Item Search

NameAudit NamePluginCategory
DO0238-ORACLE11 - The directories assigned to the LOG_ARCHIVE_DEST* parameters should be protected from unauthorized access - 'LOG_MODE = NOARCHIVELOG'DISA STIG Oracle 11 Instance v9r1 DatabaseOracleDB

CONTINGENCY PLANNING, SYSTEM AND COMMUNICATIONS PROTECTION

GEN003640 - The root file system must employ journaling or another mechanism ensuring file system consistencyDISA STIG AIX 5.3 v1r2Unix

CONTINGENCY PLANNING

GEN003640 - The root file system must employ journaling or another mechanism ensuring file system consistencyDISA STIG AIX 6.1 v1r14Unix

CONTINGENCY PLANNING

GEN003640 - The root file system must employ journaling or another mechanism ensuring file system consistency - 'fs type'DISA STIG for Oracle Linux 5 v2r1Unix

CONFIGURATION MANAGEMENT, CONTINGENCY PLANNING

GEN003640 - The root file system must employ journaling or another mechanism ensuring file system consistency - 'nolog option'DISA STIG for Oracle Linux 5 v2r1Unix

CONFIGURATION MANAGEMENT, CONTINGENCY PLANNING

GEN003640 - The root file system must employ journaling or another mechanism that ensures file system consistency - 'fs type'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

CONTINGENCY PLANNING

GEN003640 - The root file system must employ journaling or another mechanism that ensures file system consistency - 'nolog option'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

CONTINGENCY PLANNING

GEN003650 - All local file systems must employ journaling or another mechanism ensuring file system consistency.DISA STIG AIX 5.3 v1r2Unix

CONTINGENCY PLANNING

GEN003650 - All local file systems must employ journaling or another mechanism ensuring file system consistency.DISA STIG AIX 6.1 v1r14Unix

CONTINGENCY PLANNING

GEN003650 - All local file systems must employ journaling or another mechanism ensuring file system consistency.DISA STIG for Oracle Linux 5 v2r1Unix

CONFIGURATION MANAGEMENT, CONTINGENCY PLANNING

GEN003650 - All local file systems must employ journaling or another mechanism that ensures file system consistency.DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

CONTINGENCY PLANNING

MS.DEFENDER.4.5v1 - A list of apps that are restricted from accessing files protected by DLP policy SHOULD be defined.CISA SCuBA Microsoft 365 Defender v1.5.0microsoft_azure

ACCESS CONTROL, SECURITY ASSESSMENT AND AUTHORIZATION, CONFIGURATION MANAGEMENT, CONTINGENCY PLANNING, IDENTIFICATION AND AUTHENTICATION, RISK ASSESSMENT, SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY

MS.DEFENDER.4.6v1 - The custom policy SHOULD include an action to block access to sensitiveCISA SCuBA Microsoft 365 Defender v1.5.0microsoft_azure

ACCESS CONTROL, SECURITY ASSESSMENT AND AUTHORIZATION, CONFIGURATION MANAGEMENT, CONTINGENCY PLANNING, IDENTIFICATION AND AUTHENTICATION, RISK ASSESSMENT, SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY

MS.SHAREPOINT.2.1v1 - File and folder default sharing scope SHALL be set to Specific people (only the people the user specifies).CISA SCuBA Microsoft 365 SharePoint Online OneDrive v1.5.0microsoft_azure

ACCESS CONTROL, SECURITY ASSESSMENT AND AUTHORIZATION, CONFIGURATION MANAGEMENT, CONTINGENCY PLANNING, IDENTIFICATION AND AUTHENTICATION, RISK ASSESSMENT, SYSTEM AND SERVICES ACQUISITION, SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY

MS.SHAREPOINT.2.2v1 - File and folder default sharing permissions SHALL be set to View.CISA SCuBA Microsoft 365 SharePoint Online OneDrive v1.5.0microsoft_azure

ACCESS CONTROL, SECURITY ASSESSMENT AND AUTHORIZATION, CONFIGURATION MANAGEMENT, CONTINGENCY PLANNING, SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY

MS.SHAREPOINT.3.2v1 - The allowable file and folder permissions for links SHALL be set to View only.CISA SCuBA Microsoft 365 SharePoint Online OneDrive v1.5.0microsoft_azure

ACCESS CONTROL, SECURITY ASSESSMENT AND AUTHORIZATION, CONFIGURATION MANAGEMENT, CONTINGENCY PLANNING, SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY

MS.SHAREPOINT.3.3v1 - Reauthentication days for people who use a verification code SHALL be set to 30 days or less.CISA SCuBA Microsoft 365 SharePoint Online OneDrive v1.5.0microsoft_azure

ACCESS CONTROL, SECURITY ASSESSMENT AND AUTHORIZATION, CONFIGURATION MANAGEMENT, CONTINGENCY PLANNING, SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY

SOL-11.1-080150 - The operating system must implement transaction recovery for transaction-based systems.DISA STIG Solaris 11 X86 v3r1Unix

CONFIGURATION MANAGEMENT, CONTINGENCY PLANNING

SQL2-00-017500 - SQL Server must recover to a known state that is verifiable.DISA STIG SQL Server 2012 DB Instance Security v1r20MS_SQLDB

CONTINGENCY PLANNING

SQL2-00-017510 - Appropriate staff must be alerted when the amount of storage space used by the SQL Server transaction log file(s) exceeds an organization-defined value - s exceeds an organization-defined value.DISA STIG SQL Server 2012 Database Audit v1r20MS_SQLDB

CONTINGENCY PLANNING