Item Search

NameAudit NamePluginCategory
1.1 Ensure packages are obtained from authorized repositoriesCIS PostgreSQL 15 OS v1.1.0Unix

CONFIGURATION MANAGEMENT, MAINTENANCE

1.1 Ensure packages are obtained from authorized repositoriesCIS PostgreSQL 12 OS v1.1.0Unix

CONFIGURATION MANAGEMENT, MAINTENANCE

1.1 Ensure packages are obtained from authorized repositoriesCIS PostgreSQL 14 OS v 1.2.0Unix

CONFIGURATION MANAGEMENT, MAINTENANCE

1.1 Ensure packages are obtained from authorized repositoriesCIS PostgreSQL 13 OS v1.2.0Unix

CONFIGURATION MANAGEMENT, MAINTENANCE

1.1 Ensure packages are obtained from authorized repositoriesCIS PostgreSQL 16 OS v1.0.0Unix

CONFIGURATION MANAGEMENT, MAINTENANCE

1.1.3 Ensure separate file system for /tmpCIS Amazon Linux 2 STIG v1.0.0 L3Unix

SYSTEM AND COMMUNICATIONS PROTECTION

1.3.2 Ensure filesystem integrity is regularly checkedCIS Amazon Linux 2 STIG v1.0.0 L1Unix

AUDIT AND ACCOUNTABILITY

1.4.2 Ensure authentication required for single user mode - rescue.serviceCIS Amazon Linux 2 STIG v1.0.0 L1Unix

CONFIGURATION MANAGEMENT

1.5 Installing ISC BIND 9 - bind9 installationCIS BIND DNS v3.0.1 Caching Only Name ServerUnix
1.5 Installing ISC BIND 9 - bind9 installationCIS BIND DNS v1.0.0 L1 Authoritative Name ServerUnix

CONFIGURATION MANAGEMENT

1.5 Installing ISC BIND 9 - bind9 installationCIS BIND DNS v1.0.0 L1 Caching Only Name ServerUnix

CONFIGURATION MANAGEMENT

1.5 Installing ISC BIND 9 - named locationCIS BIND DNS v3.0.1 Authoritative Name ServerUnix

CONFIGURATION MANAGEMENT

1.5 Installing ISC BIND 9 - named locationCIS BIND DNS v3.0.1 Caching Only Name ServerUnix

CONFIGURATION MANAGEMENT

1.5 Installing ISC BIND 9 - named locationCIS BIND DNS v1.0.0 L1 Caching Only Name ServerUnix

CONFIGURATION MANAGEMENT

1.5 Installing ISC BIND 9 - named locationCIS BIND DNS v1.0.0 L1 Authoritative Name ServerUnix

CONFIGURATION MANAGEMENT

1.7.1.1 Ensure message of the day is configured properly - banner_checkCIS Amazon Linux 2 STIG v1.0.0 L1Unix

CONFIGURATION MANAGEMENT

1.7.1.1 Ensure message of the day is configured properly - msrvCIS Amazon Linux 2 STIG v1.0.0 L1Unix

CONFIGURATION MANAGEMENT

2.2.2.7 Ensure unrestricted logon is not allowedCIS Amazon Linux 2 STIG v1.0.0 L3Unix

CONFIGURATION MANAGEMENT

2.2.25 Ensure unrestricted mail relaying is prevented.CIS Amazon Linux 2 STIG v1.0.0 L3Unix

CONFIGURATION MANAGEMENT

2.2.30 Ensure NFS is configured to use RPCSEC_GSS.CIS Amazon Linux 2 STIG v1.0.0 L3Unix

CONFIGURATION MANAGEMENT

2.3.4 Ensure telnet client is not installedCIS Amazon Linux 2 STIG v1.0.0 L1Unix

IDENTIFICATION AND AUTHENTICATION

3.1.1 Ensure IP forwarding is disabled - /etc/sysctl.conf /etc/sysctl.d/* net.ipv4.ip_forward = 0CIS Amazon Linux 2 STIG v1.0.0 L1Unix

CONFIGURATION MANAGEMENT

3.1.1 Ensure IP forwarding is disabled - /etc/sysctl.conf /etc/sysctl.d/* net.ipv6.conf.all.forwarding = 0CIS Amazon Linux 2 STIG v1.0.0 L1Unix

CONFIGURATION MANAGEMENT

3.1.2 Ensure packet redirect sending is disabled - /etc/sysctl.conf /etc/sysctl.d/* net.ipv4.conf.default.send_redirects=0CIS Amazon Linux 2 STIG v1.0.0 L1Unix

CONFIGURATION MANAGEMENT

3.1.2 Ensure packet redirect sending is disabled - sysctl net.ipv4.conf.all.send_redirects=0CIS Amazon Linux 2 STIG v1.0.0 L1Unix

