Item Search

NameAudit NamePluginCategory
2.2.9 Ensure 'SEC_CASE_SENSITIVE_LOGON' Is Set to 'TRUE'CIS Oracle Server 18c DB Traditional Auditing v1.1.0OracleDB

IDENTIFICATION AND AUTHENTICATION

2.2.9 Ensure 'SEC_CASE_SENSITIVE_LOGON' Is Set to 'TRUE'CIS Oracle Server 19c DB Traditional Auditing v1.2.0OracleDB

IDENTIFICATION AND AUTHENTICATION

2.2.11 Ensure 'SEC_CASE_SENSITIVE_LOGON' Is Set to 'TRUE'CIS Oracle Server 12c DB Unified Auditing v3.0.0OracleDB

IDENTIFICATION AND AUTHENTICATION

3.4 - Login and Password Parameters - Account inactivity timeNetApp Security Hardening Guide for ONTAP 9 v1.7.0Netapp_API
4.5 Ensure The Latest Version of The Password File Is UsedCIS Oracle Database 23ai v1.0.0 L1 RDBMSOracleDB

IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

5.1.1.3 Ensure 'EXECUTE' is revoked from 'PUBLIC' on 'Encryption' Packages - Encryption PackagesCIS Oracle Server 18c DB Unified Auditing v1.1.0OracleDB

ACCESS CONTROL

5.1.1.3 Ensure 'EXECUTE' is revoked from 'PUBLIC' on "Encryption" PackagesCIS Oracle Server 19c DB Unified Auditing v1.2.0OracleDB

ACCESS CONTROL, MEDIA PROTECTION

5.2.8 Ensure 'EXEMPT ACCESS POLICY' Is Revoked from Unauthorized 'GRANTEE'CIS Oracle Server 18c DB Traditional Auditing v1.1.0OracleDB

ACCESS CONTROL

5.2.12 Ensure 'CREATE ANY LIBRARY' Is Revoked from Unauthorized 'GRANTEE'CIS Oracle Server 12c DB Traditional Auditing v3.0.0OracleDB

ACCESS CONTROL

5.2.12 Ensure 'CREATE ANY LIBRARY' Is Revoked from Unauthorized 'GRANTEE'CIS Oracle Server 12c DB Unified Auditing v3.0.0OracleDB

ACCESS CONTROL

5.2.13 Ensure 'CREATE LIBRARY' Is Revoked from Unauthorized 'GRANTEE'CIS Oracle Server 12c DB Traditional Auditing v3.0.0OracleDB

ACCESS CONTROL

5.2.13 Ensure 'CREATE LIBRARY' Is Revoked from Unauthorized 'GRANTEE'CIS Oracle Server 18c DB Unified Auditing v1.1.0OracleDB

ACCESS CONTROL

6.2.19 Ensure the 'AUDSYS.AUD$UNIFIED' Access Audit Is EnabledCIS Oracle Server 12c DB Unified Auditing v3.0.0OracleDB

AUDIT AND ACCOUNTABILITY

6.11 Set Retry Limit for Account Lockout, Check if 'LOCK_AFTER_RETRIES' in /etc/default/login is set to YESCIS Solaris 10 L1 v5.2Unix

ACCESS CONTROL

6.15 Set Retry Limit for Account Lockout - LOCK_AFTER_RETRIES = yesCIS Solaris 11 L1 v1.1.0Unix

ACCESS CONTROL

6.15 Set Retry Limit for Account Lockout - RETRIES = 3CIS Solaris 11.1 L1 v1.0.0Unix

ACCESS CONTROL

6.21 Ensure that 'Wildfire Inline ML' on antivirus profiles are set to enable for all file typesCIS Palo Alto Firewall 11 v1.1.0 L1Palo_Alto

SYSTEM AND INFORMATION INTEGRITY

8.3.4 (L1) Ensure standard processes are used for VM deploymentCIS VMware ESXi 7.0 v1.5.0 L1VMware

