Item Search

NameAudit NamePluginCategory
1.1 Ensure packages are obtained from authorized repositoriesCIS PostgreSQL 9.5 OS v1.1.0Unix

CONFIGURATION MANAGEMENT

1.4.6 Ensure version 7.2 or newer booted with UEFI have a unique name for the grub superusers account - UEFI must have a unique name for the grub superusers account when booting into single-user mode and maintenance.CIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIGUnix

ACCESS CONTROL

ESXi : config-firewall-access - 'CIM SLP allowed'VMWare vSphere 5.X Hardening GuideVMware

SYSTEM AND COMMUNICATIONS PROTECTION

ESXi : config-firewall-access - 'Fault Tolerance blocked'VMWare vSphere 5.X Hardening GuideVMware

SYSTEM AND COMMUNICATIONS PROTECTION

ESXi : config-firewall-access - 'gdbserver blocked'VMWare vSphere 5.X Hardening GuideVMware

SYSTEM AND COMMUNICATIONS PROTECTION

ESXi : config-firewall-access - 'HBR allowed'VMWare vSphere 5.X Hardening GuideVMware

SYSTEM AND COMMUNICATIONS PROTECTION

ESXi : config-firewall-access - 'httpClient blocked'VMWare vSphere 5.X Hardening GuideVMware

SYSTEM AND COMMUNICATIONS PROTECTION

ESXi : config-firewall-access - 'syslog blocked'VMWare vSphere 5.X Hardening GuideVMware

SYSTEM AND COMMUNICATIONS PROTECTION

ESXi : config-firewall-access - 'VMware vCenter Agent allowed'VMWare vSphere 5.X Hardening GuideVMware

SYSTEM AND COMMUNICATIONS PROTECTION

ESXi : config-firewall-access - 'vSphere Web Access allowed'VMWare vSphere 5.X Hardening GuideVMware

SYSTEM AND COMMUNICATIONS PROTECTION

ESXi : config-firewall-access - 'WOL allowed'VMWare vSphere 5.X Hardening GuideVMware

SYSTEM AND COMMUNICATIONS PROTECTION

ESXi : config-ntpVMWare vSphere 5.X Hardening GuideVMware

AUDIT AND ACCOUNTABILITY

ESXi : disable-esxi-shellVMWare vSphere 5.X Hardening GuideVMware

CONFIGURATION MANAGEMENT

ESXi : disable-mobVMWare vSphere 5.X Hardening GuideVMware
ESXi : disable-sshVMWare vSphere 5.X Hardening GuideVMware

CONFIGURATION MANAGEMENT

ESXi : enable-ad-authVMWare vSphere 5.X Hardening GuideVMware

IDENTIFICATION AND AUTHENTICATION

ESXi : enable-nfc-sslVMWare vSphere 5.X Hardening GuideVMware

SYSTEM AND COMMUNICATIONS PROTECTION

ESXi : enable-remote-dumpVMWare vSphere 5.X Hardening GuideVMware
ESXi : remove-authorized-keysVMWare vSphere 5.X Hardening GuideVMware
ESXi : remove-revoked-certificatesVMWare vSphere 5.X Hardening GuideVMware
ESXi : set-dcui-accessVMWare vSphere 5.X Hardening GuideVMware
ESXi : set-password-complexityVMWare vSphere 5.X Hardening GuideVMware

IDENTIFICATION AND AUTHENTICATION

ESXi : set-shell-timeoutVMWare vSphere 5.X Hardening GuideVMware

ACCESS CONTROL

ESXi : unique-chap-secretsVMWare vSphere 5.X Hardening GuideVMware
ESXi : verify-acceptance-level-supportedVMWare vSphere 5.X Hardening GuideVMware
ESXi : verify-kernel-modulesVMWare vSphere 5.X Hardening GuideVMware
ESXi : vmdk-zero-outVMWare vSphere 5.X Hardening GuideVMware
GEN005260 - X Window System connections not required must be disabled.DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

PGS9-00-008000 - PostgreSQL must implement NIST FIPS 140-2 or 140-3 validated cryptographic modules to generate and validate cryptographic hashes.DISA STIG PostgreSQL 9.x on RHEL OS v2r5Unix

SYSTEM AND COMMUNICATIONS PROTECTION

PGS9-00-008200 - PostgreSQL must implement NIST FIPS 140-2 or 140-3 validated cryptographic modules to protect unclassified information requiring confidentiality and cryptographic protection, in accordance with the data owners requirements.DISA STIG PostgreSQL 9.x on RHEL OS v2r5Unix

SYSTEM AND COMMUNICATIONS PROTECTION

SSO : no-SSO-self-signed-certsVMWare vSphere 5.X Hardening GuideVMware
vCenter : apply-os-patchesVMWare vSphere 5.X Hardening GuideVMware
vCenter : install-with-service-accountVMWare vSphere 5.X Hardening GuideVMware
vCenter : monitor-admin-assignmentVMWare vSphere 5.X Hardening GuideVMware
vCenter : remove-revoked-certificatesVMWare vSphere 5.X Hardening GuideVMware
vCenter : restrict-admin-privilegeVMWare vSphere 5.X Hardening GuideVMware
vCenter : restrict-network-accessVMWare vSphere 5.X Hardening GuideVMware
VM : minimize-console-useVMWare vSphere 5.X Hardening GuideVMware
VM : minimize-console-VNC-useVMWare vSphere 5.X Hardening GuideVMware
VM : secure-guest-osVMWare vSphere 5.X Hardening GuideVMware
VM : use-secure-serial-communicationVMWare vSphere 5.X Hardening GuideVMware
vNetwork : document-pvlansVMWare vSphere 5.X Hardening GuideVMware
vNetwork : limit-network-healthcheckVMWare vSphere 5.X Hardening GuideVMware
vNetwork : no-vgt-vlan-4095VMWare vSphere 5.X Hardening GuideVMware

CONFIGURATION MANAGEMENT

vNetwork : reject-mac-changes - 'vSwitch'VMWare vSphere 5.X Hardening GuideVMware

SYSTEM AND COMMUNICATIONS PROTECTION

VUM : isolate-vum-airgapVMWare vSphere 5.X Hardening GuideVMware
VUM : isolate-vum-webserverVMWare vSphere 5.X Hardening GuideVMware
VUM : limit-vum-usersVMWare vSphere 5.X Hardening GuideVMware
VUM : no-vum-self-signed-certsVMWare vSphere 5.X Hardening GuideVMware
VUM : patch-vum-osVMWare vSphere 5.X Hardening GuideVMware