Item Search

NameAudit NamePluginCategory
1.1 Ensure the appropriate MongoDB software version/patches are installedCIS MongoDB 3.6 Database Audit L1 v1.1.0MongoDB

SYSTEM AND SERVICES ACQUISITION

2.1 Ensure that authentication is enabled for MongoDB databasesCIS MongoDB 3.4 L1 Unix Audit v1.0.0Unix

IDENTIFICATION AND AUTHENTICATION

2.2 Ensure that MongoDB does not bypass authentication via the localhost exceptionCIS MongoDB 3.4 L1 Unix Audit v1.0.0Unix

CONFIGURATION MANAGEMENT

2.3 Ensure authentication is enabled in the sharded clusterCIS MongoDB 3.4 L1 Unix Audit v1.0.0Unix

IDENTIFICATION AND AUTHENTICATION

3.6 Review Superuser/Admin Roles - dbAdminAnyDatabaseCIS MongoDB 3.4 Database Audit L2 v1.0.0MongoDB

ACCESS CONTROL

3.6 Review Superuser/Admin Roles - dbOwnerCIS MongoDB 3.4 Database Audit L2 v1.0.0MongoDB

ACCESS CONTROL

3.6 Review Superuser/Admin Roles - hostManagerCIS MongoDB 3.4 Database Audit L2 v1.0.0MongoDB

ACCESS CONTROL

3.6 Review Superuser/Admin Roles - hostManagerCIS MongoDB 3.6 Database Audit L1 v1.1.0MongoDB

ACCESS CONTROL

4.1 Ensure TLS or SSL protects all network communicationsCIS MongoDB 3.4 L1 Unix Audit v1.0.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION

5.1 Ensure that system activity is auditedCIS MongoDB 3.6 L1 Unix Audit v1.1.0Unix

AUDIT AND ACCOUNTABILITY

5.2.4.1 Ensure the audit log directory is 0750 or more restrictiveCIS CentOS Linux 7 v4.0.0 L2 ServerUnix

ACCESS CONTROL, MEDIA PROTECTION

5.2.4.1 Ensure the audit log directory is 0750 or more restrictiveCIS Amazon Linux 2 v3.0.0 L2Unix

ACCESS CONTROL, MEDIA PROTECTION

5.2.4.1 Ensure the audit log directory is 0750 or more restrictiveCIS AlmaLinux OS 8 Workstation L2 v3.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

5.2.4.1 Ensure the audit log directory is 0750 or more restrictiveCIS Red Hat EL8 Server L2 v3.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

5.2.4.1 Ensure the audit log directory is 0750 or more restrictiveCIS Rocky Linux 8 Workstation L2 v2.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

5.2.4.4 Ensure the audit log directory is 0750 or more restrictiveCIS Ubuntu Linux 18.04 LTS v2.2.0 L2 ServerUnix

ACCESS CONTROL, MEDIA PROTECTION

6.1 Mongodb Database Running with Least PrivilegesCIS MongoDB 3.4 L1 Unix Audit v1.0.0Unix

ACCESS CONTROL

6.2.4.4 Ensure the audit log file directory mode is configuredCIS Ubuntu Linux 24.04 LTS v1.0.0 L2 WorkstationUnix

ACCESS CONTROL, MEDIA PROTECTION

6.3 Ensure that server-side scripting is disabled if not neededCIS MongoDB 3.6 L2 Unix Audit v1.1.0Unix

CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY

6.4 Ensure that server-side scripting is disabled if not neededCIS MongoDB 3.2 L2 Unix Audit v1.0.0Unix

CONFIGURATION MANAGEMENT

6.4.4.4 Ensure the audit log file directory mode is configuredCIS Debian Linux 11 v2.0.0 L2 WorkstationUnix

ACCESS CONTROL, MEDIA PROTECTION

7.2 Ensure that database file permissions are set correctlyCIS MongoDB 3.6 L1 Unix Audit v1.1.0Unix

ACCESS CONTROL, MEDIA PROTECTION

17.2.3 (L1) Ensure 'Audit User Account Management' is set to 'Success and Failure'CIS Microsoft Windows 8.1 v2.4.1 L1 BitlockerWindows

AUDIT AND ACCOUNTABILITY, IDENTIFICATION AND AUTHENTICATION

17.5.1 (L1) Ensure 'Audit Account Lockout' is set to include 'Failure'CIS Microsoft Windows 8.1 v2.4.1 L1 BitlockerWindows

AUDIT AND ACCOUNTABILITY, IDENTIFICATION AND AUTHENTICATION

17.7.5 (L1) Ensure 'Audit Other Policy Change Events' is set to include 'Failure'CIS Microsoft Windows 8.1 v2.4.1 L1 BitlockerWindows

AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT

17.9.5 (L1) Ensure 'Audit System Integrity' is set to 'Success and Failure'CIS Microsoft Windows 8.1 v2.4.1 L1 BitlockerWindows

