Item Search

NameAudit NamePluginCategory
1.1 Maintain current contact detailsCIS Amazon Web Services Foundations v5.0.0 L1amazon_aws

INCIDENT RESPONSE

1.3 Ensure no 'root' user account access key existsCIS Amazon Web Services Foundations v5.0.0 L1amazon_aws

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

1.3 Set 'Access to published calendars' to 'Enabled'CIS MS Office Outlook 2010 v1.0.0Windows

ACCESS CONTROL

1.4 Ensure MFA is enabled for the 'root' user accountCIS Amazon Web Services Foundations v5.0.0 L1amazon_aws

IDENTIFICATION AND AUTHENTICATION

1.6 Eliminate use of the 'root' user for administrative and daily tasksCIS Amazon Web Services Foundations v5.0.0 L1amazon_aws

ACCESS CONTROL

1.9 Ensure multi-factor authentication (MFA) is enabled for all IAM users that have a console passwordCIS Amazon Web Services Foundations v5.0.0 L1amazon_aws

IDENTIFICATION AND AUTHENTICATION

1.9.8.1.2.1 Ensure 'Access to published calendars' is set to EnabledCIS Microsoft Office Outlook 2016 v1.1.0 Level 1Windows

ACCESS CONTROL

1.11 Ensure credentials unused for 45 days or more are disabledCIS Amazon Web Services Foundations v5.0.0 L1amazon_aws

ACCESS CONTROL

1.12 Ensure there is only one active access key for any single IAM userCIS Amazon Web Services Foundations v5.0.0 L1amazon_aws

ACCESS CONTROL

1.19 Ensure that IAM External Access Analyzer is enabled for all regionsCIS Amazon Web Services Foundations v5.0.0 L1amazon_aws

ACCESS CONTROL, MEDIA PROTECTION

2.1.4 Ensure that S3 is configured with 'Block Public Access' enabledCIS Amazon Web Services Foundations v5.0.0 L1amazon_aws

ACCESS CONTROL, MEDIA PROTECTION

2.3.1 Ensure that encryption is enabled for EFS file systemsCIS Amazon Web Services Foundations v5.0.0 L1amazon_aws

IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

2.6 Turn off TRACECIS Apache Tomcat 10 L1 v1.1.0Unix

AUDIT AND ACCOUNTABILITY

3.1 Ensure CloudTrail is enabled in all regionsCIS Amazon Web Services Foundations v5.0.0 L1amazon_aws

AUDIT AND ACCOUNTABILITY

3.3 Ensure AWS Config is enabled in all regionsCIS Amazon Web Services Foundations v5.0.0 L2amazon_aws

CONFIGURATION MANAGEMENT, PROGRAM MANAGEMENT

3.6 Ensure that SharePoint is configured with 'Strict' browser file handling settingsCIS Microsoft SharePoint 2016 OS v1.1.0Windows

CONFIGURATION MANAGEMENT

3.7 Ensure VPC flow logging is enabled in all VPCsCIS Amazon Web Services Foundations v5.0.0 L2amazon_aws

AUDIT AND ACCOUNTABILITY, SYSTEM AND INFORMATION INTEGRITY

3.9 Ensure that object-level logging for read events is enabled for S3 bucketsCIS Amazon Web Services Foundations v5.0.0 L2amazon_aws

AUDIT AND ACCOUNTABILITY

4.1 Ensure unauthorized API calls are monitoredCIS Amazon Web Services Foundations v5.0.0 L2amazon_aws

AUDIT AND ACCOUNTABILITY

4.1.5 Disable weak ciphersCIS NGINX Benchmark v2.1.0 L1 LoadbalancerUnix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

4.2 Ensure management console sign-in without MFA is monitoredCIS Amazon Web Services Foundations v5.0.0 L1amazon_aws

AUDIT AND ACCOUNTABILITY

4.3 Ensure usage of the 'root' account is monitoredCIS Amazon Web Services Foundations v5.0.0 L1amazon_aws

AUDIT AND ACCOUNTABILITY

4.8 Ensure S3 bucket policy changes are monitoredCIS Amazon Web Services Foundations v5.0.0 L1amazon_aws

AUDIT AND ACCOUNTABILITY

4.10 Ensure security group changes are monitoredCIS Amazon Web Services Foundations v5.0.0 L2amazon_aws

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY, MEDIA PROTECTION

4.12 Ensure changes to network gateways are monitoredCIS Amazon Web Services Foundations v5.0.0 L1amazon_aws

AUDIT AND ACCOUNTABILITY

4.15 Ensure AWS Organizations changes are monitoredCIS Amazon Web Services Foundations v5.0.0 L1amazon_aws

AUDIT AND ACCOUNTABILITY

4.16 Ensure AWS Security Hub is enabledCIS Amazon Web Services Foundations v5.0.0 L2amazon_aws

RISK ASSESSMENT

5.1.1 Ensure EBS volume encryption is enabled in all regionsCIS Amazon Web Services Foundations v5.0.0 L1amazon_aws

IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

5.2 Ensure no Network ACLs allow ingress from 0.0.0.0/0 to remote server administration portsCIS Amazon Web Services Foundations v5.0.0 L1amazon_aws

CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

5.5 Ensure the default security group of every VPC restricts all trafficCIS Amazon Web Services Foundations v5.0.0 L2amazon_aws

ACCESS CONTROL, MEDIA PROTECTION, SYSTEM AND COMMUNICATIONS PROTECTION

7.2 Set Strong Password Creation PoliciesCIS Oracle Solaris 11.4 L1 v1.1.0Unix

IDENTIFICATION AND AUTHENTICATION

7.2 Set Strong Password Creation Policies - PASSLENGTH = 8CIS Solaris 11.2 L1 v1.1.0Unix

IDENTIFICATION AND AUTHENTICATION

7.2 Set Strong Password Creation Policies - HISTORY = 10CIS Solaris 11.1 L1 v1.0.0Unix

IDENTIFICATION AND AUTHENTICATION

7.2 Set Strong Password Creation Policies - MINLOWER = 1CIS Solaris 11.2 L1 v1.1.0Unix

IDENTIFICATION AND AUTHENTICATION

7.2 Set Strong Password Creation Policies - MINNONALPHA = 1CIS Solaris 11 L1 v1.1.0Unix

IDENTIFICATION AND AUTHENTICATION

7.2 Set Strong Password Creation Policies - MINUPPER = 1CIS Solaris 11.1 L1 v1.0.0Unix

IDENTIFICATION AND AUTHENTICATION

7.2 Set Strong Password Creation Policies - MINUPPER = 1CIS Solaris 11.2 L1 v1.1.0Unix

IDENTIFICATION AND AUTHENTICATION

7.2 Set Strong Password Creation Policies - NAMECHECK = yesCIS Solaris 11 L1 v1.1.0Unix

IDENTIFICATION AND AUTHENTICATION

AS24-U1-000650 - The Apache web server must set an inactive timeout for sessions - reqtimeout_moduleDISA STIG Apache Server 2.4 Unix Server v3r2 MiddlewareUnix

ACCESS CONTROL

AS24-W1-000380 - The Apache web server must perform RFC 5280-compliant certification path validation.DISA STIG Apache Server 2.4 Windows Server v3r3Windows

IDENTIFICATION AND AUTHENTICATION

Directory access permissions should be restricted.TNS IBM HTTP Server Best PracticeUnix

CONFIGURATION MANAGEMENT

Directory access permissions should be restricted.TNS IBM HTTP Server Best Practice MiddlewareUnix

CONFIGURATION MANAGEMENT

DISA_STIG_Kubernetes_v2r3.audit from DISA Kubernetes v2r3 STIGDISA STIG Kubernetes v2r3Unix
ESXI-06-000001 - The VMM must limit the number of concurrent sessions to ten for all accounts and/or account types by enabling lockdown mode.DISA STIG VMware vSphere 6.x ESXi v1r5VMware

ACCESS CONTROL

ESXI-06-100001 - The system must enable lockdown mode to restrict remote access.DISA STIG VMware vSphere 6.x ESXi v1r5VMware

CONFIGURATION MANAGEMENT

Load pictures from Web pages not created in ExcelMSCT Office 2016 v1.0.0Windows

SYSTEM AND COMMUNICATIONS PROTECTION

VCENTER-000029 - vSphere Client plugins must be verified.DISA STIG VMWare ESXi vCenter 5 STIG v2r1VMware

CONFIGURATION MANAGEMENT

VCLD-67-000002 - VAMI must be configured with FIPS 140-2 compliant ciphers for HTTPS connections.DISA STIG VMware vSphere 6.7 VAMI-lighttpd v1r3Unix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

VCPF-67-000026 - Performance Charts must properly configure log sizes and rotation - MaxFileSizeDISA STIG VMware vSphere 6.7 Perfcharts Tomcat v1r3Unix

AUDIT AND ACCOUNTABILITY

WBLC-02-000073 - Oracle WebLogic must produce process events and severity levels to establish what type of HTTPD-related events and severity levels occurred.Oracle WebLogic Server 12c Linux v2r2 MiddlewareUnix

AUDIT AND ACCOUNTABILITY