Item Search

NameAudit NamePluginCategory
1.1.1.8 Ensure usb-storage kernel module is not availableCIS AlmaLinux OS 9 v2.0.0 L2 WorkstationUnix

MEDIA PROTECTION

1.1.2.4.1 Ensure separate partition exists for /varCIS AlmaLinux OS 8 Server L2 v3.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

1.1.2.5.1 Ensure separate partition exists for /var/tmpCIS AlmaLinux OS 9 v2.0.0 L2 ServerUnix

ACCESS CONTROL, MEDIA PROTECTION

1.1.2.7.1 Ensure separate partition exists for /var/log/auditCIS AlmaLinux OS 9 v2.0.0 L2 ServerUnix

AUDIT AND ACCOUNTABILITY

1.1.20 Disable Mounting of jffs2 Filesystems - install jffs2 /bin/true'CIS Red Hat Enterprise Linux 5 L2 v2.2.1Unix

CONFIGURATION MANAGEMENT

1.1.24 Disable Mounting of udf Filesystems - modprobeCIS Red Hat Enterprise Linux 5 L2 v2.2.1Unix

CONFIGURATION MANAGEMENT

1.2.3 Ensure repo_gpgcheck is globally activatedCIS AlmaLinux OS 8 Server L2 v3.0.0Unix

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

1.3.1.5 Ensure the SELinux mode is enforcingCIS AlmaLinux OS 9 v2.0.0 L2 WorkstationUnix

ACCESS CONTROL, MEDIA PROTECTION

1.5.1.5 Ensure the SELinux mode is enforcingCIS AlmaLinux OS 8 Server L2 v3.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

2.1.20 Ensure X window server services are not in useCIS AlmaLinux OS 9 v2.0.0 L2 ServerUnix

CONFIGURATION MANAGEMENT

2.2.2 Ensure avahi daemon services are not in useCIS AlmaLinux OS 8 Workstation L2 v3.0.0Unix

CONFIGURATION MANAGEMENT

2.3 Ensure authentication is enabled in the sharded cluster - authenticationMechanismsCIS MongoDB 5 L2 OS Linux v1.2.0Unix

CONFIGURATION MANAGEMENT

2.3 Ensure authentication is enabled in the sharded cluster - clusterFileCIS MongoDB 5 L2 OS Linux v1.2.0Unix

CONFIGURATION MANAGEMENT

2.3 Ensure authentication is enabled in the sharded cluster - PEMKeyFileCIS MongoDB 5 L2 OS Windows v1.2.0Windows

CONFIGURATION MANAGEMENT

2.08 Listener password - 'Use OS Authentication'CIS v1.1.0 Oracle 11g OS L1Unix

IDENTIFICATION AND AUTHENTICATION

3.2.2 Ensure tipc kernel module is not availableCIS AlmaLinux OS 8 Server L2 v3.0.0Unix

CONFIGURATION MANAGEMENT

4.3.4 Ensure users must provide password for escalationCIS AlmaLinux OS 8 Server L2 v3.0.0Unix

ACCESS CONTROL

4.3.4 Ensure users must provide password for escalationCIS AlmaLinux OS 8 Workstation L2 v3.0.0Unix

ACCESS CONTROL

4.5 Ensure Encryption of Data at Rest - encryptionKeyFileCIS MongoDB 5 L2 OS Linux v1.2.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION

4.5.3.1 Ensure nologin is not listed in /etc/shellsCIS AlmaLinux OS 8 Workstation L2 v3.0.0Unix

IDENTIFICATION AND AUTHENTICATION

5.2 Ensure that audit filters are configured properlyCIS MongoDB 4 L2 OS Linux v1.0.0Unix

AUDIT AND ACCOUNTABILITY

5.2.1.4 Ensure auditd service is enabledCIS AlmaLinux OS 8 Workstation L2 v3.0.0Unix

AUDIT AND ACCOUNTABILITY

5.2.2.3 Ensure system is disabled when audit logs are fullCIS AlmaLinux OS 8 Workstation L2 v3.0.0Unix

AUDIT AND ACCOUNTABILITY

5.2.3.2 Ensure actions as another user are always loggedCIS AlmaLinux OS 8 Workstation L2 v3.0.0Unix

AUDIT AND ACCOUNTABILITY

5.2.3.3 Ensure events that modify the sudo log file are collectedCIS AlmaLinux OS 8 Server L2 v3.0.0Unix

AUDIT AND ACCOUNTABILITY

5.2.3.5 Ensure events that modify the system's network environment are collectedCIS AlmaLinux OS 8 Workstation L2 v3.0.0Unix

