Item Search

NameAudit NamePluginCategory
2.2.2.2 Ensure 'Accept cookies' is set to 'From websites I visit' or 'From current website only'MobileIron - CIS Apple iOS 11 v1.0.0 End User Owned L1MDM

ACCESS CONTROL

2.2.2.2 Ensure 'Accept cookies' is set to 'From websites I visit' or 'From current website only'AirWatch - CIS Apple iOS 10 v2.0.0 End User Owned L1MDM
2.2.2.2 Ensure 'Accept cookies' is set to 'From websites I visit' or 'From current website only'AirWatch - CIS Apple iOS 11 v1.0.0 End User Owned L1MDM
2.6 Configure TLS authentication for Docker daemon --tlskeyCIS Docker 1.13.0 v1.0.0 L1 DockerUnix

SYSTEM AND COMMUNICATIONS PROTECTION

2.6 Ensure TLS authentication for Docker daemon is configured --tlscacertCIS Docker Community Edition v1.1.0 L1 DockerUnix

SYSTEM AND COMMUNICATIONS PROTECTION

2.6 Ensure TLS authentication for Docker daemon is configured --tlscertCIS Docker Community Edition v1.1.0 L1 DockerUnix

SYSTEM AND COMMUNICATIONS PROTECTION

2.6 Ensure TLS authentication for Docker daemon is configured --tlsverifyCIS Docker Community Edition v1.1.0 L1 DockerUnix

SYSTEM AND COMMUNICATIONS PROTECTION

3.2.2.2 Ensure 'Accept cookies' is set to 'From websites I visit' or 'From current website only'AirWatch - CIS Apple iOS 10 v2.0.0 Institution Owned L1MDM
3.2.2.2 Ensure 'Accept cookies' is set to 'From websites I visit' or 'From current website only'MobileIron - CIS Apple iOS 11 v1.0.0 Institution Owned L1MDM

ACCESS CONTROL

3.2.2.2 Ensure 'Accept cookies' is set to 'From websites I visit' or 'From current website only'AirWatch - CIS Apple iOS 18 v2.0.0 L1 Institution OwnedMDM

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

3.2.2.2 Ensure 'Accept cookies' is set to 'From websites I visit' or 'From current website only'MobileIron - CIS Apple iOS 18 v2.0.0 L1 Institution OwnedMDM

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

3.2.2.2 Ensure 'Accept cookies' is set to 'From websites I visit' or 'From current website only'AirWatch - CIS Apple iPadOS 26 v1.0.0 L1 Institutionally OwnedMDM

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

3.2.2.2 Ensure 'Accept cookies' is set to 'From websites I visit' or 'From current website only'MobileIron - CIS Apple iOS 10 v2.0.0 Institution Owned L1MDM

ACCESS CONTROL

3.2.2.2 Ensure 'Accept cookies' is set to 'From websites I visit' or 'From current website only'AirWatch - CIS Apple iOS 14 and iPadOS 14 Institution Owned L1MDM

CONFIGURATION MANAGEMENT

3.2.2.2 Ensure 'Accept cookies' is set to 'From websites I visit' or 'From current website only'MobileIron - CIS Apple iPadOS 17 Institutionally Owned L1MDM

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

3.2.2.2 Ensure 'Accept cookies' is set to 'From websites I visit' or 'From current website only'MobileIron - CIS Apple iPadOS 18 v2.0.0 L1 Institution OwnedMDM

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

3.2.2.2 Ensure 'Accept cookies' is set to 'From websites I visit' or `From current website only`MobileIron - CIS Apple iOS 13 and iPadOS 13 Institution Owned L1MDM

CONFIGURATION MANAGEMENT

3.2.2.2 Ensure 'Accept cookies' is set to 'From websites I visit' or `From current website only`AirWatch - CIS Apple iOS 12 v1.0.0 Institution Owned L1MDM
CD12-00-000400 - The audit information produced by PostgreSQL must be protected from unauthorized modification.DISA STIG Crunchy Data PostgreSQL OS v3r1Unix

AUDIT AND ACCOUNTABILITY

CD12-00-000500 - PostgreSQL must integrate with an organization-level authentication/access mechanism providing account management and automation for all users, groups, roles, and any other principals.DISA STIG Crunchy Data PostgreSQL OS v3r1Unix

