Item Search

NameAudit NamePluginCategory
2.4 Ensure an industry standard authentication mechanism is used - authenticationMechanismsCIS MongoDB 3.4 L2 Unix Audit v1.0.0Unix

CONFIGURATION MANAGEMENT

3.2 Ensure that MongoDB only listens for network connections on authorized interfacesCIS MongoDB 3.6 L1 Unix Audit v1.1.0Unix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

3.3 Ensure that MongoDB is run using a Least Privileges, dedicated service accountCIS MongoDB 3.6 L1 Unix Audit v1.1.0Unix

ACCESS CONTROL

3.5 Review User-Defined RolesCIS MongoDB 3.2 Database Audit L2 v1.0.0MongoDB

ACCESS CONTROL

3.5 Review User-Defined RolesCIS MongoDB 3.4 Database Audit L2 v1.0.0MongoDB

ACCESS CONTROL

3.6 Review Superuser/Admin Roles - readWriteAnyDatabaseCIS MongoDB 3.4 Database Audit L2 v1.0.0MongoDB

ACCESS CONTROL

3.6 Review Superuser/Admin Roles - readWriteAnyDatabaseCIS MongoDB 3.6 Database Audit L1 v1.1.0MongoDB

ACCESS CONTROL

3.6 Review Superuser/Admin Roles - userAdminCIS MongoDB 3.4 Database Audit L2 v1.0.0MongoDB

ACCESS CONTROL

5.2.4.1 Ensure the audit log directory is 0750 or more restrictiveCIS CentOS Linux 7 v4.0.0 L2 ServerUnix

ACCESS CONTROL, MEDIA PROTECTION

5.2.4.1 Ensure the audit log directory is 0750 or more restrictiveCIS Amazon Linux 2 v3.0.0 L2Unix

ACCESS CONTROL, MEDIA PROTECTION

5.2.4.1 Ensure the audit log directory is 0750 or more restrictiveCIS AlmaLinux OS 8 Workstation L2 v3.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

5.2.4.1 Ensure the audit log directory is 0750 or more restrictiveCIS Red Hat EL8 Server L2 v3.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

5.2.4.1 Ensure the audit log directory is 0750 or more restrictiveCIS Rocky Linux 8 Workstation L2 v2.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

5.2.4.4 Ensure the audit log directory is 0750 or more restrictiveCIS Ubuntu Linux 18.04 LTS v2.2.0 L2 ServerUnix

ACCESS CONTROL, MEDIA PROTECTION

5.2.4.11 Ensure cryptographic mechanisms are used to protect the integrity of audit toolsCIS Ubuntu Linux 18.04 LTS v2.2.0 L1 ServerUnix

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

5.3 Ensure that logging captures as much information as possibleCIS MongoDB 3.2 L2 Unix Audit v1.0.0Unix

AUDIT AND ACCOUNTABILITY

5.3 Ensure that logging captures as much information as possibleCIS MongoDB 3.4 L2 Unix Audit v1.0.0Unix

AUDIT AND ACCOUNTABILITY

5.3.3 Ensure cryptographic mechanisms are used to protect the integrity of audit toolsCIS Oracle Linux 8 Workstation L1 v3.0.0Unix

SYSTEM AND INFORMATION INTEGRITY

5.3.3 Ensure cryptographic mechanisms are used to protect the integrity of audit toolsCIS Red Hat EL8 Server L1 v3.0.0Unix

SYSTEM AND INFORMATION INTEGRITY

5.3.3 Ensure cryptographic mechanisms are used to protect the integrity of audit toolsCIS Rocky Linux 8 Server L1 v2.0.0Unix

SYSTEM AND INFORMATION INTEGRITY

5.4 Ensure that new entries are appended to the end of the log fileCIS MongoDB 3.2 L2 Unix Audit v1.0.0Unix

AUDIT AND ACCOUNTABILITY

5.4 Ensure that new entries are appended to the end of the log fileCIS MongoDB 3.4 L2 Unix Audit v1.0.0Unix

AUDIT AND ACCOUNTABILITY

6.1.3 Ensure cryptographic mechanisms are used to protect the integrity of audit toolsCIS Debian Linux 11 v2.0.0 L2 WorkstationUnix

SYSTEM AND INFORMATION INTEGRITY

6.1.3 Ensure cryptographic mechanisms are used to protect the integrity of audit toolsCIS Rocky Linux 9 v2.0.0 L1 ServerUnix

SYSTEM AND INFORMATION INTEGRITY

6.1.3 Ensure cryptographic mechanisms are used to protect the integrity of audit toolsCIS AlmaLinux OS 9 v2.0.0 L1 ServerUnix

SYSTEM AND INFORMATION INTEGRITY

6.1.3 Ensure cryptographic mechanisms are used to protect the integrity of audit toolsCIS Oracle Linux 9 v2.0.0 L1 WorkstationUnix

SYSTEM AND INFORMATION INTEGRITY

6.2.4.4 Ensure the audit log file directory mode is configuredCIS Ubuntu Linux 24.04 LTS v1.0.0 L2 WorkstationUnix

ACCESS CONTROL, MEDIA PROTECTION

6.4.4.4 Ensure the audit log file directory mode is configuredCIS Debian Linux 11 v2.0.0 L2 WorkstationUnix

ACCESS CONTROL, MEDIA PROTECTION

7.2 Ensure that database file permissions are set correctlyCIS MongoDB 3.2 L1 Unix Audit v1.0.0Unix

CONFIGURATION MANAGEMENT

17.2.3 (L1) Ensure 'Audit User Account Management' is set to 'Success and Failure'CIS Microsoft Windows 8.1 v2.4.1 L1 BitlockerWindows

