Item Search

NameAudit NamePluginCategory
1.3.5 Ensure AIDE is configured to use FIPS 140-2 - sha512CIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIGUnix

CONFIGURATION MANAGEMENT

2.2.16 (L1) Ensure 'Deny access to this computer from the network' to include 'Guests, Local account'CIS Microsoft Windows 10 Enterprise v4.0.0 L1 BL NGWindows

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

2.2.16 (L1) Ensure 'Deny access to this computer from the network' to include 'Guests, Local account'CIS Microsoft Windows 10 Enterprise v4.0.0 L1 NGWindows

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

2.2.16 (L1) Ensure 'Deny access to this computer from the network' to include 'Guests, Local account'CIS Microsoft Windows 11 Enterprise v4.0.0 L1Windows

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

2.2.16 (L1) Ensure 'Deny access to this computer from the network' to include 'Guests, Local account'CIS Microsoft Windows 11 Enterprise v4.0.0 L1 BitLockerWindows

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

2.2.16 (L1) Ensure 'Deny access to this computer from the network' to include 'Guests'CIS Microsoft Windows 10 Stand-alone v3.0.0 L1Windows

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

2.2.16 (L1) Ensure 'Deny access to this computer from the network' to include 'Guests'CIS Microsoft Windows 11 Stand-alone v4.0.0 L1 BLWindows

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

3.4.3 Ensure 'Maximum Auto-Lock' is set to '2 minutes' or lessAirWatch - CIS Apple iOS 10 v2.0.0 Institution Owned L1MDM

ACCESS CONTROL

3.4.3.5 Ensure nftables loopback traffic is configuredCIS Amazon Linux 2 v3.0.0 L1Unix

SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION

3.4.3.7 Ensure nftables default deny firewall policyCIS Amazon Linux 2 v3.0.0 L1Unix

SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION

3.4.4 Ensure 'Maximum Auto-Lock' is set to '2 minutes' or lessMobileIron - CIS Apple iPadOS 17 Institutionally Owned L1MDM