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

9.4 Disable the HTTP Statistics ServerCIS BIND DNS v1.0.0 L1 Authoritative Name ServerUnix

SYSTEM AND INFORMATION INTEGRITY

17.2.5 Ensure 'Audit Other Account Management Events' is set to include 'Success' (STIG only)CIS Microsoft Windows Server 2019 STIG v3.0.0 STIG DCWindows

AUDIT AND ACCOUNTABILITY

18.9.5.3 (L1) Ensure 'Turn On Virtualization Based Security: Virtualization Based Protection of Code Integrity' is set to 'Enabled with UEFI lock'CIS Microsoft Windows 11 Stand-alone v4.0.0 L1Windows

SYSTEM AND INFORMATION INTEGRITY

18.9.5.3 (NG) Ensure 'Turn On Virtualization Based Security: Virtualization Based Protection of Code Integrity' is set to 'Enabled with UEFI lock'CIS Microsoft Windows 10 Enterprise v4.0.0 L1 NGWindows

SYSTEM AND INFORMATION INTEGRITY

18.9.5.3 (NG) Ensure 'Turn On Virtualization Based Security: Virtualization Based Protection of Code Integrity' is set to 'Enabled with UEFI lock'CIS Microsoft Windows Server 2016 v3.0.0 NG DCWindows

SYSTEM AND INFORMATION INTEGRITY

18.9.5.3 (NG) Ensure 'Turn On Virtualization Based Security: Virtualization Based Protection of Code Integrity' is set to 'Enabled with UEFI lock'CIS Microsoft Windows Server 2022 Stand-alone v1.0.0 NG MSWindows

SYSTEM AND INFORMATION INTEGRITY

18.9.5.3 (NG) Ensure 'Turn On Virtualization Based Security: Virtualization Based Protection of Code Integrity' is set to 'Enabled with UEFI lock'CIS Microsoft Windows 10 Stand-alone v4.0.0 L1 BL NGWindows

SYSTEM AND INFORMATION INTEGRITY

18.9.5.3 Ensure 'Turn On Virtualization Based Security: Virtualization Based Protection of Code Integrity' is set to 'Enabled with UEFI lock'CIS Microsoft Windows Server 2022 STIG v2.0.0 NG MSWindows

SYSTEM AND INFORMATION INTEGRITY

18.9.24.5 Ensure 'Default Protections for Recommended Software' is set to 'Enabled' - Acrobat.exeCIS Windows 7 Workstation Level 1 v3.2.0Windows

CONFIGURATION MANAGEMENT

18.9.25.5 (L1) Ensure 'Default Protections for Recommended Software' is set to 'Enabled'CIS Microsoft Windows Server 2008 R2 Member Server Level 1 v3.3.1Windows

SYSTEM AND INFORMATION INTEGRITY

18.10.24.5 (L1) Ensure 'Default Protections for Recommended Software' is set to 'Enabled'CIS Windows Server 2012 R2 MS L1 v3.0.0Windows

SYSTEM AND INFORMATION INTEGRITY

24.4 (L1) Ensure 'Require Platform Security Features' is set to 'Turns on VBS with Secure Boot' or higherCIS Microsoft Intune for Windows 11 v4.0.0 L1Windows

SYSTEM AND INFORMATION INTEGRITY

90.1 (L1) Ensure 'Hypervisor Enforced Code Integrity' is set to 'Enabled with UEFI lock'CIS Microsoft Intune for Windows 11 v4.0.0 L1Windows

SYSTEM AND INFORMATION INTEGRITY

ALMA-09-028510 - AlmaLinux OS 9 must disable remote management of the chrony daemon.DISA CloudLinux AlmaLinux OS 9 STIG v1r2Unix

CONFIGURATION MANAGEMENT

ALMA-09-028620 - AlmaLinux OS 9 must prevent the chrony daemon from acting as a server.DISA CloudLinux AlmaLinux OS 9 STIG v1r2Unix