CONFIGURATION MANAGEMENT

3.2.7 Ensure Reverse Path Filtering is enabled - /etc/sysctl.conf /etc/sysctl.d/* net.ipv4.conf.all.rp_filter = 1CIS Amazon Linux 2 STIG v1.0.0 L1Unix

CONFIGURATION MANAGEMENT

3.2.7 Ensure Reverse Path Filtering is enabled - sysctl net.ipv4.conf.all.rp_filter = 1CIS Amazon Linux 2 STIG v1.0.0 L1Unix

CONFIGURATION MANAGEMENT

3.2.7 Ensure Reverse Path Filtering is enabled - sysctl net.ipv4.conf.default.rp_filter = 1CIS Amazon Linux 2 STIG v1.0.0 L1Unix

CONFIGURATION MANAGEMENT

3.2.10 Ensure rate limiting measures are set - configCIS Amazon Linux 2 STIG v1.0.0 L3Unix

SYSTEM AND COMMUNICATIONS PROTECTION

4.1.1.5 Ensure audit logs on seperate system are encrypted.CIS Amazon Linux 2 STIG v1.0.0 L3Unix

AUDIT AND ACCOUNTABILITY

4.1.2.13 Ensure audit of kmod commandCIS Amazon Linux 2 STIG v1.0.0 L3Unix

AUDIT AND ACCOUNTABILITY

4.1.16 Ensure changes to system administration scope (sudoers) is collected - /etc/sudoersCIS Amazon Linux 2 STIG v1.0.0 L2Unix

AUDIT AND ACCOUNTABILITY

4.1.16 Ensure changes to system administration scope (sudoers) is collected - auditctl /etc/sudoers.dCIS Amazon Linux 2 STIG v1.0.0 L2Unix

AUDIT AND ACCOUNTABILITY

4.8 Enure off-load of audit logs - typeCIS Amazon Linux 2 STIG v1.0.0 L3Unix

AUDIT AND ACCOUNTABILITY

5.2.6 Ensure SSH Protocol is set to 2CIS Amazon Linux 2 STIG v1.0.0 L1Unix

SYSTEM AND COMMUNICATIONS PROTECTION

5.2.25 Ensure SSH setting for 'IgnoreUserKnownHosts' is enabled - IgnoreUserKnownHosts is enabled.CIS Amazon Linux 2 STIG v1.0.0 L3Unix

CONFIGURATION MANAGEMENT

5.3.8 Ensure date and time of last successful logon - showfailedCIS Amazon Linux 2 STIG v1.0.0 L3Unix

ACCESS CONTROL

5.3.8 Ensure date and time of last successful logon - silentCIS Amazon Linux 2 STIG v1.0.0 L3Unix

ACCESS CONTROL

5.3.9 Ensure multifactor authentication for access to privileged accountsCIS Amazon Linux 2 STIG v1.0.0 L3Unix

IDENTIFICATION AND AUTHENTICATION

5.4.1.11 Ensure inactive password lock is 0 daysCIS Amazon Linux 2 STIG v1.0.0 L3Unix

ACCESS CONTROL

6.2.8 Ensure users' home directories permissions are 750 or more restrictiveCIS Amazon Linux 2 STIG v1.0.0 L1Unix

ACCESS CONTROL

6.2.27 Ensure nosuid is set on users' home directories.CIS Amazon Linux 2 STIG v1.0.0 L3Unix

ACCESS CONTROL

6.4 Ensure system device files are labeled - unlabeled_tCIS Amazon Linux 2 STIG v1.0.0 L3Unix

ACCESS CONTROL

10.1 Ensure SELinux Is Enabled in Enforcing Mode - config fileCIS BIND DNS v1.0.0 L2 Authoritative Name ServerUnix

ACCESS CONTROL

10.1 Ensure SELinux Is Enabled in Enforcing Mode - current modeCIS BIND DNS v1.0.0 L2 Authoritative Name ServerUnix

ACCESS CONTROL

10.1 Ensure SELinux Is Enabled in Enforcing Mode - current modeCIS BIND DNS v1.0.0 L2 Caching Only Name ServerUnix

ACCESS CONTROL

CIS_Red_Hat_EL5_v2.2.1_L1.audit from Red Hat Enterprise Linux 5 BenchmarkCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix
CIS_Red_Hat_EL5_v2.2.1_L2.audit from Red Hat Enterprise Linux 5 BenchmarkCIS Red Hat Enterprise Linux 5 L2 v2.2.1Unix
GEN003540 - The system must implement non-executable program stacks - 'kernel.randomize_va_space'DISA STIG for Oracle Linux 5 v2r1Unix

CONFIGURATION MANAGEMENT

JBOS-AS-000135 - JBoss ROOT logger must be configured to utilize the appropriate logging level.DISA JBoss EAP 6.3 STIG v2r5Unix

AUDIT AND ACCOUNTABILITY