4.3.4.12 Ensure klogin daemon is not in use | CIS IBM AIX 7 v1.0.0 L1 | Unix | CONFIGURATION MANAGEMENT |
5.8 Ensure that 'Inline Cloud Analysis' on Wildfire profiles is enabled | CIS Palo Alto Firewall 10 v1.2.0 L1 | Palo_Alto | SYSTEM AND INFORMATION INTEGRITY |
5.8 Ensure that 'Inline Cloud Analysis' on Wildfire profiles is enabled | CIS Palo Alto Firewall 11 v1.1.0 L1 | Palo_Alto | SYSTEM AND INFORMATION INTEGRITY |
6.3.4 Ensure that all 'privileged' role assignments are periodically reviewed | CIS Microsoft Azure Foundations v4.0.0 L1 | microsoft_azure | ACCESS CONTROL, AUDIT AND ACCOUNTABILITY |
6.30 Ensure RDS Database is not publically accessible | CIS Amazon Web Services Three-tier Web Architecture L2 1.0.0 | amazon_aws | SYSTEM AND COMMUNICATIONS PROTECTION |
6.34 Ensure RDS Database is configured to use the Data Tier Security Group | CIS Amazon Web Services Three-tier Web Architecture L1 1.0.0 | amazon_aws | ACCESS CONTROL |
16. OpenStack Networking - Policy.json - 'get_subnetpool' | TNS OpenStack Neutron/Networking Security Guide | Unix | ACCESS CONTROL |
18.9.24.2 Ensure 'Default Action and Mitigation Settings' is set to 'Enabled' (plus subsettings) - BannedFunctions | CIS Microsoft Windows 8.1 v2.4.1 L1 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY |
20.24 Ensure 'Domain Controllers run on a machine dedicated to that function' (STIG DC only) | CIS Microsoft Windows Server 2022 STIG v2.0.0 STIG DC | Windows | CONFIGURATION MANAGEMENT |
20.24 Ensure 'Domain Controllers run on a machine dedicated to that function' (STIG DC only) | CIS Microsoft Windows Server 2019 STIG v3.0.0 STIG DC | Windows | CONFIGURATION MANAGEMENT |
33. OpenStack Networking - Policy.json - 'get_agent-loadbalancers' | TNS OpenStack Neutron/Networking Security Guide | Unix | ACCESS CONTROL |
34. OpenStack Networking - Policy.json - 'update_port:device_owner' | TNS OpenStack Neutron/Networking Security Guide | Unix | ACCESS CONTROL |
36. OpenStack Networking - Policy.json - 'context_is_admin' | TNS OpenStack Neutron/Networking Security Guide | Unix | ACCESS CONTROL |
40. OpenStack Networking - Policy.json - 'create_qos_queue' | TNS OpenStack Neutron/Networking Security Guide | Unix | ACCESS CONTROL |
49. OpenStack Networking - Policy.json - 'get_metering_label' | TNS OpenStack Neutron/Networking Security Guide | Unix | ACCESS CONTROL |
56. OpenStack Networking - Policy.json - 'create_port:mac_address' | TNS OpenStack Neutron/Networking Security Guide | Unix | ACCESS CONTROL |
67. OpenStack Networking - Policy.json - 'update_subnetpool' | TNS OpenStack Neutron/Networking Security Guide | Unix | ACCESS CONTROL |
69. OpenStack Networking - Policy.json - 'update_router:ha' | TNS OpenStack Neutron/Networking Security Guide | Unix | ACCESS CONTROL |
71. OpenStack Networking - Policy.json - 'get_network:router:external' | TNS OpenStack Neutron/Networking Security Guide | Unix | ACCESS CONTROL |
82. OpenStack Identity - Policy.json - 'identity:update_identity_provider' | TNS OpenStack Keystone/Identity Security Guide | Unix | ACCESS CONTROL |
83. OpenStack Identity - Policy.json - 'identity:delete_protocol' | TNS OpenStack Keystone/Identity Security Guide | Unix | ACCESS CONTROL |
84. OpenStack Identity - Policy.json - 'identity:validate_token' | TNS OpenStack Keystone/Identity Security Guide | Unix | ACCESS CONTROL |
85. OpenStack Networking - Policy.json - 'update_port:fixed_ips' | TNS OpenStack Neutron/Networking Security Guide | Unix | ACCESS CONTROL |
86. OpenStack Identity - Policy.json - 'identity:delete_project' | TNS OpenStack Keystone/Identity Security Guide | Unix | ACCESS CONTROL |
97. OpenStack Networking - Policy.json - 'remove_router_interface' | TNS OpenStack Neutron/Networking Security Guide | Unix | ACCESS CONTROL |
99. OpenStack Networking - Policy.json - 'shared' | TNS OpenStack Neutron/Networking Security Guide | Unix | ACCESS CONTROL |
102. OpenStack Networking - Policy.json - 'get_agent' | TNS OpenStack Neutron/Networking Security Guide | Unix | ACCESS CONTROL |
103. OpenStack Networking - Policy.json - 'shared_subnetpools' | TNS OpenStack Neutron/Networking Security Guide | Unix | ACCESS CONTROL |
104. OpenStack Networking - Policy.json - 'get_network:segments' | TNS OpenStack Neutron/Networking Security Guide | Unix | ACCESS CONTROL |