ACCESS CONTROL

3.4.4.2.3 Ensure iptables rules exist for all open portsCIS Amazon Linux 2 v3.0.0 L1Unix

SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION

3.4.4.2.5 Ensure iptables rules are savedCIS Amazon Linux 2 v3.0.0 L1Unix

SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION

3.4.4.2.6 Ensure iptables service is enabled and activeCIS Amazon Linux 2 v3.0.0 L1Unix

SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION

3.4.4.3.3 Ensure ip6tables firewall rules exist for all open portsCIS Amazon Linux 2 v3.0.0 L1Unix

SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION

4.1.1.2 Ensure permissions on /etc/crontab are configuredCIS Amazon Linux 2 v3.0.0 L1Unix

ACCESS CONTROL, MEDIA PROTECTION

4.1.1.7 Ensure permissions on /etc/cron.d are configuredCIS Amazon Linux 2 v3.0.0 L1Unix

ACCESS CONTROL, MEDIA PROTECTION

4.2.11 Ensure sshd IgnoreRhosts is enabledCIS Amazon Linux 2 v3.0.0 L1Unix

IDENTIFICATION AND AUTHENTICATION

4.2.13 Ensure sshd LoginGraceTime is configuredCIS Amazon Linux 2 v3.0.0 L1Unix

ACCESS CONTROL

4.2.20 Ensure sshd PermitRootLogin is disabledCIS Amazon Linux 2 v3.0.0 L1Unix

ACCESS CONTROL

4.2.22 Ensure sshd UsePAM is enabledCIS Amazon Linux 2 v3.0.0 L1Unix

IDENTIFICATION AND AUTHENTICATION

4.3.6 Ensure sudo authentication timeout is configured correctlyCIS Amazon Linux 2 v3.0.0 L1Unix

ACCESS CONTROL

4.4.2.2.6 Ensure password maximum sequential characters is configuredCIS Amazon Linux 2 v3.0.0 L1Unix

IDENTIFICATION AND AUTHENTICATION

4.4.2.4.3 Ensure pam_unix includes a strong password hashing algorithmCIS Amazon Linux 2 v3.0.0 L1Unix

IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

4.5.1.1 Ensure strong password hashing algorithm is configuredCIS Amazon Linux 2 v3.0.0 L1Unix

IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

5.1.2.1.1 Ensure systemd-journal-remote is installedCIS Amazon Linux 2 v3.0.0 L1Unix

AUDIT AND ACCOUNTABILITY

5.1.2.1.4 Ensure journald is not configured to receive logs from a remote clientCIS Amazon Linux 2 v3.0.0 L1Unix

AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT

5.1.2.2 Ensure journald service is enabledCIS Amazon Linux 2 v3.0.0 L1Unix

AUDIT AND ACCOUNTABILITY

5.1.2.3 Ensure journald is configured to compress large log filesCIS Amazon Linux 2 v3.0.0 L1Unix

AUDIT AND ACCOUNTABILITY

5.1.2.6 Ensure journald log rotation is configured per site policyCIS Amazon Linux 2 v3.0.0 L1Unix

AUDIT AND ACCOUNTABILITY

5.1.3 Ensure logrotate is configuredCIS Amazon Linux 2 v3.0.0 L1Unix

AUDIT AND ACCOUNTABILITY

5.3.2 Ensure filesystem integrity is regularly checkedCIS Amazon Linux 2 v3.0.0 L1Unix

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

6.1.7 Ensure permissions on /etc/gshadow are configuredCIS Amazon Linux 2 v3.0.0 L1Unix

ACCESS CONTROL, MEDIA PROTECTION

6.1.8 Ensure permissions on /etc/gshadow- are configuredCIS Amazon Linux 2 v3.0.0 L1Unix

ACCESS CONTROL, MEDIA PROTECTION

6.2.3 Ensure all groups in /etc/passwd exist in /etc/groupCIS Amazon Linux 2 v3.0.0 L1Unix

ACCESS CONTROL

6.2.6 Ensure no duplicate user names existCIS Amazon Linux 2 v3.0.0 L1Unix

IDENTIFICATION AND AUTHENTICATION

6.2.8 Ensure root path integrityCIS Amazon Linux 2 v3.0.0 L1Unix

CONFIGURATION MANAGEMENT

6.7 Ensure FIPS 140-2 OpenSSL Cryptography Is Used - openssl versionCIS PostgreSQL 10 OS v1.0.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION

6.7 Ensure FIPS 140-2 OpenSSL Cryptography Is Used - openssl versionCIS PostgreSQL 11 OS v1.0.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION

18.9.7.1.6 (BL) Ensure 'Prevent installation of devices using drivers that match these device setup classes: Also apply to matching devices that are already installed.' is set to 'True' (checked)CIS Microsoft Windows 10 Stand-alone v3.0.0 L2 BL NGWindows

SYSTEM AND INFORMATION INTEGRITY

18.9.7.1.6 (BL) Ensure 'Prevent installation of devices using drivers that match these device setup classes: Also apply to matching devices that are already installed.' is set to 'True' (checked)CIS Microsoft Windows 10 Stand-alone v3.0.0 L1 BLWindows

SYSTEM AND INFORMATION INTEGRITY

DTOO114 - Open/Save actions for Excel 2 worksheets must be blocked.DISA STIG Microsoft Excel 2013 v1r8Windows

SYSTEM AND COMMUNICATIONS PROTECTION

DTOO114 - Open/Save actions for Excel 2 worksheets must be blocked.DISA STIG Microsoft Excel 2016 v2r1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

GEN006460 - Any NIS+ server must be operating at security level 2.DISA STIG Solaris 10 X86 v2r4Unix

CONFIGURATION MANAGEMENT

GEN006460 - Any NIS+ server must be operating at security level 2.DISA STIG Solaris 10 SPARC v2r4Unix

CONFIGURATION MANAGEMENT

Login: ssh - v2 and later is enabledTNS Alcatel-Lucent TiMOS/Nokia SR-OS Best Practice AuditAlcatel

CONFIGURATION MANAGEMENT

SOL-11.1-060060 - The operating system must employ FIPS-validate or NSA-approved cryptography to implement digital signatures.DISA STIG Solaris 11 SPARC v3r1Unix

SYSTEM AND COMMUNICATIONS PROTECTION

SOL-11.1-060060 - The operating system must employ FIPS-validate or NSA-approved cryptography to implement digital signatures.DISA STIG Solaris 11 X86 v3r1Unix

SYSTEM AND COMMUNICATIONS PROTECTION

VCSA-70-000265 - The vCenter server must disable SNMPv1/2 receivers.DISA STIG VMware vSphere 7.0 vCenter v1r3VMware

IDENTIFICATION AND AUTHENTICATION

WPAW-00-001000 - The Windows PAW must be configured so that all non-administrative-related applications and functions are blocked or removed from the PAW platform, including but not limited to email, Internet browsing, and line-of-business applications.DISA MS Windows Privileged Access Workstation v3r1Windows

CONFIGURATION MANAGEMENT