Item Search

NameAudit NamePluginCategory
1.3.3 Ensure 'Maximum lifetime for user ticket' is set to '10 or fewer hours, but not 0' (STIG DC only)CIS Microsoft Windows Server 2016 STIG v3.0.0 STIG DCWindows

IDENTIFICATION AND AUTHENTICATION

1.3.3 Ensure 'Maximum lifetime for user ticket' is set to '10 or fewer hours, but not 0' (STIG DC only)CIS Microsoft Windows Server 2019 STIG v3.0.0 STIG DCWindows

IDENTIFICATION AND AUTHENTICATION

2.2.21 Ensure 'Create symbolic links' is set to 'Administrators, NT VIRTUAL MACHINE\Virtual Machines' (STIG only)CIS Microsoft Windows Server 2022 STIG v2.0.0 STIG DCWindows

ACCESS CONTROL

9.1.3 Ensure 'Windows Firewall: Domain: Outbound connections' is set to 'Allow (default)' (STIG only)CIS Microsoft Windows Server 2016 STIG v3.0.0 STIG DCWindows

SYSTEM AND COMMUNICATIONS PROTECTION

9.2.3 Ensure 'Windows Firewall: Private: Outbound connections' is set to 'Allow (default)' (STIG only)CIS Microsoft Windows Server 2016 STIG v3.0.0 STIG DCWindows

SYSTEM AND COMMUNICATIONS PROTECTION

9.3.3 Ensure 'Windows Firewall: Public: Outbound connections' is set to 'Allow (default)' (STIG only)CIS Microsoft Windows Server 2016 STIG v3.0.0 STIG DCWindows

SYSTEM AND COMMUNICATIONS PROTECTION

20.16 Ensure 'Default permissions for the HKEY_LOCAL_MACHINE registry hive must be maintained' (STIG only)CIS Microsoft Windows Server 2022 STIG v2.0.0 STIG DCWindows

ACCESS CONTROL, CONFIGURATION MANAGEMENT

20.16 Ensure 'Default permissions for the HKEY_LOCAL_MACHINE registry hive must be maintained' (STIG only)CIS Microsoft Windows Server 2022 STIG v2.0.0 STIG MSWindows

ACCESS CONTROL, CONFIGURATION MANAGEMENT

20.33 Ensure 'Local volumes must use a format that supports NTFS attributes' (STIG only)CIS Microsoft Windows Server 2022 STIG v2.0.0 STIG MSWindows

CONFIGURATION MANAGEMENT

20.47 Ensure 'Permissions for program file directories must conform to minimum requirements' (STIG only)CIS Microsoft Windows Server 2022 STIG v2.0.0 STIG DCWindows

ACCESS CONTROL

20.52 Ensure 'Permissions for the Windows installation directory conform to minimum requirements' (STIG only)CIS Microsoft Windows Server 2022 STIG v2.0.0 STIG DCWindows

ACCESS CONTROL

20.52 Ensure 'Permissions for the Windows installation directory conform to minimum requirements' (STIG only)CIS Microsoft Windows Server 2022 STIG v2.0.0 STIG MSWindows

ACCESS CONTROL

20.62 Ensure 'Telnet Client is not installed'CIS Microsoft Windows Server 2019 STIG v3.0.0 STIG MSWindows

CONFIGURATION MANAGEMENT

APPL-13-001060 - The macOS system must accept and verify Personal Identity Verification (PIV) credentials, implement a local cache of revocation data to support path discovery and validation in case of the inability to access revocation information via the network, and only allow the use of DOD PKI-established certificate authorities for verification of the establishment of protected sessions.DISA STIG Apple macOS 13 v1r5Unix

IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

APPL-13-003001 - The macOS system must issue or obtain public key certificates under an appropriate certificate policy from an approved service provider.DISA STIG Apple macOS 13 v1r5Unix

IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

APPL-14-000005 The macOS system must configure user session lock when a smart token is removed.DISA Apple macOS 14 (Sonoma) STIG v2r3Unix