113. OpenStack Networking - Policy.json - 'update_firewall_rule' | TNS OpenStack Neutron/Networking Security Guide | Unix | ACCESS CONTROL |
119. OpenStack Networking - Policy.json - 'get_firewall' | TNS OpenStack Neutron/Networking Security Guide | Unix | ACCESS CONTROL |
120. OpenStack Networking - Policy.json - 'delete_port' | TNS OpenStack Neutron/Networking Security Guide | Unix | ACCESS CONTROL |
125. OpenStack Networking - Policy.json - 'get_firewall:shared' | TNS OpenStack Neutron/Networking Security Guide | Unix | ACCESS CONTROL |
126. OpenStack Networking - Policy.json - 'update_network:provider:segmentation_id' | TNS OpenStack Neutron/Networking Security Guide | Unix | ACCESS CONTROL |
DTAM132 - McAfee VirusScan Buffer Overflow Protection Buffer Overflow Settings must be configured to display a dialog box when a buffer overflow is detected. | DISA McAfee VirusScan 8.8 Local Client STIG v6r1 | Windows | SYSTEM AND INFORMATION INTEGRITY |
DTAM132 - McAfee VirusScan Buffer Overflow Protection Policies must be configured to display a dialog box when a buffer overflow is detected. | DISA McAfee VirusScan 8.8 Managed Client STIG v6r1 | Windows | SYSTEM AND INFORMATION INTEGRITY |
DTAM137 - McAfee VirusScan On-Access General Policies Artemis sensitivity level must be configured to medium or higher - ArtemisEnabled | DISA McAfee VirusScan 8.8 Managed Client STIG v6r1 | Windows | SYSTEM AND INFORMATION INTEGRITY |
DTAM137 - McAfee VirusScan On-Access General Policies Artemis sensitivity level must be configured to medium or higher - ArtemisLevel | DISA McAfee VirusScan 8.8 Managed Client STIG v6r1 | Windows | SYSTEM AND INFORMATION INTEGRITY |
DTAM157 - McAfee VirusScan On-Delivery Email Scan Policies Artemis sensitivity level must be configured to medium or higher - enabled | DISA McAfee VirusScan 8.8 Managed Client STIG v6r1 | Windows | CONFIGURATION MANAGEMENT |
DTAM157 - McAfee VirusScan On-Delivery Email Scan Policies Artemis sensitivity level must be configured to medium or higher. | DISA McAfee VirusScan 8.8 Managed Client STIG v6r1 | Windows | CONFIGURATION MANAGEMENT |
DTAM157 - McAfee VirusScan On-Delivery Email Scanner Artemis sensitivity level must be configured to Medium or higher. | DISA McAfee VirusScan 8.8 Local Client STIG v6r1 | Windows | CONFIGURATION MANAGEMENT |
DTAM157 - McAfee VirusScan On-Delivery Email Scanner Artemis sensitivity level must be configured to Medium or higher. - enabled | DISA McAfee VirusScan 8.8 Local Client STIG v6r1 | Windows | CONFIGURATION MANAGEMENT |
EX13-MB-003030 - The applications built-in Malware Agent must be disabled. | DISA Microsoft Exchange 2013 Mailbox Server STIG v2r3 | Windows | SYSTEM AND INFORMATION INTEGRITY |
EX16-ED-002410 - The application must update malicious code protection mechanisms whenever new releases are available in accordance with organizational configuration management policy and procedures. | DISA Microsoft Exchange 2016 Edge Transport Server STIG v2r5 | Windows | SYSTEM AND INFORMATION INTEGRITY |
EX16-ED-002410 - The application must update malicious code protection mechanisms whenever new releases are available in accordance with organizational configuration management policy and procedures. | DISA Microsoft Exchange 2016 Edge Transport Server STIG v2r6 | Windows | SYSTEM AND INFORMATION INTEGRITY |
F5BI-LT-000219 - The BIG-IP Core implementation must be configured to protect against known types of Denial of Service (DoS) attacks by employing signatures when providing content filtering to virtual servers. | DISA F5 BIG-IP Local Traffic Manager STIG v2r4 | F5 | SYSTEM AND COMMUNICATIONS PROTECTION |
Huawei: HTTPS Server is configured | TNS Huawei VRP Best Practice Audit | Huawei | CONFIGURATION MANAGEMENT |
Huawei: HTTPS Server is not configured | TNS Huawei VRP Best Practice Audit | Huawei | CONFIGURATION MANAGEMENT |
Huawei: Review Device Info/Version | TNS Huawei VRP Best Practice Audit | Huawei | CONFIGURATION MANAGEMENT |
JUSX-IP-000004 - The Juniper Networks SRX Series Gateway IDPS must provide audit record generation with a configurable severity and escalation level capability. | DISA Juniper SRX Services Gateway IDPS v2r1 | Juniper | AUDIT AND ACCOUNTABILITY |