1. OpenStack Compute - Policy.json - 'os_compute_api:os-cells:delete' | TNS OpenStack Nova/Compute Security Guide | Unix | ACCESS CONTROL |
3.6 (L1) Ensure 'Control how Chrome Cleanup reports data to Google' is set to 'Disabled' | CIS Google Chrome L1 v3.0.0 | Windows | SYSTEM AND INFORMATION INTEGRITY |
6. OpenStack Networking - Policy.json - 'get_port:binding:host_id' | TNS OpenStack Neutron/Networking Security Guide | Unix | ACCESS CONTROL |
44. OpenStack Networking - Policy.json - 'get_dhcp-networks' | TNS OpenStack Neutron/Networking Security Guide | Unix | ACCESS CONTROL |
48. OpenStack Networking - Policy.json - 'get_firewall_policy' | TNS OpenStack Neutron/Networking Security Guide | Unix | ACCESS CONTROL |
51. OpenStack Networking - Policy.json - 'update_subnet' | TNS OpenStack Neutron/Networking Security Guide | Unix | ACCESS CONTROL |
59. OpenStack Networking - Policy.json - 'create_port:mac_learning_enabled' | TNS OpenStack Neutron/Networking Security Guide | Unix | ACCESS CONTROL |
66. OpenStack Networking - Policy.json - 'create_subnetpool:shared' | TNS OpenStack Neutron/Networking Security Guide | Unix | ACCESS CONTROL |
76. OpenStack Networking - Policy.json - 'update_floatingip' | TNS OpenStack Neutron/Networking Security Guide | Unix | ACCESS CONTROL |
83. OpenStack Networking - Policy.json - 'create_firewall:shared' | TNS OpenStack Neutron/Networking Security Guide | Unix | ACCESS CONTROL |
84. OpenStack Networking - Policy.json - 'shared_firewall_policies' | TNS OpenStack Neutron/Networking Security Guide | Unix | ACCESS CONTROL |
87. OpenStack Networking - Policy.json - 'update_port:allowed_address_pairs' | TNS OpenStack Neutron/Networking Security Guide | Unix | ACCESS CONTROL |
88. OpenStack Networking - Policy.json - 'delete_firewall_policy' | TNS OpenStack Neutron/Networking Security Guide | Unix | ACCESS CONTROL |
93. OpenStack Networking - Policy.json - 'create_router:ha' | TNS OpenStack Neutron/Networking Security Guide | Unix | ACCESS CONTROL |
100. OpenStack Compute - Policy.json - 'compute_extension:admin_actions:migrate' | TNS OpenStack Nova/Compute Security Guide | Unix | ACCESS CONTROL |
107. OpenStack Compute - Policy.json - 'os_compute_api:os-networks-associate' | TNS OpenStack Nova/Compute Security Guide | Unix | ACCESS CONTROL |
113. OpenStack Compute - Policy.json - 'os_compute_api:os-quota-sets:update' | TNS OpenStack Nova/Compute Security Guide | Unix | ACCESS CONTROL |
115. OpenStack Compute - Policy.json - 'compute_extension:admin_actions:resetNetwork' | TNS OpenStack Nova/Compute Security Guide | Unix | ACCESS CONTROL |
119. OpenStack Compute - Policy.json - 'compute_extension:admin_actions:unpause' | TNS OpenStack Nova/Compute Security Guide | Unix | ACCESS CONTROL |
123. OpenStack Compute - Policy.json - 'compute_extension:admin_actions:pause' | TNS OpenStack Nova/Compute Security Guide | Unix | ACCESS CONTROL |
124. OpenStack Compute - Policy.json - 'os_compute_api:os-fixed-ips' | TNS OpenStack Nova/Compute Security Guide | Unix | ACCESS CONTROL |
129. OpenStack Compute - Policy.json - 'compute_extension:simple_tenant_usage:show' | TNS OpenStack Nova/Compute Security Guide | Unix | ACCESS CONTROL |
ACLs: Filter for RFC 3330 addresses (127.0.0.0/8) | TNS Alcatel-Lucent TiMOS/Nokia SR-OS Best Practice Audit | Alcatel | SYSTEM AND COMMUNICATIONS PROTECTION |
ACLs: Filter for RFC 3330 addresses (169.254.0.0/16) | TNS Alcatel-Lucent TiMOS/Nokia SR-OS Best Practice Audit | Alcatel | SYSTEM AND COMMUNICATIONS PROTECTION |
Alertmail server not configured or this feature is not available on the device | TNS Fortigate FortiOS Best Practices v2.0.0 | FortiGate | SYSTEM AND INFORMATION INTEGRITY |