AUDIT AND ACCOUNTABILITY

18.8.40.1 (L1) Ensure 'Configure validation of ROCA-vulnerable WHfB keys during authentication' is set to 'Enabled: Audit' or higher (DC only)CIS Microsoft Windows Server 2008 R2 Domain Controller Level 1 v3.3.1Windows

SYSTEM AND INFORMATION INTEGRITY

18.8.40.1 (L1) Ensure 'Configure validation of ROCA-vulnerable WHfB keys during authentication' is set to 'Enabled: Audit' or higher (DC only)CIS Microsoft Windows Server 2008 Domain Controller Level 1 v3.3.1Windows

SYSTEM AND INFORMATION INTEGRITY

18.9.39.1 (L1) Ensure 'Configure validation of ROCA-vulnerable WHfB keys during authentication' is set to 'Enabled: Audit' or higher (DC only)CIS Microsoft Windows Server 2022 v4.0.0 L1 DCWindows

SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY

18.9.39.1 (L1) Ensure 'Configure validation of ROCA-vulnerable WHfB keys during authentication' is set to 'Enabled: Audit' or higher (DC only)CIS Microsoft Windows Server 2025 v1.0.0 L1 DCWindows

SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY

18.9.39.1 Ensure 'Configure validation of ROCA-vulnerable WHfB keys during authentication' is set to 'Enabled: Audit' or higher (DC only)CIS Microsoft Windows Server 2022 STIG v2.0.0 L1 Domain ControllerWindows

SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY

Configuring a pre-login or post-login message banner for the BIG-IP or Enterprise Manager system - Banner TextTenable F5 BIG-IP Best Practice AuditF5

ACCESS CONTROL

Configuring a secure password policy for the BIG-IP system - Minimum LengthTenable F5 BIG-IP Best Practice AuditF5

IDENTIFICATION AND AUTHENTICATION

Configuring an automatic logout for idle sessions - Configuration utilityTenable F5 BIG-IP Best Practice AuditF5

ACCESS CONTROL

Configuring CIDR Network Addresses for the BIG-IP packet filter - Filter established connectionsTenable F5 BIG-IP Best Practice AuditF5

ACCESS CONTROL

Configuring CIDR Network Addresses for the BIG-IP packet filter - Packet filter loggingTenable F5 BIG-IP Best Practice AuditF5

ACCESS CONTROL

Configuring cookie encryption within the HTTP profileTenable F5 BIG-IP Best Practice AuditF5

SYSTEM AND COMMUNICATIONS PROTECTION

Configuring LDAP remote authentication for Active Directory - ScopeTenable F5 BIG-IP Best Practice AuditF5

ACCESS CONTROL, CONFIGURATION MANAGEMENT

Configuring LDAP remote authentication for Active Directory - SSLTenable F5 BIG-IP Best Practice AuditF5

ACCESS CONTROL, CONFIGURATION MANAGEMENT

Configuring LDAP remote authentication for Active Directory - SSL Client CertTenable F5 BIG-IP Best Practice AuditF5

ACCESS CONTROL, CONFIGURATION MANAGEMENT

Configuring LDAP remote authentication for Active Directory - SSL Client KeyTenable F5 BIG-IP Best Practice AuditF5

ACCESS CONTROL, CONFIGURATION MANAGEMENT

Configuring the BIG-IP system to enforce the use of strict passwordsTenable F5 BIG-IP Best Practice AuditF5

ACCESS CONTROL

Disabling the admin accountTenable F5 BIG-IP Best Practice AuditF5

ACCESS CONTROL

Overview of Appliance modeTenable F5 BIG-IP Best Practice AuditF5

ACCESS CONTROL

Overview of port lockdown behaviorTenable F5 BIG-IP Best Practice AuditF5

CONFIGURATION MANAGEMENT

Preserving or modifying HTTP response headers removed by the BIG-IP ASM systemTenable F5 BIG-IP Best Practice AuditF5

SYSTEM AND COMMUNICATIONS PROTECTION

SQL2-00-018500 - SQL Server must ensure users are authenticated with an individual authenticator prior to using a shared authenticator.DISA STIG SQL Server 2012 DB Instance Security v1r20MS_SQLDB

IDENTIFICATION AND AUTHENTICATION

UBTU-18-010305 - The Ubuntu operating system must be configured so that audit log files cannot be read or write-accessible by unauthorized users.DISA STIG Ubuntu 18.04 LTS v2r15Unix

AUDIT AND ACCOUNTABILITY

UBTU-18-010307 - The Ubuntu operating system must permit only authorized groups to own the audit log files.DISA STIG Ubuntu 18.04 LTS v2r15Unix

AUDIT AND ACCOUNTABILITY

UBTU-24-901300 - Ubuntu 24.04 LTS must be configured so that audit log files are not read or write-accessible by unauthorized users.DISA Canonical Ubuntu 24.04 LTS STIG v1r1Unix

AUDIT AND ACCOUNTABILITY