Item Search

NameAudit NamePluginCategory
1.1.1.6 Ensure squashfs kernel module is not availableCIS AlmaLinux OS 9 v2.0.0 L2 WorkstationUnix

CONFIGURATION MANAGEMENT

1.1.1.6 Ensure squashfs kernel module is not availableCIS Rocky Linux 9 v2.0.0 L2 WorkstationUnix

CONFIGURATION MANAGEMENT

1.1.1.6 Ensure squashfs kernel module is not availableCIS Red Hat Enterprise Linux 9 v2.0.0 L2 ServerUnix

CONFIGURATION MANAGEMENT

1.1.1.6 Ensure squashfs kernel module is not availableCIS Oracle Linux 9 v2.0.0 L2 ServerUnix

CONFIGURATION MANAGEMENT

1.1.1.7 Ensure squashfs kernel module is not availableCIS Ubuntu Linux 24.04 LTS v1.0.0 L2 ServerUnix

CONFIGURATION MANAGEMENT

1.1.1.7 Ensure squashfs kernel module is not availableCIS SUSE Linux Enterprise 15 v2.0.0 L2 ServerUnix

CONFIGURATION MANAGEMENT

1.1.1.7 Ensure squashfs kernel module is not availableCIS Debian Linux 12 v1.1.0 L2 WorkstationUnix

CONFIGURATION MANAGEMENT

1.1.1.7 Ensure squashfs kernel module is not availableCIS Ubuntu Linux 24.04 LTS v1.0.0 L2 WorkstationUnix

CONFIGURATION MANAGEMENT

1.1.1.7 Ensure squashfs kernel module is not availableCIS SUSE Linux Enterprise 15 v2.0.0 L2 WorkstationUnix

CONFIGURATION MANAGEMENT

1.2.1 Ensure package manager repositories are properly configuredCIS NGINX Benchmark v2.1.0 L1 ProxyUnix

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

1.6.2 Ensure 'SSH version 2' is enabledCIS Cisco Firewall v8.x L1 v4.2.0Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

1.8.5 Ensure Standard Mandatory DoD Notice and Consent Banner displayed via a graphical user logonCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIGUnix

ACCESS CONTROL

2.7 Set default ulimit as appropriateCIS Docker 1.13.0 v1.0.0 L1 DockerUnix

SYSTEM AND COMMUNICATIONS PROTECTION

3.4.1.1 Ensure ufw is installedCIS Ubuntu Linux 20.04 LTS Server L1 v2.0.1Unix

SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION

3.4.2.1 Ensure nftables is installedCIS CentOS Linux 8 Server L1 v2.0.0Unix

SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION

3.4.2.1 Ensure nftables is installedCIS Fedora 28 Family Linux Server L1 v2.0.0Unix

SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION

3.4.3.1.2 Ensure nftables is not installed with iptablesCIS CentOS Linux 8 Server L1 v2.0.0Unix

SECURITY ASSESSMENT AND AUTHORIZATION, CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

3.4.3.1.2 Ensure nftables is not installed with iptablesCIS Fedora 28 Family Linux Workstation L1 v2.0.0Unix

SECURITY ASSESSMENT AND AUTHORIZATION, CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

3.4.3.1.2 Ensure nftables is not installed with iptablesCIS Ubuntu Linux 20.04 LTS Workstation L1 v2.0.1Unix

SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION

3.4.3.1.2 Ensure nftables is not installed with iptablesCIS Debian 10 Workstation L1 v2.0.0Unix

SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION

3.4.3.1.2 Ensure nftables is not installed with iptablesCIS Fedora 28 Family Linux Server L1 v2.0.0Unix

SECURITY ASSESSMENT AND AUTHORIZATION, CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

3.5.1.3 Ensure nftables either not installed or masked with firewalldCIS Amazon Linux 2 STIG v2.0.0 L1 ServerUnix

SECURITY ASSESSMENT AND AUTHORIZATION, CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

3.5.1.3 Ensure nftables either not installed or masked with firewalld - maskedCIS Red Hat Enterprise Linux 7 STIG v2.0.0 L1 ServerUnix

SECURITY ASSESSMENT AND AUTHORIZATION, CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

3.5.3.1.2 Ensure nftables is not installed with iptablesCIS Amazon Linux 2 STIG v2.0.0 L1 ServerUnix

SECURITY ASSESSMENT AND AUTHORIZATION, CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

