Item Search

NameAudit NamePluginCategory
1.1 Ensure the appropriate MongoDB software version/patches are installedCIS MongoDB 3.6 Database Audit L1 v1.1.0MongoDB

SYSTEM AND SERVICES ACQUISITION

1.3.2 Ensure filesystem integrity is regularly checkedCIS Amazon Linux 2 STIG v2.0.0 STIGUnix

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

1.3.2 Ensure filesystem integrity is regularly checkedCIS Red Hat Enterprise Linux 7 STIG v2.0.0 L1 ServerUnix

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

1.3.2 Ensure filesystem integrity is regularly checkedCIS Red Hat Enterprise Linux 7 STIG v2.0.0 L1 WorkstationUnix

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

1.3.2 Ensure filesystem integrity is regularly checkedCIS Fedora 28 Family Linux Server L1 v2.0.0Unix

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

1.3.2 Ensure filesystem integrity is regularly checkedCIS CentOS Linux 8 Server L1 v2.0.0Unix

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

1.3.2 Ensure filesystem integrity is regularly checkedCIS CentOS Linux 8 Workstation L1 v2.0.0Unix

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

1.3.2 Ensure filesystem integrity is regularly checkedCIS Amazon Linux 2 STIG v2.0.0 L1 ServerUnix

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

1.3.2 Ensure filesystem integrity is regularly checked - aideCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIGUnix

CONFIGURATION MANAGEMENT

1.3.2 Ensure filesystem integrity is regularly checked - cronCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIGUnix

CONFIGURATION MANAGEMENT

1.3.2 Ensure filesystem integrity is regularly checked - mailCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIGUnix

CONFIGURATION MANAGEMENT

1.4.2 Ensure filesystem integrity is regularly checkedCIS Fedora 19 Family Linux Server L1 v1.0.0Unix

AUDIT AND ACCOUNTABILITY

1.4.2 Ensure filesystem integrity is regularly checkedCIS Fedora 19 Family Linux Workstation L1 v1.0.0Unix

AUDIT AND ACCOUNTABILITY

2.1.1 Ensure only required modules are installedCIS NGINX Benchmark v2.1.0 L2 ProxyUnix

CONFIGURATION MANAGEMENT

2.1.1 Ensure only required modules are installedCIS NGINX Benchmark v2.1.0 L2 LoadbalancerUnix

CONFIGURATION MANAGEMENT

5.3.2 Ensure filesystem integrity is regularly checkedCIS Red Hat Enterprise Linux 7 v4.0.0 L1 ServerUnix

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

5.3.2 Ensure filesystem integrity is regularly checkedCIS AlmaLinux OS 8 Workstation L1 v3.0.0Unix

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

5.3.2 Ensure filesystem integrity is regularly checkedCIS CentOS Linux 7 v4.0.0 L1 WorkstationUnix

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

5.3.2 Ensure filesystem integrity is regularly checkedCIS Red Hat EL8 Workstation L1 v3.0.0Unix

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

5.3.2 Ensure filesystem integrity is regularly checkedCIS Oracle Linux 7 v4.0.0 L1 ServerUnix

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

5.3.2 Ensure filesystem integrity is regularly checkedCIS Amazon Linux 2 v3.0.0 L1Unix

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

5.3.2 Ensure filesystem integrity is regularly checkedCIS CentOS Linux 7 v4.0.0 L1 ServerUnix

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

5.3.2 Ensure filesystem integrity is regularly checkedCIS Red Hat Enterprise Linux 7 v4.0.0 L1 WorkstationUnix

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

5.3.2 Ensure filesystem integrity is regularly checkedCIS Rocky Linux 8 Server L1 v2.0.0Unix

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

6.1.2 Ensure filesystem integrity is regularly checkedCIS SUSE Linux Enterprise 15 v2.0.1 L1 ServerUnix

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

6.1.2 Ensure filesystem integrity is regularly checkedCIS Red Hat Enterprise Linux 9 v2.0.0 L1 WorkstationUnix

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

6.1.2 Ensure filesystem integrity is regularly checkedCIS Oracle Linux 9 v2.0.0 L1 ServerUnix

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

6.1.2 Ensure filesystem integrity is regularly checkedCIS Rocky Linux 9 v2.0.0 L1 ServerUnix

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

6.1.2 Ensure filesystem integrity is regularly checkedCIS AlmaLinux OS 9 v2.0.0 L1 WorkstationUnix

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

6.1.2 Ensure filesystem integrity is regularly checkedCIS SUSE Linux Enterprise 15 v2.0.1 L1 WorkstationUnix

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

20.65 Ensure 'The system must have the Roles and Features required for it documented'CIS Microsoft Windows Server 2019 STIG v3.0.0 STIG DCWindows

