Item Search

NameAudit NamePluginCategory
2.6 Configure TLS authentication for Docker daemon - tlscertCIS Docker 1.11.0 v1.0.0 L1 DockerUnix

SYSTEM AND COMMUNICATIONS PROTECTION

2.6 Configure TLS authentication for Docker daemon --tlscertCIS Docker 1.13.0 v1.0.0 L1 DockerUnix

SYSTEM AND COMMUNICATIONS PROTECTION

2.6 Configure TLS authentication for Docker daemon --tlsverifyCIS Docker 1.13.0 v1.0.0 L1 DockerUnix

SYSTEM AND COMMUNICATIONS PROTECTION

2.6 Configure TLS authentication for Docker daemon -tlsverifyCIS Docker 1.11.0 v1.0.0 L1 DockerUnix

SYSTEM AND COMMUNICATIONS PROTECTION

2.6 Configure TLS authentication for Docker daemon -tlsverifyCIS Docker 1.12.0 v1.0.0 L1 DockerUnix

SYSTEM AND COMMUNICATIONS PROTECTION

2.6 Ensure 'Device Information' is set to DisabledAirWatch - CIS Google Android 7 v1.0.0 L1MDM

CONFIGURATION MANAGEMENT

2.6 Ensure External Users' Terminal Access is DisabledCIS F5 Networks v1.0.0 L1F5

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

2.6 Ensure Update-related UI Components are DisplayedCIS Mozilla Firefox 38 ESR Linux L1 v1.0.0Unix

CONFIGURATION MANAGEMENT

2.6 Turn off TRACE - check web.xml config filesCIS Apache Tomcat 8 L1 v1.1.0 MiddlewareUnix

CONFIGURATION MANAGEMENT

2.6 Turn off TRACE (check web.xml config files)CIS Apache Tomcat 7 L1 v1.1.0 MiddlewareUnix

SYSTEM AND INFORMATION INTEGRITY

4.1 Ensure legacy TLS protocols are disabledCIS MongoDB 4 L2 OS Windows v1.0.0Windows

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

4.2 Ensure Weak Protocols are DisabledCIS MongoDB 4 L1 OS Windows v1.0.0Windows

SYSTEM AND COMMUNICATIONS PROTECTION

4.4 Ensure Federal Information Processing Standard (FIPS) is enabledCIS MongoDB 4 L2 OS Windows v1.0.0Windows

SYSTEM AND COMMUNICATIONS PROTECTION

4.5 Ensure Encryption of Data at RestCIS MongoDB 5 L2 OS Windows v1.2.0Windows

SYSTEM AND COMMUNICATIONS PROTECTION

5.3 Ensure that logging captures as much information as possibleCIS MongoDB 4 L2 OS Windows v1.0.0Windows

AUDIT AND ACCOUNTABILITY

5.3 Ensure that logging captures as much information as possibleCIS MongoDB 5 L2 OS Windows v1.2.0Windows

AUDIT AND ACCOUNTABILITY

5.4 Ensure that new entries are appended to the end of the log fileCIS MongoDB 5 L2 OS Windows v1.2.0Windows

AUDIT AND ACCOUNTABILITY

6.1 Ensure that MongoDB uses a non-default portCIS MongoDB 5 L1 OS Windows v1.2.0Windows

SYSTEM AND INFORMATION INTEGRITY

6.3 Ensure that server-side scripting is disabled if not neededCIS MongoDB 4 L2 OS Windows v1.0.0Windows

SYSTEM AND INFORMATION INTEGRITY

7.1 Ensure 'Symmetric Key encryption algorithm' is set to 'AES_128' or higher in non-system databasesCIS SQL Server 2016 Database L1 DB v1.4.0MS_SQLDB

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

ALMA-09-053260 - AlmaLinux OS 9 must take action when allocated audit record storage volume reaches 95 percent of the audit record storage capacity.DISA CloudLinux AlmaLinux OS 9 STIG v1r2Unix

AUDIT AND ACCOUNTABILITY

ALMA-09-054250 - AlmaLinux OS 9 must take appropriate action when a critical audit processing failure occurs.DISA CloudLinux AlmaLinux OS 9 STIG v1r2Unix

AUDIT AND ACCOUNTABILITY

APPL-14-000030 The macOS system must configure audit log files to not contain access control lists.DISA Apple macOS 14 (Sonoma) STIG v2r3Unix

AUDIT AND ACCOUNTABILITY

APPL-14-000031 The macOS system must configure audit log folders to not contain access control lists.DISA Apple macOS 14 (Sonoma) STIG v2r3Unix

AUDIT AND ACCOUNTABILITY

APPL-14-001014 The macOS system must configure audit log files group to wheel.DISA Apple macOS 14 (Sonoma) STIG v2r3Unix

AUDIT AND ACCOUNTABILITY

APPL-14-001017 The macOS system must configure audit log folders to mode 700 or less permissive.DISA Apple macOS 14 (Sonoma) STIG v2r3Unix

AUDIT AND ACCOUNTABILITY

APPL-15-001015 - The macOS system must configure the audit log folders group to wheel.DISA Apple macOS 15 (Sequoia) STIG v1r3Unix