AUDIT AND ACCOUNTABILITY, IDENTIFICATION AND AUTHENTICATION

17.5.1 (L1) Ensure 'Audit Account Lockout' is set to include 'Failure'CIS Microsoft Windows 8.1 v2.4.1 L1 BitlockerWindows

AUDIT AND ACCOUNTABILITY, IDENTIFICATION AND AUTHENTICATION

17.5.4 (L1) Ensure 'Audit Other Logon/Logoff Events' is set to 'Success and Failure'CIS Microsoft Windows 8.1 v2.4.1 L1 BitlockerWindows

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY, IDENTIFICATION AND AUTHENTICATION

17.7.5 (L1) Ensure 'Audit Other Policy Change Events' is set to include 'Failure'CIS Microsoft Windows 8.1 v2.4.1 L1 BitlockerWindows

AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT

17.9.5 (L1) Ensure 'Audit System Integrity' is set to 'Success and Failure'CIS Microsoft Windows 8.1 v2.4.1 L1 BitlockerWindows

AUDIT AND ACCOUNTABILITY

PPS9-00-000900 - The EDB Postgres Advanced Server must protect against a user falsely repudiating having performed organization-defined actions.EDB PostgreSQL Advanced Server DB Audit v2r3PostgreSQLDB

AUDIT AND ACCOUNTABILITY

PPS9-00-001900 - The EDB Postgres Advanced Server must produce audit records containing sufficient information to establish the sources (origins) of the events - origins of the events.EDB PostgreSQL Advanced Server DB Audit v2r3PostgreSQLDB

AUDIT AND ACCOUNTABILITY

PPS9-00-004100 - The EDB Postgres Advanced Server must be configured to prohibit or restrict the use of organization-defined functions, ports, protocols, and/or services, as defined in the PPSM CAL and vulnerability assessments.EDB PostgreSQL Advanced Server DB Audit v2r3PostgreSQLDB

CONFIGURATION MANAGEMENT

PPS9-00-004820 - When using command-line tools such as psql, users must use a logon method that does not expose the password.EDB PostgreSQL Advanced Server DB Audit v2r3PostgreSQLDB

IDENTIFICATION AND AUTHENTICATION

PPS9-00-005800 - The EDB Postgres Advanced Server must isolate security functions from non-security functions.EDB PostgreSQL Advanced Server DB Audit v2r3PostgreSQLDB

SYSTEM AND COMMUNICATIONS PROTECTION

PPS9-00-005900 - Database contents must be protected from unauthorized and unintended information transfer by enforcement of a data-transfer policy.EDB PostgreSQL Advanced Server DB Audit v2r3PostgreSQLDB

SYSTEM AND COMMUNICATIONS PROTECTION

PPS9-00-006200 - The EDB Postgres Advanced Server must check the validity of all data inputs except those specifically identified by the organization.EDB PostgreSQL Advanced Server DB Audit v2r3PostgreSQLDB

SYSTEM AND INFORMATION INTEGRITY

PPS9-00-006600 - The EDB Postgres Advanced Server must reveal detailed error messages only to the ISSO, ISSM, SA and DBA.EDB PostgreSQL Advanced Server DB Audit v2r3PostgreSQLDB

SYSTEM AND INFORMATION INTEGRITY

PPS9-00-007000 - The EDB Postgres Advanced Server must associate organization-defined types of security labels having organization-defined security label values with information in process.EDB PostgreSQL Advanced Server DB Audit v2r3PostgreSQLDB

ACCESS CONTROL

PPS9-00-008600 - The EDB Postgres Advanced Server must produce audit records of its enforcement of access restrictions associated with changes to the configuration of the EDB Postgres Advanced Server or database(s).EDB PostgreSQL Advanced Server DB Audit v2r3PostgreSQLDB

CONFIGURATION MANAGEMENT

PPS9-00-011200 - The EDB Postgres Advanced Server must generate audit records when privileges/permissions are deleted.EDB PostgreSQL Advanced Server DB Audit v2r3PostgreSQLDB

AUDIT AND ACCOUNTABILITY

PPS9-00-011700 - Audit records must be generated when unsuccessful attempts to delete categorized information (e.g., classification levels/security levels) occur.EDB PostgreSQL Advanced Server DB Audit v2r3PostgreSQLDB

AUDIT AND ACCOUNTABILITY

SQL2-00-018500 - SQL Server must ensure users are authenticated with an individual authenticator prior to using a shared authenticator.DISA STIG SQL Server 2012 DB Instance Security v1r20MS_SQLDB

IDENTIFICATION AND AUTHENTICATION

UBTU-18-010305 - The Ubuntu operating system must be configured so that audit log files cannot be read or write-accessible by unauthorized users.DISA STIG Ubuntu 18.04 LTS v2r15Unix

AUDIT AND ACCOUNTABILITY

UBTU-18-010307 - The Ubuntu operating system must permit only authorized groups to own the audit log files.DISA STIG Ubuntu 18.04 LTS v2r15Unix

AUDIT AND ACCOUNTABILITY

WN11-AU-000510 - The System event log size must be configured to 32768 KB or greater.DISA Microsoft Windows 11 STIG v2r3Windows

AUDIT AND ACCOUNTABILITY