ACCESS CONTROL

APPL-14-001060 The macOS system must set smart card certificate trust to moderate.DISA Apple macOS 14 (Sonoma) STIG v2r3Unix

IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

APPL-15-000005 - The macOS system must configure user session lock when a smart token is removed.DISA Apple macOS 15 (Sequoia) STIG v1r3Unix

ACCESS CONTROL

APPL-15-001060 - The macOS system must set smart card certificate trust to moderate.DISA Apple macOS 15 (Sequoia) STIG v1r3Unix

IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

CIS_Amazon_Linux_2_STIG_v2.0.0_L2_Server.audit from CIS Amazon Linux 2 STIG Benchmark v2.0.0CIS Amazon Linux 2 STIG v2.0.0 L2 ServerUnix
CISC-ND-000010 - The Cisco router must be configured to limit the number of concurrent management sessions to an organization-defined number.DISA STIG Cisco IOS XE Router NDM v3r2Cisco

ACCESS CONTROL

CISC-ND-000120 - The Cisco router must be configured to automatically audit account removal actions.DISA STIG Cisco IOS XE Router NDM v3r2Cisco

ACCESS CONTROL

CISC-ND-000280 - The Cisco router must produce audit records containing information to establish when (date and time) the events occurred.DISA STIG Cisco IOS XE Router NDM v3r2Cisco

AUDIT AND ACCOUNTABILITY

CISC-ND-000380 - The Cisco router must be configured to protect audit information from unauthorized modification.DISA STIG Cisco IOS XE Router NDM v3r2Cisco

AUDIT AND ACCOUNTABILITY

CISC-ND-000620 - The Cisco router must only store cryptographic representations of passwords.DISA STIG Cisco IOS XE Router NDM v3r2Cisco

IDENTIFICATION AND AUTHENTICATION

CISC-ND-000980 - The Cisco router must be configured to allocate audit record storage capacity in accordance with organization-defined audit record storage requirements.DISA STIG Cisco IOS XE Router NDM v3r2Cisco

AUDIT AND ACCOUNTABILITY

CISC-ND-001200 - The Cisco router must be configured to use FIPS-validated Keyed-Hash Message Authentication Code (HMAC) to protect the integrity of remote maintenance sessions.DISA STIG Cisco IOS XE Router NDM v3r2Cisco

IDENTIFICATION AND AUTHENTICATION, MAINTENANCE

CISC-ND-001410 - The Cisco router must be configured to back up the configuration when changes occur.DISA STIG Cisco IOS XE Router NDM v3r2Cisco

CONFIGURATION MANAGEMENT, CONTINGENCY PLANNING

CISC-RT-000160 - The Cisco router must be configured to have IP directed broadcast disabled on all interfaces.DISA STIG Cisco IOS XE Router RTR v3r2Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

CISC-RT-000460 - The Cisco router providing connectivity to the Network Operations Center (NOC) must be configured to forward all in-band management traffic via an IPsec tunnel.DISA STIG Cisco IOS XE Router RTR v3r2Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

CISC-RT-000500 - The Cisco BGP router must be configured to reject inbound route advertisements for any prefixes belonging to the local autonomous system (AS).DISA STIG Cisco IOS XE Router RTR v3r2Cisco

ACCESS CONTROL

CISC-RT-000530 - The Cisco BGP router must be configured to reject outbound route advertisements for any prefixes belonging to the IP core.DISA STIG Cisco IOS XE Router RTR v3r2Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

CISC-RT-000600 - The Cisco MPLS router must be configured to synchronize Interior Gateway Protocol (IGP) and LDP to minimize packet loss when an IGP adjacency is established prior to LDP peers completing label exchange.DISA STIG Cisco IOS XE Router RTR v3r2Cisco

CONFIGURATION MANAGEMENT

CISC-RT-000610 - The MPLS router with RSVP-TE enabled must be configured with message pacing to adjust maximum burst and maximum number of RSVP messages to an output queue based on the link speed and input queue size of adjacent core routers.DISA STIG Cisco IOS XE Router RTR v3r2Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

