Item Search

NameAudit NamePluginCategory
2.2.2.2 Ensure 'Accept cookies' is set to 'From websites I visit' or 'From current website only'AirWatch - CIS Apple iOS 10 v2.0.0 End User Owned L1MDM
3.2 Ensure the PostgreSQL Audit Extension (pgAudit) is enabledCIS PostgreSQL 13 DB v1.2.0PostgreSQLDB

AUDIT AND ACCOUNTABILITY

3.2.2.2 Ensure 'Accept cookies' is set to 'From websites I visit' or 'From current website only'AirWatch - CIS Apple iOS 17 Institution Owned L1MDM

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

3.2.2.2 Ensure 'Accept cookies' is set to 'From websites I visit' or 'From current website only'AirWatch - CIS Apple iOS 11 v1.0.0 Institution Owned L1MDM
3.2.2.2 Ensure 'Accept cookies' is set to 'From websites I visit' or 'From current website only'MobileIron - CIS Apple iOS 18 v1.0.0 L1 Institution OwnedMDM

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

3.2.2.2 Ensure 'Accept cookies' is set to 'From websites I visit' or 'From current website only'MobileIron - CIS Apple iOS 14 and iPadOS 14 Institution Owned L1MDM

CONFIGURATION MANAGEMENT

3.2.2.2 Ensure 'Accept cookies' is set to 'From websites I visit' or 'From current website only'AirWatch - CIS Apple iOS 18 v1.0.0 L1 Institution OwnedMDM

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

3.2.2.2 Ensure 'Accept cookies' is set to 'From websites I visit' or `From current website only`AirWatch - CIS Apple iOS 12 v1.0.0 Institution Owned L1MDM
3.2.2.2 Ensure 'Accept cookies' is set to 'From websites I visit' or `From current website only`MobileIron - CIS Apple iOS 13 and iPadOS 13 Institution Owned L1MDM

CONFIGURATION MANAGEMENT

9.6 Ensure Timeout Limits for the Request Body is Set to 20 or LessCIS Apache HTTP Server 2.4 v2.2.0 L1Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

CD12-00-000500 - PostgreSQL must integrate with an organization-level authentication/access mechanism providing account management and automation for all users, groups, roles, and any other principals.DISA STIG Crunchy Data PostgreSQL OS v3r1Unix

ACCESS CONTROL

CD12-00-000700 - Privileges to change PostgreSQL software modules must be limited.DISA STIG Crunchy Data PostgreSQL OS v3r1Unix

CONFIGURATION MANAGEMENT

CD12-00-000710 - PostgreSQL must limit privileges to change functions and triggers, and links to software external to PostgreSQL.DISA STIG Crunchy Data PostgreSQL OS v3r1Unix

CONFIGURATION MANAGEMENT

CD12-00-000800 - If passwords are used for authentication, PostgreSQL must transmit only encrypted representations of passwords.DISA STIG Crunchy Data PostgreSQL OS v3r1Unix

IDENTIFICATION AND AUTHENTICATION

CD12-00-000900 - PostgreSQL must enforce approved authorizations for logical access to information and system resources in accordance with applicable access control policies.DISA STIG Crunchy Data PostgreSQL OS v3r1Unix

ACCESS CONTROL

CD12-00-001400 - PostgreSQL must uniquely identify and authenticate non-organizational users (or processes acting on behalf of non-organizational users).DISA STIG Crunchy Data PostgreSQL OS v3r1Unix

IDENTIFICATION AND AUTHENTICATION

CD12-00-001700 - PostgreSQL must associate organization-defined types of security labels having organization-defined security label values with information in storage.DISA STIG Crunchy Data PostgreSQL OS v3r1Unix

ACCESS CONTROL

CD12-00-002100 - PostgreSQL must allocate audit record storage capacity in accordance with organization-defined audit record storage requirements.DISA STIG Crunchy Data PostgreSQL OS v3r1Unix