AUDIT AND ACCOUNTABILITY

APPL-15-001017 - The macOS system must configure audit log folders to mode 700 or less permissive.DISA Apple macOS 15 (Sequoia) STIG v1r3Unix

AUDIT AND ACCOUNTABILITY

MD3X-00-000500 - MongoDB and associated applications must reserve the use of dynamic code execution for situations that require it.DISA STIG MongoDB Enterprise Advanced 3.x v2r3 OSUnix

SYSTEM AND INFORMATION INTEGRITY

MD4X-00-001000 - MongoDB and associated applications must reserve the use of dynamic code execution for situations that require it.DISA STIG MongoDB Enterprise Advanced 4.x v1r4 OSUnix

SYSTEM AND INFORMATION INTEGRITY

MD7X-00-003200 Unused database components that are integrated in MongoDB and cannot be uninstalled must be disabled.DISA MongoDB Enterprise Advanced 7.x STIG v1r1Unix

CONFIGURATION MANAGEMENT

MD7X-00-003800 If passwords are used for authentication, MongoDB must store only hashed, salted representations of passwords.DISA MongoDB Enterprise Advanced 7.x STIG v1r1Unix

IDENTIFICATION AND AUTHENTICATION

MD7X-00-005800 MongoDB and associated applications must reserve the use of dynamic code execution for situations that require it.DISA MongoDB Enterprise Advanced 7.x STIG v1r1Unix

SYSTEM AND INFORMATION INTEGRITY

MYS8-00-009800 - The MySQL Database Server 8.0 must provide a warning to appropriate support staff when allocated audit record storage volume reaches 75 percent of maximum audit record storage capacity.DISA Oracle MySQL 8.0 v2r2 DBMySQLDB

AUDIT AND ACCOUNTABILITY

OL07-00-910055 - The Oracle Linux operating system must protect audit information from unauthorized read, modification, or deletion.DISA Oracle Linux 7 STIG v3r2Unix

AUDIT AND ACCOUNTABILITY, SYSTEM AND INFORMATION INTEGRITY

OL08-00-030080 - OL 8 audit logs must be owned by root to prevent unauthorized read access.DISA Oracle Linux 8 STIG v2r4Unix

AUDIT AND ACCOUNTABILITY

OL08-00-030120 - The OL 8 audit log directory must have a mode of 0700 or less permissive to prevent unauthorized read access.DISA Oracle Linux 8 STIG v2r4Unix

AUDIT AND ACCOUNTABILITY

Overview of the HTTP profileTenable F5 BIG-IP Best Practice AuditF5

SYSTEM AND COMMUNICATIONS PROTECTION

PHTN-40-000026 The Photon operating system must protect audit logs from unauthorized access.DISA VMware vSphere 8.0 vCenter Appliance Photon OS 4.0 STIG v2r1Unix

AUDIT AND ACCOUNTABILITY

PHTN-67-000048 - The Photon operating system must initiate auditing as part of the boot process.DISA STIG VMware vSphere 6.7 Photon OS v1r6Unix

AUDIT AND ACCOUNTABILITY

RHEL-07-910055 - The Red Hat Enterprise Linux operating system must protect audit information from unauthorized read, modification, or deletion.DISA Red Hat Enterprise Linux 7 STIG v3r15Unix

AUDIT AND ACCOUNTABILITY, SYSTEM AND INFORMATION INTEGRITY

RHEL-08-030090 - RHEL 8 audit logs must be group-owned by root to prevent unauthorized read access.DISA Red Hat Enterprise Linux 8 STIG v2r3Unix

AUDIT AND ACCOUNTABILITY

RHEL-08-030110 - RHEL 8 audit log directory must be group-owned by root to prevent unauthorized read access.DISA Red Hat Enterprise Linux 8 STIG v2r3Unix

AUDIT AND ACCOUNTABILITY

RHEL-08-030120 - RHEL 8 audit log directory must have a mode of 0700 or less permissive to prevent unauthorized read access.DISA Red Hat Enterprise Linux 8 STIG v2r3Unix

AUDIT AND ACCOUNTABILITY

Settings to Lock Down your BIG-IP - Remote RoleTenable F5 BIG-IP Best Practice AuditF5

CONFIGURATION MANAGEMENT

UBTU-16-020110 - Audit logs must be owned by root to prevent unauthorized read access.DISA STIG Ubuntu 16.04 LTS v2r3Unix

AUDIT AND ACCOUNTABILITY

UBTU-16-020140 - Audit log directory must be group-owned by root to prevent unauthorized read access.DISA STIG Ubuntu 16.04 LTS v2r3Unix

AUDIT AND ACCOUNTABILITY

UBTU-22-653055 - Ubuntu 22.04 LTS must permit only authorized groups ownership of the audit log files.DISA Canonical Ubuntu 22.04 LTS STIG v2r4Unix

AUDIT AND ACCOUNTABILITY

UBTU-24-901310 - Ubuntu 24.04 LTS must be configured to permit only authorized users ownership of the audit log files.DISA Canonical Ubuntu 24.04 LTS STIG v1r1Unix

AUDIT AND ACCOUNTABILITY

Unable to limit Configuration utility access to clients using only TLSv1.1 or TLSv1.2Tenable F5 BIG-IP Best Practice AuditF5

ACCESS CONTROL