CONFIGURATION MANAGEMENT

ALMA-09-038300 - Passwords for new users or password changes must have a 24-hour minimum password lifetime restriction in /etc/login.defs.DISA CloudLinux AlmaLinux OS 9 STIG v1r2Unix

IDENTIFICATION AND AUTHENTICATION

ALMA-09-057110 - AlmaLinux OS 9 audit system must protect auditing rules from unauthorized change.DISA CloudLinux AlmaLinux OS 9 STIG v1r2Unix

AUDIT AND ACCOUNTABILITY

CISC-L2-000120 - The Cisco switch must have Unknown Unicast Flood Blocking (UUFB) enabled.DISA STIG Cisco IOS Switch L2S v3r1Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

DG0192-ORACLE11 - Remote database or other external access should use fully-qualified names - 'global_names = true'DISA STIG Oracle 11 Instance v9r1 DatabaseOracleDB
DG7003-ORACLE11 - A minimum of two Oracle redo log groups/files must be defined and configured to be stored on separate, archived physical disks or archived directories on a RAID device.DISA STIG Oracle 11 Installation v9r1 DatabaseOracleDB

AUDIT AND ACCOUNTABILITY

DO0145-ORACLE11 - OS DBA group membership should be restricted to authorized accounts.DISA STIG Oracle 11 Installation v9r1 WindowsWindows

ACCESS CONTROL

DO0320-ORACLE11 - Application role permissions should not be assigned to the Oracle PUBLIC role - 'PUBLIC role has no granted roles'DISA STIG Oracle 11 Instance v9r1 DatabaseOracleDB

ACCESS CONTROL

O19C-00-020400 - Oracle Database must include only approved trust anchors in trust stores or certificate stores managed by the organization.DISA Oracle Database 19c STIG v1r1 WindowsWindows

SYSTEM AND COMMUNICATIONS PROTECTION

O112-BP-022800 - Application role permissions must not be assigned to the Oracle PUBLIC role.DISA STIG Oracle 11.2g v2r5 DatabaseOracleDB

CONFIGURATION MANAGEMENT

O112-C2-015300 - The DBMS, when utilizing PKI-based authentication, must validate certificates by constructing a certification path with status information to an accepted trust anchor.DISA STIG Oracle 11.2g v2r5 LinuxUnix

IDENTIFICATION AND AUTHENTICATION

O112-C2-015300 - The DBMS, when utilizing PKI-based authentication, must validate certificates by constructing a certification path with status information to an accepted trust anchor.DISA STIG Oracle 11.2g v2r5 WindowsWindows

IDENTIFICATION AND AUTHENTICATION

RHEL-09-211050 - The x86 Ctrl-Alt-Delete key sequence must be disabled on RHEL 9.DISA Red Hat Enterprise Linux 9 STIG v2r4Unix

ACCESS CONTROL

RHEL-09-271095 - RHEL 9 must disable the ability of a user to restart the system from the login screen.DISA Red Hat Enterprise Linux 9 STIG v2r4Unix

CONFIGURATION MANAGEMENT

WN10-CC-000260 - Windows 10 must be configured to require a minimum pin length of six characters or greater.DISA Microsoft Windows 10 STIG v3r4Windows

CONFIGURATION MANAGEMENT

WN11-00-000130 - Software certificate installation files must be removed from Windows 11.DISA Microsoft Windows 11 STIG v2r3Windows

CONFIGURATION MANAGEMENT

ZEBR-10-003500 - Zebra Android 10 must be configured to disable USB mass storage mode.AirWatch - DISA Zebra Android 10 COBO v1r2MDM

CONFIGURATION MANAGEMENT

ZEBR-10-003500 - Zebra Android 10 must be configured to disable USB mass storage mode.MobileIron - DISA Zebra Android 10 COPE v1r2MDM

CONFIGURATION MANAGEMENT