CONFIGURATION MANAGEMENT

DB2X-00-003100 - Database software, including DBMS configuration files, must be stored in dedicated directories, separate from the host OS and other applications.DISA STIG IBM DB2 v10.5 LUW v2r1 OS WindowsWindows

CONFIGURATION MANAGEMENT

DTOO117 - The Saved from URL mark must be selected to enforce Internet zone processing.DISA STIG Microsoft Visio 2013 v1r5Windows

SYSTEM AND COMMUNICATIONS PROTECTION

DTOO126 - Add-on Management functionality must be allowed.DISA STIG Microsoft Visio 2013 v1r5Windows

SYSTEM AND COMMUNICATIONS PROTECTION

Ensure TCP Wrappers is installed - rpmTenable Cisco Firepower Management Center OS Best Practices AuditUnix

SYSTEM AND COMMUNICATIONS PROTECTION

IISW-SI-000217 - The IIS 8.5 website must have Web Distributed Authoring and Versioning (WebDAV) disabled.DISA IIS 8.5 Site v2r9Windows

CONFIGURATION MANAGEMENT

Server version information parameters should be turned off - 'ServerSignature Off'TNS IBM HTTP Server Best Practice MiddlewareUnix

SYSTEM AND COMMUNICATIONS PROTECTION

SOL-11.1-020220 - The operating system must be configured to provide essential capabilities.DISA STIG Solaris 11 X86 v3r1Unix

CONFIGURATION MANAGEMENT

SOL-11.1-020230 - The operating system must employ automated mechanisms to prevent program execution in accordance with the organization-defined specifications.DISA STIG Solaris 11 SPARC v3r1Unix

CONFIGURATION MANAGEMENT

VCLU-70-000027 - Lookup Service must use a logging mechanism that is configured to allocate log record storage capacity large enough to accommodate the logging requirements of the web server.DISA STIG VMware vSphere 7.0 Lookup Service v1r2Unix

AUDIT AND ACCOUNTABILITY

VCPF-67-000008 - Performance Charts application files must be verified for their integrity.DISA STIG VMware vSphere 6.7 Perfcharts Tomcat v1r3Unix

CONFIGURATION MANAGEMENT

VCWN-65-000012 - The vCenter Server for Windows must disable the distributed virtual switch health check.DISA STIG VMware vSphere vCenter 6.5 v2r3VMware

CONFIGURATION MANAGEMENT

VUM : no-vum-self-signed-certsVMWare vSphere 5.X Hardening GuideVMware
WBSP-AS-000940 - The WebSphere Application Server must remove JREs left by web server and plug-in installers in the DMZ.DISA IBM WebSphere Traditional 9 STIG v1r1Unix

CONFIGURATION MANAGEMENT

WBSP-AS-000940 - The WebSphere Application Server must remove JREs left by web server and plug-in installers in the DMZ.DISA IBM WebSphere Traditional 9 Windows STIG v1r1Windows

CONFIGURATION MANAGEMENT

WN12-00-000013 - Security configuration tools or equivalent processes must be used to configure and maintain platforms for security compliance.DISA Windows Server 2012 and 2012 R2 MS STIG v3r7Windows

CONFIGURATION MANAGEMENT

WN12-00-000210 - PowerShell script block logging must be enabled on Windows 2012/2012 R2 - PatchDISA Windows Server 2012 and 2012 R2 DC STIG v3r7Windows

AUDIT AND ACCOUNTABILITY

WN16-00-000412 - The Server Message Block (SMB) v1 protocol must be disabled on the SMB client.DISA Microsoft Windows Server 2016 STIG v2r10Windows

CONFIGURATION MANAGEMENT

WN19-00-000400 - Windows Server 2019 must have the Server Message Block (SMB) v1 protocol disabled on the SMB client.DISA Microsoft Windows Server 2019 STIG v3r4Windows

CONFIGURATION MANAGEMENT

WN22-CC-000030 - Windows Server 2022 Internet Protocol version 6 (IPv6) source routing must be configured to the highest protection level to prevent IP source routing.DISA Microsoft Windows Server 2022 STIG v2r4Windows

CONFIGURATION MANAGEMENT