG v3r15Unix

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

RHEL-07-040420 - The Red Hat Enterprise Linux operating system must be configured so that the SSH private host key files have mode 0640 or less permissive.DISA Red Hat Enterprise Linux 7 STIG v3r15Unix

CONFIGURATION MANAGEMENT

RHEL-07-040450 - The Red Hat Enterprise Linux operating system must be configured so that the SSH daemon performs strict mode checking of home directory configuration files.DISA Red Hat Enterprise Linux 7 STIG v3r15Unix

CONFIGURATION MANAGEMENT

RHEL-07-040640 - The Red Hat Enterprise Linux operating system must prevent Internet Protocol version 4 (IPv4) Internet Control Message Protocol (ICMP) redirect messages from being accepted.DISA Red Hat Enterprise Linux 7 STIG v3r15Unix

CONFIGURATION MANAGEMENT

RHEL-07-040810 - The Red Hat Enterprise Linux operating system access control program must be configured to grant or deny system access to specific hosts and services.DISA Red Hat Enterprise Linux 7 STIG v3r15Unix

CONFIGURATION MANAGEMENT

VCLD-70-000008 - The rsyslog must be configured to monitor VAMI logs.DISA STIG VMware vSphere 7.0 VAMI v1r2Unix

AUDIT AND ACCOUNTABILITY

VM : minimize-console-VNC-useVMWare vSphere 6.0 Hardening GuideVMware

CONFIGURATION MANAGEMENT

WBLC-10-000270 - Oracle WebLogic must be integrated with a tool to monitor audit subsystem failure notification information that is sent out (e.g., the recipients of the message and the nature of the failure).Oracle WebLogic Server 12c Linux v2r2Unix

CONFIGURATION MANAGEMENT

WBLC-10-000270 - Oracle WebLogic must be integrated with a tool to monitor audit subsystem failure notification information that is sent out (e.g., the recipients of the message and the nature of the failure).Oracle WebLogic Server 12c Linux v2r2 MiddlewareUnix

CONFIGURATION MANAGEMENT