CISC-RT-000650 - The Cisco PE router must be configured to have each VRF with the appropriate Route Distinguisher (RD).DISA STIG Cisco IOS XE Router RTR v3r2Cisco

CONTINGENCY PLANNING

CISC-RT-000660 - The Cisco PE router providing MPLS Layer 2 Virtual Private Network (L2VPN) services must be configured to authenticate targeted Label Distribution Protocol (LDP) sessions used to exchange virtual circuit (VC) information using a FIPS-approved message authentication code algorithm.DISA STIG Cisco IOS XE Router RTR v3r2Cisco

IDENTIFICATION AND AUTHENTICATION

CISC-RT-000670 - The Cisco PE router providing MPLS Virtual Private Wire Service (VPWS) must be configured to have the appropriate virtual circuit identification (VC ID) for each attachment circuit.DISA STIG Cisco IOS XE Router RTR v3r2Cisco

CONTINGENCY PLANNING

CISC-RT-000690 - The Cisco PE router must be configured to enforce the split-horizon rule for all pseudowires within a Virtual Private LAN Services (VPLS) bridge domain.DISA STIG Cisco IOS XE Router RTR v3r2Cisco

CONFIGURATION MANAGEMENT

CISC-RT-000720 - The Cisco PE router must be configured to limit the number of MAC addresses it can learn for each Virtual Private LAN Services (VPLS) bridge domain.DISA STIG Cisco IOS XE Router RTR v3r2Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

CISC-RT-000760 - The Cisco PE router must be configured to enforce a Quality-of-Service (QoS) policy to provide preferred treatment for mission-critical applications.DISA STIG Cisco IOS XE Router RTR v3r2Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

CISC-RT-000770 - The Cisco P router must be configured to enforce a Quality-of-Service (QoS) policy to provide preferred treatment for mission-critical applications.DISA STIG Cisco IOS XE Router RTR v3r2Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

CISC-RT-000840 - The Cisco multicast Rendezvous Point (RP) router must be configured to filter Protocol Independent Multicast (PIM) Join messages received from the Designated Router (DR) for any undesirable multicast groups.DISA STIG Cisco IOS XE Router RTR v3r2Cisco

ACCESS CONTROL

JUEX-L2-000160 - The Juniper EX switch must be configured to enable IGMP or MLD Snooping on all VLANs.DISA Juniper EX Series Layer 2 Switch v2r2Juniper

CONFIGURATION MANAGEMENT

JUEX-L2-000190 - The Juniper EX switch must be configured to assign all disabled access interfaces to an unused VLAN.DISA Juniper EX Series Layer 2 Switch v2r2Juniper

SYSTEM AND COMMUNICATIONS PROTECTION

JUEX-L2-000230 - The Juniper EX switch must be configured to set all user-facing or untrusted ports as access interfaces.DISA Juniper EX Series Layer 2 Switch v2r2Juniper

CONFIGURATION MANAGEMENT

PANW-NM-000110 - The Palo Alto Networks security platform must accept and verify Personal Identity Verification (PIV) credentialsDISA STIG Palo Alto NDM v3r2Palo_Alto

CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION

Session timeoutArubaOS CX 10.x Hardening Guide v1.0.0ArubaOS

ACCESS CONTROL

SPLK-CL-000235 - Splunk Enterprise must notify analysts of applicable events for Tier 2 CSSP and JRSS only.DISA STIG Splunk Enterprise 7.x for Windows v3r1 REST APISplunk

ACCESS CONTROL

VCLD-67-000014 - Rsyslog must be configured to monitor VAMI logs.DISA STIG VMware vSphere 6.7 VAMI-lighttpd v1r3Unix

AUDIT AND ACCOUNTABILITY

WG040 A22 - Public web server resources must not be shared with private assets.DISA STIG Apache Server 2.2 Unix v1r11 MiddlewareUnix