AUDIT AND ACCOUNTABILITY

CD12-00-002300 - The audit information produced by PostgreSQL must be protected from unauthorized deletion.DISA STIG Crunchy Data PostgreSQL OS v3r1Unix

AUDIT AND ACCOUNTABILITY

CD12-00-002600 - PostgreSQL must allow only the Information System Security Manager (ISSM), or individuals or roles appointed by the ISSM, to select which auditable events are to be audited.DISA STIG Crunchy Data PostgreSQL OS v3r1Unix

AUDIT AND ACCOUNTABILITY

CD12-00-003100 - Database objects (including but not limited to tables, indexes, storage, trigger procedures, functions, links to software external to PostgreSQL, etc.) must be owned by database/DBMS principals authorized for ownership.DISA STIG Crunchy Data PostgreSQL OS v3r1Unix

CONFIGURATION MANAGEMENT

CD12-00-004000 - PostgreSQL must isolate security functions from non-security functions.DISA STIG Crunchy Data PostgreSQL OS v3r1Unix

SYSTEM AND COMMUNICATIONS PROTECTION

CD12-00-004150 - PostgreSQL must disable network functions, ports, protocols, and services deemed by the organization to be nonsecure, in accord with the Ports, Protocols, and Services Management (PPSM) guidance.DISA STIG Crunchy Data PostgreSQL OS v3r1Unix

CONFIGURATION MANAGEMENT

CD12-00-004200 - The audit information produced by PostgreSQL must be protected from unauthorized read access.DISA STIG Crunchy Data PostgreSQL OS v3r1Unix

AUDIT AND ACCOUNTABILITY

CD12-00-007700 - PostgreSQL must generate time stamps, for audit records and application data, with a minimum granularity of one second.DISA STIG Crunchy Data PostgreSQL DB v3r1PostgreSQLDB

AUDIT AND ACCOUNTABILITY

CD12-00-008400 - PostgreSQL must prohibit user installation of logic modules (functions, trigger procedures, views, etc.) without explicit privileged status.DISA STIG Crunchy Data PostgreSQL OS v3r1Unix

CONFIGURATION MANAGEMENT

CD12-00-008700 - PostgreSQL must implement cryptographic mechanisms to prevent unauthorized modification of organization-defined information at rest (to include, at a minimum, PII and classified information) on organization-defined information system components.DISA STIG Crunchy Data PostgreSQL DB v3r1PostgreSQLDB

SYSTEM AND COMMUNICATIONS PROTECTION

CD12-00-010700 - PostgreSQL must protect its audit features from unauthorized access.DISA STIG Crunchy Data PostgreSQL OS v3r1Unix

AUDIT AND ACCOUNTABILITY

CD12-00-011500 - PostgreSQL must uniquely identify and authenticate organizational users (or processes acting on behalf of organizational users).DISA STIG Crunchy Data PostgreSQL OS v3r1Unix

IDENTIFICATION AND AUTHENTICATION

CD12-00-012200 - PostgreSQL must protect its audit configuration from unauthorized modification.DISA STIG Crunchy Data PostgreSQL OS v3r1Unix

AUDIT AND ACCOUNTABILITY

CD12-00-012900 - PostgreSQL products must be a version supported by the vendor.DISA STIG Crunchy Data PostgreSQL OS v3r1Unix