ACCESS CONTROL

CD12-00-000710 - PostgreSQL must limit privileges to change functions and triggers, and links to software external to PostgreSQL.DISA STIG Crunchy Data PostgreSQL OS v3r1Unix

CONFIGURATION MANAGEMENT

CD12-00-000800 - If passwords are used for authentication, PostgreSQL must transmit only encrypted representations of passwords.DISA STIG Crunchy Data PostgreSQL OS v3r1Unix

IDENTIFICATION AND AUTHENTICATION

CD12-00-001300 - The role(s)/group(s) used to modify database structure (including but not necessarily limited to tables, indexes, storage, etc.) and logic modules (functions, trigger procedures, links to software external to PostgreSQL, etc.) must be restricted to authorized users.DISA STIG Crunchy Data PostgreSQL OS v3r1Unix

CONFIGURATION MANAGEMENT

CD12-00-002100 - PostgreSQL must allocate audit record storage capacity in accordance with organization-defined audit record storage requirements.DISA STIG Crunchy Data PostgreSQL OS v3r1Unix

AUDIT AND ACCOUNTABILITY

CD12-00-002200 - PostgreSQL must enforce discretionary access control policies, as defined by the data owner, over defined subjects and objects.DISA STIG Crunchy Data PostgreSQL OS v3r1Unix

ACCESS CONTROL

CD12-00-002300 - The audit information produced by PostgreSQL must be protected from unauthorized deletion.DISA STIG Crunchy Data PostgreSQL OS v3r1Unix

AUDIT AND ACCOUNTABILITY

CD12-00-002600 - PostgreSQL must allow only the Information System Security Manager (ISSM), or individuals or roles appointed by the ISSM, to select which auditable events are to be audited.DISA STIG Crunchy Data PostgreSQL OS v3r1Unix

AUDIT AND ACCOUNTABILITY

CD12-00-003100 - Database objects (including but not limited to tables, indexes, storage, trigger procedures, functions, links to software external to PostgreSQL, etc.) must be owned by database/DBMS principals authorized for ownership.DISA STIG Crunchy Data PostgreSQL OS v3r1Unix

CONFIGURATION MANAGEMENT

CD12-00-004000 - PostgreSQL must isolate security functions from non-security functions.DISA STIG Crunchy Data PostgreSQL OS v3r1Unix

SYSTEM AND COMMUNICATIONS PROTECTION

CD12-00-004150 - PostgreSQL must disable network functions, ports, protocols, and services deemed by the organization to be nonsecure, in accord with the Ports, Protocols, and Services Management (PPSM) guidance.DISA STIG Crunchy Data PostgreSQL OS v3r1Unix

CONFIGURATION MANAGEMENT

CD12-00-004200 - The audit information produced by PostgreSQL must be protected from unauthorized read access.DISA STIG Crunchy Data PostgreSQL OS v3r1Unix

AUDIT AND ACCOUNTABILITY

CD12-00-007000 - PostgreSQL, when utilizing PKI-based authentication, must validate certificates by performing RFC 5280-compliant certification path validation.DISA STIG Crunchy Data PostgreSQL OS v3r1Unix

IDENTIFICATION AND AUTHENTICATION

CD12-00-008200 - PostgreSQL must implement NIST FIPS 140-2 or 140-3 validated cryptographic modules to protect unclassified information requiring confidentiality and cryptographic protection, in accordance with the data owner's requirements.DISA STIG Crunchy Data PostgreSQL OS v3r1Unix

SYSTEM AND COMMUNICATIONS PROTECTION

CD12-00-008400 - PostgreSQL must prohibit user installation of logic modules (functions, trigger procedures, views, etc.) without explicit privileged status.DISA STIG Crunchy Data PostgreSQL OS v3r1Unix

CONFIGURATION MANAGEMENT

CD12-00-008500 - PostgreSQL must separate user functionality (including user interface services) from database management functionality.DISA STIG Crunchy Data PostgreSQL OS v3r1Unix

