Item Search

NameAudit NamePluginCategory
1.3 Set 'Access to published calendars' to 'Enabled'CIS MS Office Outlook 2010 v1.0.0Windows

ACCESS CONTROL

1.9 Ensure multi-factor authentication (MFA) is enabled for all IAM users that have a console passwordCIS Amazon Web Services Foundations v5.0.0 L1amazon_aws

IDENTIFICATION AND AUTHENTICATION

1.9.8.1.2.1 Ensure 'Access to published calendars' is set to EnabledCIS Microsoft Office Outlook 2016 v1.1.0 Level 1Windows

ACCESS CONTROL

1.9.8.1.2.1 Ensure 'Access to published calendars' is set to EnabledCIS Microsoft Office Outlook 2013 v1.1.0 Level 1Windows

ACCESS CONTROL

1.10 Do not create access keys during initial setup for IAM users with a console passwordCIS Amazon Web Services Foundations v5.0.0 L1amazon_aws

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

1.12 Ensure there is only one active access key for any single IAM userCIS Amazon Web Services Foundations v5.0.0 L1amazon_aws

ACCESS CONTROL

1.14 Ensure IAM users receive permissions only through groupsCIS Amazon Web Services Foundations v5.0.0 L1amazon_aws

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

1.15 Ensure IAM policies that allow full "*:*" administrative privileges are not attachedCIS Amazon Web Services Foundations v5.0.0 L1amazon_aws

ACCESS CONTROL

1.17 Ensure IAM instance roles are used for AWS resource access from instancesCIS Amazon Web Services Foundations v5.0.0 L2amazon_aws

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

1.18 Ensure that all expired SSL/TLS certificates stored in AWS IAM are removedCIS Amazon Web Services Foundations v5.0.0 L1amazon_aws

AUDIT AND ACCOUNTABILITY, SYSTEM AND INFORMATION INTEGRITY

1.19 Ensure that IAM External Access Analyzer is enabled for all regionsCIS Amazon Web Services Foundations v5.0.0 L1amazon_aws

ACCESS CONTROL, MEDIA PROTECTION

1.20 Ensure IAM users are managed centrally via identity federation or AWS Organizations for multi-account environmentsCIS Amazon Web Services Foundations v5.0.0 L2amazon_aws

ACCESS CONTROL

1.21 Ensure access to AWSCloudShellFullAccess is restrictedCIS Amazon Web Services Foundations v5.0.0 L1amazon_aws

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

2.1.4 Ensure that S3 is configured with 'Block Public Access' enabledCIS Amazon Web Services Foundations v5.0.0 L1amazon_aws

ACCESS CONTROL, MEDIA PROTECTION

2.2.3 Ensure that RDS instances are not publicly accessibleCIS Amazon Web Services Foundations v5.0.0 L1amazon_aws

ACCESS CONTROL, MEDIA PROTECTION

2.3.1 Ensure that encryption is enabled for EFS file systemsCIS Amazon Web Services Foundations v5.0.0 L1amazon_aws

IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

3.1 Ensure CloudTrail is enabled in all regionsCIS Amazon Web Services Foundations v5.0.0 L1amazon_aws

AUDIT AND ACCOUNTABILITY

3.3 Ensure AWS Config is enabled in all regionsCIS Amazon Web Services Foundations v5.0.0 L2amazon_aws

CONFIGURATION MANAGEMENT, PROGRAM MANAGEMENT

3.6 Ensure that SharePoint is configured with 'Strict' browser file handling settingsCIS Microsoft SharePoint 2016 OS v1.1.0Windows

CONFIGURATION MANAGEMENT

3.9 Ensure that object-level logging for read events is enabled for S3 bucketsCIS Amazon Web Services Foundations v5.0.0 L2amazon_aws

AUDIT AND ACCOUNTABILITY

4.3 Ensure usage of the 'root' account is monitoredCIS Amazon Web Services Foundations v5.0.0 L1amazon_aws

AUDIT AND ACCOUNTABILITY

4.5 Ensure CloudTrail configuration changes are monitoredCIS Amazon Web Services Foundations v5.0.0 L1amazon_aws

AUDIT AND ACCOUNTABILITY

4.7 Ensure disabling or scheduled deletion of customer created CMKs is monitoredCIS Amazon Web Services Foundations v5.0.0 L2amazon_aws

AUDIT AND ACCOUNTABILITY

4.8 Ensure S3 bucket policy changes are monitoredCIS Amazon Web Services Foundations v5.0.0 L1amazon_aws

AUDIT AND ACCOUNTABILITY

4.14 Ensure VPC changes are monitoredCIS Amazon Web Services Foundations v5.0.0 L1amazon_aws

AUDIT AND ACCOUNTABILITY

5.1.1 Ensure EBS volume encryption is enabled in all regionsCIS Amazon Web Services Foundations v5.0.0 L1amazon_aws

IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

5.1.2 Ensure CIFS access is restricted to trusted networks to prevent unauthorized accessCIS Amazon Web Services Foundations v5.0.0 L1amazon_aws

SYSTEM AND COMMUNICATIONS PROTECTION

5.4 Ensure no security groups allow ingress from ::/0 to remote server administration portsCIS Amazon Web Services Foundations v5.0.0 L1amazon_aws

SYSTEM AND COMMUNICATIONS PROTECTION

5.6 Ensure routing tables for VPC peering are "least access"CIS Amazon Web Services Foundations v5.0.0 L2amazon_aws

SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION

7.2 Set Strong Password Creation PoliciesCIS Oracle Solaris 11.4 L1 v1.1.0Unix

IDENTIFICATION AND AUTHENTICATION

7.2 Set Strong Password Creation Policies - PASSLENGTH = 8CIS Solaris 11.2 L1 v1.1.0Unix

IDENTIFICATION AND AUTHENTICATION

7.2 Set Strong Password Creation Policies - HISTORY = 10CIS Solaris 11.1 L1 v1.0.0Unix

IDENTIFICATION AND AUTHENTICATION

7.2 Set Strong Password Creation Policies - MINLOWER = 1CIS Solaris 11.2 L1 v1.1.0Unix

IDENTIFICATION AND AUTHENTICATION

7.2 Set Strong Password Creation Policies - MINNONALPHA = 1CIS Solaris 11 L1 v1.1.0Unix

IDENTIFICATION AND AUTHENTICATION

7.2 Set Strong Password Creation Policies - MINUPPER = 1CIS Solaris 11.1 L1 v1.0.0Unix

IDENTIFICATION AND AUTHENTICATION

7.2 Set Strong Password Creation Policies - MINUPPER = 1CIS Solaris 11.2 L1 v1.1.0Unix

IDENTIFICATION AND AUTHENTICATION

7.2 Set Strong Password Creation Policies - NAMECHECK = yesCIS Solaris 11 L1 v1.1.0Unix

IDENTIFICATION AND AUTHENTICATION

10.4 Ensure the LimitRequestBody Directive is Set to 102400 or LessCIS Apache HTTP Server 2.2 L2 v3.6.0Unix

CONFIGURATION MANAGEMENT

AS24-U1-000460 - The Apache web server must invalidate session identifiers upon hosted application user logout or other session termination.DISA STIG Apache Server 2.4 Unix Server v3r2 MiddlewareUnix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

AS24-U1-000460 - The Apache web server must invalidate session identifiers upon hosted application user logout or other session termination.DISA STIG Apache Server 2.4 Unix Server v3r2Unix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

AS24-U1-000650 - The Apache web server must set an inactive timeout for sessions - reqtimeout_moduleDISA STIG Apache Server 2.4 Unix Server v3r2 MiddlewareUnix

ACCESS CONTROL

DISA_STIG_Kubernetes_v2r3.audit from DISA Kubernetes v2r3 STIGDISA STIG Kubernetes v2r3Unix
VCLD-67-000002 - VAMI must be configured with FIPS 140-2 compliant ciphers for HTTPS connections.DISA STIG VMware vSphere 6.7 VAMI-lighttpd v1r3Unix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

VCLD-70-000002 - VAMI must be configured with FIPS 140-2 compliant ciphers for HTTPS connections.DISA STIG VMware vSphere 7.0 VAMI v1r2Unix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

VCLU-70-000024 - Lookup Service must be configured to show error pages with minimal information.DISA STIG VMware vSphere 7.0 Lookup Service v1r2Unix

SYSTEM AND INFORMATION INTEGRITY

VCPF-67-000026 - Performance Charts must properly configure log sizes and rotation - MaxFileSizeDISA STIG VMware vSphere 6.7 Perfcharts Tomcat v1r3Unix

AUDIT AND ACCOUNTABILITY

VCPF-70-000024 - Performance Charts must be configured to show error pages with minimal information.DISA STIG VMware vSphere 7.0 Perfcharts Tomcat v1r1Unix

SYSTEM AND INFORMATION INTEGRITY

VCPF-70-000025 - Performance Charts must be configured to not show error reports.DISA STIG VMware vSphere 7.0 Perfcharts Tomcat v1r1Unix

SYSTEM AND INFORMATION INTEGRITY

WBLC-01-000010 - Oracle WebLogic must use cryptography to protect the integrity of the remote access session - SSL Listen PortOracle WebLogic Server 12c Windows v2r2Windows

ACCESS CONTROL

WBLC-01-000010 - Oracle WebLogic must use cryptography to protect the integrity of the remote access session - Unsecure Listen PortOracle WebLogic Server 12c Windows v2r2Windows

ACCESS CONTROL