SYSTEM AND SERVICES ACQUISITION

CIS_IBM_DB2_10_v1.1.0_Level_2_OS_Windows.audit from CIS DB2 10.x Windows OSCIS IBM DB2 v10 v1.1.0 Windows OS Level 2Windows
CIS_PostgreSQL_9.5_v1.1.0_L1_OS_Linux.audit from CIS PostgreSQL 9.5 Benchmark v1.1.0CIS PostgreSQL 9.5 OS v1.1.0Unix
CIS_PostgreSQL_10_v1.0.0_L1_OS_Linux.audit from CIS Benchmark for PostgreSQL 10CIS PostgreSQL 10 OS v1.0.0Unix
CIS_PostgreSQL_11_v1.0.0_L1_OS_Linux.audit from CIS Benchmark for PostgreSQL 11CIS PostgreSQL 11 OS v1.0.0Unix
CIS_PostgreSQL_12_v1.1.0_L1_OS_Linux.audit from CIS PostgreSQL 12 Benchmark v1.1.0CIS PostgreSQL 12 OS v1.1.0Unix
CIS_PostgreSQL_13_v1.2.0_L1_OS_Linux.audit from CIS PostgreSQL 13 Benchmark v1.2.0CIS PostgreSQL 13 OS v1.2.0Unix
CIS_PostgreSQL_16_v1.0.0_L1_OS_Linux.audit from CIS PostgreSQL 16 Benchmark v1.0.0CIS PostgreSQL 16 OS v1.0.0Unix
EPAS-00-000700 - The EDB Postgres Advanced Server must integrate with an organization-level authentication/access mechanism providing account management and automation for all users, groups, roles, and any other principals.EnterpriseDB PostgreSQL Advanced Server OS Linux v2r1Unix

ACCESS CONTROL

EPAS-00-000800 - The EDB Postgres Advanced Server must enforce approved authorizations for logical access to information and system resources in accordance with applicable access control policies.EnterpriseDB PostgreSQL Advanced Server OS Linux v2r1Unix

ACCESS CONTROL

EPAS-00-002800 - The audit information produced by the EDB Postgres Advanced Server must be protected from unauthorized deletion.EnterpriseDB PostgreSQL Advanced Server OS Linux v2r1Unix

AUDIT AND ACCOUNTABILITY

EPAS-00-003600 - The role(s)/group(s) used to modify database structure and logic modules must be restricted to authorized users.EnterpriseDB PostgreSQL Advanced Server OS Linux v2r1Unix

CONFIGURATION MANAGEMENT

EPAS-00-003800 - Unused database components, EDB Postgres Advanced Server software, and database objects must be removed.EnterpriseDB PostgreSQL Advanced Server OS Linux v2r1Unix

CONFIGURATION MANAGEMENT

EPAS-00-003900 - Unused database components which are integrated in the EDB Postgres Advanced Server and cannot be uninstalled must be disabled.EnterpriseDB PostgreSQL Advanced Server OS Linux v2r1Unix

CONFIGURATION MANAGEMENT

EPAS-00-004400 - If passwords are used for authentication, the EDB Postgres Advanced Server must transmit only encrypted representations of passwords.EnterpriseDB PostgreSQL Advanced Server OS Linux v2r1Unix

IDENTIFICATION AND AUTHENTICATION

EPAS-00-008700 - The EDB Postgres Advanced Server must disable network functions, ports, protocols, and services deemed by the organization to be nonsecure, in accord with the Ports, Protocols, and Services Management (PPSM) guidance.EnterpriseDB PostgreSQL Advanced Server OS Linux v2r1Unix

CONFIGURATION MANAGEMENT

EPAS-00-009100 - The EDB Postgres Advanced Server must only accept end entity certificates issued by DOD PKI or DOD-approved PKI Certification Authorities (CAs) for the establishment of all encrypted sessions.EnterpriseDB PostgreSQL Advanced Server OS Linux v2r1Unix

SYSTEM AND COMMUNICATIONS PROTECTION

EPAS-00-009500 - The EDB Postgres Advanced Server must maintain the confidentiality and integrity of information during preparation for transmission.EnterpriseDB PostgreSQL Advanced Server OS Linux v2r1Unix

SYSTEM AND COMMUNICATIONS PROTECTION

EPAS-00-013200 - EDB Postgres Advanced Server products must be a version supported by the vendor.EnterpriseDB PostgreSQL Advanced Server OS Linux v2r1Unix

SYSTEM AND SERVICES ACQUISITION

RHEL-09-251015 - The firewalld service on RHEL 9 must be active.DISA Red Hat Enterprise Linux 9 STIG v2r4Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT