Item Search

NameAudit NamePluginCategory
2.6 Configure TLS authentication for Docker daemon - tlscertCIS Docker 1.12.0 v1.0.0 L1 DockerUnix

SYSTEM AND COMMUNICATIONS PROTECTION

2.6 Configure TLS authentication for Docker daemon - tlskeyCIS Docker 1.12.0 v1.0.0 L1 DockerUnix

SYSTEM AND COMMUNICATIONS PROTECTION

2.6 Turn off TRACE - check web.xml config filesCIS Apache Tomcat 8 L1 v1.1.0Unix

CONFIGURATION MANAGEMENT

2.6 Turn off TRACE (check web.xml config files)CIS Apache Tomcat 7 L1 v1.1.0Unix

SYSTEM AND INFORMATION INTEGRITY

5.3.4 Enable Auditing for Processes That Start Prior to auditdCIS Red Hat Enterprise Linux 5 L2 v2.2.1Unix

AUDIT AND ACCOUNTABILITY

APPL-15-000031 - The macOS system must configure the audit log folder to not contain access control lists (ACLs).DISA Apple macOS 15 (Sequoia) STIG v1r3Unix

AUDIT AND ACCOUNTABILITY

Configuring a pre-login or post-login message banner for the BIG-IP or Enterprise Manager system - Banner EnabledTenable F5 BIG-IP Best Practice AuditF5

ACCESS CONTROL

Configuring a pre-login or post-login message banner for the BIG-IP or Enterprise Manager system - Banner TextTenable F5 BIG-IP Best Practice AuditF5

ACCESS CONTROL

Configuring a secure password policy for the BIG-IP system - Maximum DurationTenable F5 BIG-IP Best Practice AuditF5

IDENTIFICATION AND AUTHENTICATION

Configuring a secure password policy for the BIG-IP system - Maximum Login FailuresTenable F5 BIG-IP Best Practice AuditF5

ACCESS CONTROL

Configuring a secure password policy for the BIG-IP system - Minimum DurationTenable F5 BIG-IP Best Practice AuditF5

IDENTIFICATION AND AUTHENTICATION

Configuring a secure password policy for the BIG-IP system - Minimum LengthTenable F5 BIG-IP Best Practice AuditF5

IDENTIFICATION AND AUTHENTICATION

Configuring a secure password policy for the BIG-IP system - Password MemoryTenable F5 BIG-IP Best Practice AuditF5

IDENTIFICATION AND AUTHENTICATION

Configuring a secure password policy for the BIG-IP system - Required Special CharactersTenable F5 BIG-IP Best Practice AuditF5

IDENTIFICATION AND AUTHENTICATION

Configuring a secure password policy for the BIG-IP system - Required Uppercase CharactersTenable F5 BIG-IP Best Practice AuditF5

IDENTIFICATION AND AUTHENTICATION

Configuring an automatic logout for idle sessions - Configuration utilityTenable F5 BIG-IP Best Practice AuditF5

ACCESS CONTROL

Configuring an automatic logout for idle sessions - Console SessionsTenable F5 BIG-IP Best Practice AuditF5

ACCESS CONTROL

Configuring an automatic logout for idle sessions - SSHTenable F5 BIG-IP Best Practice AuditF5

ACCESS CONTROL

Configuring CIDR Network Addresses for the BIG-IP packet filter - Always accept ARPTenable F5 BIG-IP Best Practice AuditF5

ACCESS CONTROL

Configuring CIDR Network Addresses for the BIG-IP packet filter - Filter established connectionsTenable F5 BIG-IP Best Practice AuditF5

ACCESS CONTROL

Configuring CIDR Network Addresses for the BIG-IP packet filter - Packet filter loggingTenable F5 BIG-IP Best Practice AuditF5

ACCESS CONTROL

Configuring CIDR Network Addresses for the BIG-IP packet filter - Unhandled Packet ActionTenable F5 BIG-IP Best Practice AuditF5

ACCESS CONTROL

Configuring cookie encryption within the HTTP profileTenable F5 BIG-IP Best Practice AuditF5

SYSTEM AND COMMUNICATIONS PROTECTION

Configuring LDAP remote authentication for Active Directory - ScopeTenable F5 BIG-IP Best Practice AuditF5

ACCESS CONTROL, CONFIGURATION MANAGEMENT

Configuring LDAP remote authentication for Active Directory - SSLTenable F5 BIG-IP Best Practice AuditF5

ACCESS CONTROL, CONFIGURATION MANAGEMENT

Configuring LDAP remote authentication for Active Directory - SSL CA CertTenable F5 BIG-IP Best Practice AuditF5