AUDIT AND ACCOUNTABILITY

5.2.3.6 Ensure use of privileged commands are collectedCIS AlmaLinux OS 8 Server L2 v3.0.0Unix

AUDIT AND ACCOUNTABILITY

5.2.3.9 Ensure discretionary access control permission modification events are collectedCIS AlmaLinux OS 8 Server L2 v3.0.0Unix

AUDIT AND ACCOUNTABILITY

5.2.3.10 Ensure successful file system mounts are collectedCIS AlmaLinux OS 8 Workstation L2 v3.0.0Unix

AUDIT AND ACCOUNTABILITY

5.2.3.12 Ensure login and logout events are collectedCIS AlmaLinux OS 8 Workstation L2 v3.0.0Unix

AUDIT AND ACCOUNTABILITY

5.2.3.16 Ensure successful and unsuccessful attempts to use the setfacl command are recordedCIS AlmaLinux OS 8 Server L2 v3.0.0Unix

AUDIT AND ACCOUNTABILITY

5.2.3.17 Ensure successful and unsuccessful attempts to use the chacl command are recordedCIS AlmaLinux OS 8 Server L2 v3.0.0Unix

AUDIT AND ACCOUNTABILITY

5.2.3.19 Ensure kernel module loading unloading and modification is collectedCIS AlmaLinux OS 8 Server L2 v3.0.0Unix

AUDIT AND ACCOUNTABILITY

5.2.3.20 Ensure the audit configuration is immutableCIS AlmaLinux OS 8 Workstation L2 v3.0.0Unix

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY, MEDIA PROTECTION

5.2.3.21 Ensure the running and on disk configuration is the sameCIS AlmaLinux OS 8 Server L2 v3.0.0Unix

AUDIT AND ACCOUNTABILITY

5.2.4 Ensure users must provide password for escalationCIS AlmaLinux OS 9 v2.0.0 L2 WorkstationUnix

ACCESS CONTROL

5.2.4.1 Ensure the audit log directory is 0750 or more restrictiveCIS AlmaLinux OS 8 Workstation L2 v3.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

5.2.4.2 Ensure audit log files are mode 0640 or less permissiveCIS AlmaLinux OS 8 Workstation L2 v3.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

5.2.4.8 Ensure audit tools are 755 or more restrictiveCIS AlmaLinux OS 8 Server L2 v3.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

5.4 Ensure that new entries are appended to the end of the log fileCIS MongoDB 5 L2 OS Linux v1.2.0Unix

AUDIT AND ACCOUNTABILITY

6.2 Ensure that operating system resource limits are set for MongoDBCIS MongoDB 5 L2 OS Linux v1.2.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION

6.2 Ensure that operating system resource limits are set for MongoDBCIS MongoDB 5 L2 OS Windows v1.2.0Windows

SYSTEM AND COMMUNICATIONS PROTECTION

6.3 Ensure that server-side scripting is disabled if not neededCIS MongoDB 4 L2 OS Linux v1.0.0Unix

SYSTEM AND INFORMATION INTEGRITY

6.3.2.4 Ensure system warns when audit logs are low on spaceCIS AlmaLinux OS 9 v2.0.0 L2 ServerUnix

AUDIT AND ACCOUNTABILITY

6.3.3.3 Ensure events that modify the sudo log file are collectedCIS AlmaLinux OS 9 v2.0.0 L2 ServerUnix

AUDIT AND ACCOUNTABILITY

6.3.3.6 Ensure use of privileged commands are collectedCIS AlmaLinux OS 9 v2.0.0 L2 ServerUnix

AUDIT AND ACCOUNTABILITY

6.3.3.15 Ensure successful and unsuccessful attempts to use the chcon command are collectedCIS AlmaLinux OS 9 v2.0.0 L2 ServerUnix

AUDIT AND ACCOUNTABILITY

6.3.4.1 Ensure the audit log file directory mode is configuredCIS AlmaLinux OS 9 v2.0.0 L2 ServerUnix

ACCESS CONTROL, MEDIA PROTECTION

6.3.4.8 Ensure audit tools mode is configuredCIS AlmaLinux OS 9 v2.0.0 L2 ServerUnix

ACCESS CONTROL, MEDIA PROTECTION

ALMA-09-036430 - AlmaLinux OS 9 passwords for new users must have a minimum of 15 characters.DISA CloudLinux AlmaLinux OS 9 STIG v1r2Unix

IDENTIFICATION AND AUTHENTICATION