4.2.1.4 Ensure rsyslog is configured to send logs to a remote log hostCIS Debian 8 Workstation L1 v2.0.2Unix

AUDIT AND ACCOUNTABILITY

4.2.1.6 Ensure rsyslog is configured to send logs to a remote log hostCIS Debian Family Workstation L1 v1.0.0Unix

AUDIT AND ACCOUNTABILITY

4.2.5 Ensure firewalld service is enabled and runningCIS SUSE Linux Enterprise 15 v2.0.0 L1 ServerUnix

SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION

4.4.1.2 Ensure nftables is not in use with iptablesCIS Ubuntu Linux 24.04 LTS v1.0.0 L1 WorkstationUnix

SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION

4.4.1.2 Ensure nftables is not in use with iptablesCIS Debian Linux 12 v1.1.0 L1 ServerUnix

SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION

5.1.1.6 Ensure rsyslog is configured to send logs to a remote log hostCIS Oracle Linux 7 v4.0.0 L1 WorkstationUnix

AUDIT AND ACCOUNTABILITY

5.1.1.6 Ensure rsyslog is configured to send logs to a remote log hostCIS Red Hat EL8 Workstation L1 v3.0.0Unix

AUDIT AND ACCOUNTABILITY

5.1.2.6 Ensure rsyslog is configured to send logs to a remote log hostCIS Ubuntu Linux 20.04 LTS Workstation L1 v2.0.1Unix

AUDIT AND ACCOUNTABILITY

6.2.3.6 Ensure rsyslog is configured to send logs to a remote log hostCIS Rocky Linux 9 v2.0.0 L1 ServerUnix

AUDIT AND ACCOUNTABILITY

8.3.1 Ensure unnecessary or superfluous functions inside VMs are disabledCIS VMware ESXi 6.5 v1.0.0 Level 1VMware

SYSTEM AND INFORMATION INTEGRITY

DTAVSEL-003 - The McAfee VirusScan Enterprise for Linux 1.9.x/2.0.x must be configured to enable On-Access scanning.McAfee Virus Scan Enterprise for Linux 1.9x/2.0x Local Client v1r6Unix

SYSTEM AND INFORMATION INTEGRITY

Ensure SSH Protocol is set to 2Tenable Cisco Firepower Management Center OS Best Practices AuditUnix

CONFIGURATION MANAGEMENT

Excel 2 macrosheets and add-in filesMSCT M365 Apps for enterprise 2412 v1.0.0Windows

SYSTEM AND INFORMATION INTEGRITY

GEN000000-LNX00800 - Use a Linux Security Module configured to limit privileges of system services - 'SELINUXTYPE = targeted or strict'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

CONFIGURATION MANAGEMENT

OL08-00-030603 - OL 8 must enable Linux audit logging for the USBGuard daemon.DISA Oracle Linux 8 STIG v2r4Unix

AUDIT AND ACCOUNTABILITY

PHTN-30-000046 - The Photon operating system must initiate auditing as part of the boot process.DISA STIG VMware vSphere 7.0 Photon OS v1r4Unix

AUDIT AND ACCOUNTABILITY

RHEL-06-000534 - The Red Hat Enterprise Linux operating system must implement NIST FIPS-validated cryptography for the following: to provision digital signatures, to generate cryptographic hashes, and to protect data requiring data-at-rest protections in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, and standards - grubDISA Red Hat Enterprise Linux 6 STIG v2r2Unix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

RHEL-09-654015 - RHEL 9 must audit all uses of the chmod, fchmod, and fchmodat system calls.DISA Red Hat Enterprise Linux 9 STIG v2r4Unix

AUDIT AND ACCOUNTABILITY, MAINTENANCE

RHEL-09-654100 - RHEL 9 must audit all uses of the gpasswd command.DISA Red Hat Enterprise Linux 9 STIG v2r4Unix

AUDIT AND ACCOUNTABILITY, MAINTENANCE

RHEL-09-654160 - RHEL 9 must audit all uses of the unix_chkpwd command.DISA Red Hat Enterprise Linux 9 STIG v2r4Unix

AUDIT AND ACCOUNTABILITY, MAINTENANCE

RHEL-09-654215 - RHEL 9 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/sudoers.DISA Red Hat Enterprise Linux 9 STIG v2r4Unix

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY, MAINTENANCE

RHEL-09-654220 - RHEL 9 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/sudoers.d/ directory.DISA Red Hat Enterprise Linux 9 STIG v2r4Unix

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY, MAINTENANCE

RHEL-09-654255 - RHEL 9 must generate audit records for all account creations, modifications, disabling, and termination events that affect /var/log/lastlog.DISA Red Hat Enterprise Linux 9 STIG v2r4Unix

AUDIT AND ACCOUNTABILITY, MAINTENANCE

RHEL-09-654275 - RHEL 9 audit system must protect auditing rules from unauthorized change.DISA Red Hat Enterprise Linux 9 STIG v2r4Unix

AUDIT AND ACCOUNTABILITY

RHEL-09-671015 - RHEL 9 must employ FIPS 140-3 approved cryptographic hashing algorithms for all stored passwords.DISA Red Hat Enterprise Linux 9 STIG v2r4Unix

IDENTIFICATION AND AUTHENTICATION

SQL6-D0-001900 - SQL Server must isolate security functions from non-security functions.DISA STIG SQL Server 2016 Database Audit v3r2MS_SQLDB

SYSTEM AND COMMUNICATIONS PROTECTION