SYSTEM AND COMMUNICATIONS PROTECTION

CD12-00-011200 - PostgreSQL must protect its audit features from unauthorized removal.DISA STIG Crunchy Data PostgreSQL OS v3r1Unix

AUDIT AND ACCOUNTABILITY

CD12-00-012000 - Access to database files must be limited to relevant processes and to authorized, administrative users.DISA STIG Crunchy Data PostgreSQL OS v3r1Unix

SYSTEM AND COMMUNICATIONS PROTECTION

EPAS-00-000800 - The EDB Postgres Advanced Server must enforce approved authorizations for logical access to information and system resources in accordance with applicable access control policies.EnterpriseDB PostgreSQL Advanced Server OS Linux v2r1Unix

ACCESS CONTROL

EPAS-00-002300 - The EDB Postgres Advanced Server must, by default, shut down upon audit failure, to include the unavailability of space for more audit log records; or must be configurable to shut down upon audit failure.EnterpriseDB PostgreSQL Advanced Server OS Linux v2r1Unix

AUDIT AND ACCOUNTABILITY

EPAS-00-002400 - The EDB Postgres Advanced Server must be configurable to overwrite audit log records, oldest first (First-In-First-Out [FIFO]), in the event of unavailability of space for more audit log records.EnterpriseDB PostgreSQL Advanced Server OS Linux v2r1Unix

AUDIT AND ACCOUNTABILITY

EPAS-00-002700 - The audit information produced by the EDB Postgres Advanced Server must be protected from unauthorized modification.EnterpriseDB PostgreSQL Advanced Server OS Linux v2r1Unix

AUDIT AND ACCOUNTABILITY

EPAS-00-002800 - The audit information produced by the EDB Postgres Advanced Server must be protected from unauthorized deletion.EnterpriseDB PostgreSQL Advanced Server OS Linux v2r1Unix

AUDIT AND ACCOUNTABILITY

EPAS-00-002900 - The EDB Postgres Advanced Server must protect its audit features from unauthorized access.EnterpriseDB PostgreSQL Advanced Server OS Linux v2r1Unix

AUDIT AND ACCOUNTABILITY

EPAS-00-004200 - The EDB Postgres Advanced Server must uniquely identify and authenticate organizational users (or processes acting on behalf of organizational users).EnterpriseDB PostgreSQL Advanced Server OS Linux v2r1Unix

IDENTIFICATION AND AUTHENTICATION

EPAS-00-004900 - The EDB Postgres Advanced Server must use NIST FIPS 140-2 or 140-3 validated cryptographic modules for cryptographic operations.EnterpriseDB PostgreSQL Advanced Server OS Linux v2r1Unix

IDENTIFICATION AND AUTHENTICATION

EPAS-00-007400 - The EDB Postgres Advanced Server must prevent nonprivileged users from executing privileged functions to include disabling, circumventing, or altering implemented security safeguards/countermeasures.EnterpriseDB PostgreSQL Advanced Server OS Linux v2r1Unix

ACCESS CONTROL

EPAS-00-008700 - The EDB Postgres Advanced Server must disable network functions, ports, protocols, and services deemed by the organization to be nonsecure, in accord with the Ports, Protocols, and Services Management (PPSM) guidance.EnterpriseDB PostgreSQL Advanced Server OS Linux v2r1Unix

CONFIGURATION MANAGEMENT

EPAS-00-009100 - The EDB Postgres Advanced Server must only accept end entity certificates issued by DOD PKI or DOD-approved PKI Certification Authorities (CAs) for the establishment of all encrypted sessions.EnterpriseDB PostgreSQL Advanced Server OS Linux v2r1Unix

SYSTEM AND COMMUNICATIONS PROTECTION

EPAS-00-012700 - The EDB Postgres Advanced Server must implement NIST FIPS 140-2 or 140-3 validated cryptographic modules to provision digital signatures.EnterpriseDB PostgreSQL Advanced Server OS Linux v2r1Unix

SYSTEM AND COMMUNICATIONS PROTECTION

EPAS-00-013200 - EDB Postgres Advanced Server products must be a version supported by the vendor.EnterpriseDB PostgreSQL Advanced Server OS Linux v2r1Unix

SYSTEM AND SERVICES ACQUISITION