ACCESS CONTROL, CONFIGURATION MANAGEMENT

Configuring LDAP remote authentication for Active Directory - SSL Client CertTenable F5 BIG-IP Best Practice AuditF5

ACCESS CONTROL, CONFIGURATION MANAGEMENT

Configuring LDAP remote authentication for Active Directory - SSL Client KeyTenable F5 BIG-IP Best Practice AuditF5

ACCESS CONTROL, CONFIGURATION MANAGEMENT

Configuring the BIG-IP system to enforce the use of strict passwordsTenable F5 BIG-IP Best Practice AuditF5

ACCESS CONTROL

Configuring the BIG-IP system to exclude inode information from EtagsTenable F5 BIG-IP Best Practice AuditF5

ACCESS CONTROL

Defining advanced NTP configurations on the BIG-IP systemTenable F5 BIG-IP Best Practice AuditF5

AUDIT AND ACCOUNTABILITY

Disabling the admin accountTenable F5 BIG-IP Best Practice AuditF5

ACCESS CONTROL

MD3X-00-000380 - MongoDB must use NIST FIPS 140-2-validated cryptographic modules for cryptographic operations.DISA STIG MongoDB Enterprise Advanced 3.x v2r3 OSUnix

IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

Mitigating an attack using TCP profilesTenable F5 BIG-IP Best Practice AuditF5

SYSTEM AND COMMUNICATIONS PROTECTION

OL08-00-030070 - OL 8 audit logs must have a mode of "0600" or less permissive to prevent unauthorized read access.DISA Oracle Linux 8 STIG v2r4Unix

AUDIT AND ACCOUNTABILITY

OL08-00-030090 - OL 8 audit logs must be group-owned by root to prevent unauthorized read access.DISA Oracle Linux 8 STIG v2r4Unix

AUDIT AND ACCOUNTABILITY

OL08-00-030100 - The OL 8 audit log directory must be owned by root to prevent unauthorized read access.DISA Oracle Linux 8 STIG v2r4Unix

AUDIT AND ACCOUNTABILITY

OL08-00-030110 - The OL 8 audit log directory must be group-owned by root to prevent unauthorized read access.DISA Oracle Linux 8 STIG v2r4Unix

AUDIT AND ACCOUNTABILITY

OL08-00-030603 - OL 8 must enable Linux audit logging for the USBGuard daemon.DISA Oracle Linux 8 STIG v2r4Unix

AUDIT AND ACCOUNTABILITY

Overview of Appliance modeTenable F5 BIG-IP Best Practice AuditF5

ACCESS CONTROL

Overview of BIG-IP administrative access controlsTenable F5 BIG-IP Best Practice AuditF5

ACCESS CONTROL, CONFIGURATION MANAGEMENT

Overview of port lockdown behaviorTenable F5 BIG-IP Best Practice AuditF5

CONFIGURATION MANAGEMENT

Preserving or modifying HTTP response headers removed by the BIG-IP ASM systemTenable F5 BIG-IP Best Practice AuditF5

SYSTEM AND COMMUNICATIONS PROTECTION

RHEL-08-030100 - RHEL 8 audit log directory must be owned by root to prevent unauthorized read access.DISA Red Hat Enterprise Linux 8 STIG v2r3Unix

AUDIT AND ACCOUNTABILITY

Settings to Lock Down your BIG-IP - Admin Terminal AccessTenable F5 BIG-IP Best Practice AuditF5

CONFIGURATION MANAGEMENT

The BIG-IP Core implementation must be configured to protect against or limit the effects of known and unknown types of Denial of Service (DoS) attacks by employing pattern recognition pre-processors when providing content filtering to virtual servers.Tenable F5 BIG-IP Best Practice AuditF5

SYSTEM AND COMMUNICATIONS PROTECTION

UBTU-16-020100 - Audit log directories must have a mode of 0750 or less permissive to prevent unauthorized read access.DISA STIG Ubuntu 16.04 LTS v2r3Unix

AUDIT AND ACCOUNTABILITY

UBTU-16-020130 - Audit log directory must be owned by root to prevent unauthorized read access.DISA STIG Ubuntu 16.04 LTS v2r3Unix

AUDIT AND ACCOUNTABILITY

UBTU-22-653050 - Ubuntu 22.04 LTS must be configured to permit only authorized users ownership of the audit log files.DISA Canonical Ubuntu 22.04 LTS STIG v2r4Unix

AUDIT AND ACCOUNTABILITY

UBTU-24-901350 - Ubuntu 24.04 LTS must permit only authorized groups ownership of the audit log files.DISA Canonical Ubuntu 24.04 LTS STIG v1r1Unix

AUDIT AND ACCOUNTABILITY