Auditing and logging - server | ArubaOS Switch 16.x Hardening Guide v1.0.0 | ArubaOS | AUDIT AND ACCOUNTABILITY |
Auditing and logging - severity | ArubaOS Switch 16.x Hardening Guide v1.0.0 | ArubaOS | AUDIT AND ACCOUNTABILITY |
Authentication: enable remote authentication | TNS Alcatel-Lucent TiMOS/Nokia SR-OS Best Practice Audit | Alcatel | IDENTIFICATION AND AUTHENTICATION |
BGP: Authenticate peers | TNS Alcatel-Lucent TiMOS/Nokia SR-OS Best Practice Audit | Alcatel | ACCESS CONTROL |
Centralized authentication - configuration | ArubaOS Switch 16.x Hardening Guide v1.0.0 | ArubaOS | IDENTIFICATION AND AUTHENTICATION |
CPM Filtering: Filter for IGMP | TNS Alcatel-Lucent TiMOS/Nokia SR-OS Best Practice Audit | Alcatel | SYSTEM AND COMMUNICATIONS PROTECTION |
CPM Filtering: Filter for PIM | TNS Alcatel-Lucent TiMOS/Nokia SR-OS Best Practice Audit | Alcatel | SYSTEM AND COMMUNICATIONS PROTECTION |
DNS: A trusted primary DNS server is configured | TNS Alcatel-Lucent TiMOS/Nokia SR-OS Best Practice Audit | Alcatel | SYSTEM AND COMMUNICATIONS PROTECTION |
EX16-ED-002400 - The application must update malicious code protection mechanisms whenever new releases are available in accordance with organizational configuration management policy and procedures. | DISA Microsoft Exchange 2016 Edge Transport Server STIG v2r5 | Windows | SYSTEM AND INFORMATION INTEGRITY |
Login: Accounts are locked after 3 failed password attempts | TNS Alcatel-Lucent TiMOS/Nokia SR-OS Best Practice Audit | Alcatel | ACCESS CONTROL |
Login: Idle connections time out after 5 minutes or less | TNS Alcatel-Lucent TiMOS/Nokia SR-OS Best Practice Audit | Alcatel | CONFIGURATION MANAGEMENT |
Login: Telnet is disabled (IPv4) | TNS Alcatel-Lucent TiMOS/Nokia SR-OS Best Practice Audit | Alcatel | CONFIGURATION MANAGEMENT |
Login: Telnet is disabled (IPv6) | TNS Alcatel-Lucent TiMOS/Nokia SR-OS Best Practice Audit | Alcatel | CONFIGURATION MANAGEMENT |
MACsec | ArubaOS Switch 16.x Hardening Guide v1.0.0 | ArubaOS | SYSTEM AND COMMUNICATIONS PROTECTION |
Management interface | ArubaOS CX 10.x Hardening Guide v1.0.0 | ArubaOS | SYSTEM AND COMMUNICATIONS PROTECTION |
Password Complexity: Require at least one number | TNS Alcatel-Lucent TiMOS/Nokia SR-OS Best Practice Audit | Alcatel | IDENTIFICATION AND AUTHENTICATION |
RHEL-08-010171 - RHEL 8 must have policycoreutils package installed. | DISA Red Hat Enterprise Linux 8 STIG v2r3 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
Session timeout | ArubaOS CX 10.x Hardening Guide v1.0.0 | ArubaOS | ACCESS CONTROL |
SYMP-AG-000220 - Symantec ProxySG must be configured to send the access logs to the centralized log server continuously. | DISA Symantec ProxySG Benchmark ALG v1r3 | BlueCoat | AUDIT AND ACCOUNTABILITY |
Time synchronization - ntp authentication | ArubaOS Switch 16.x Hardening Guide v1.0.0 | ArubaOS | AUDIT AND ACCOUNTABILITY, IDENTIFICATION AND AUTHENTICATION |
Time: Disable Daylight Savings Time adjustment | TNS Alcatel-Lucent TiMOS/Nokia SR-OS Best Practice Audit | Alcatel | AUDIT AND ACCOUNTABILITY |
Time: Set system clock to UTC | TNS Alcatel-Lucent TiMOS/Nokia SR-OS Best Practice Audit | Alcatel | AUDIT AND ACCOUNTABILITY |
TNS_IBM_HTTP_Server_Best_Practice.audit | TNS IBM HTTP Server Best Practice | Windows | |
UBTU-16-010510 - The file integrity tool must perform verification of the correct operation of security functions: upon system start-up and/or restart; upon command by a user with privileged access; and/or every 30 days. | DISA STIG Ubuntu 16.04 LTS v2r3 | Unix | SYSTEM AND INFORMATION INTEGRITY |
WatchGuard : Review ABS Policy Listing | TNS Best Practice WatchGuard Audit 1.0.0 | WatchGuard | ACCESS CONTROL |