Item Search

NameAudit NamePluginCategory
1.4.3 Ensure boot loader does not allow removable mediaCIS Amazon Linux 2 STIG v1.0.0 L3Unix
1.8 Ensure updates, patches, and additional security software are installedCIS Amazon Linux 2 STIG v1.0.0 L1Unix

SYSTEM AND INFORMATION INTEGRITY

2.1 Run BIND as a non-root User - process -u namedCIS BIND DNS v1.0.0 L1 Authoritative Name ServerUnix

ACCESS CONTROL

2.1 Run BIND as a non-root User - process -u namedCIS BIND DNS v3.0.1 Caching Only Name ServerUnix

ACCESS CONTROL

2.1 Run BIND as a non-root User - process -u namedCIS BIND DNS v1.0.0 L1 Caching Only Name ServerUnix

ACCESS CONTROL

2.1 Run BIND as a non-root User - process -u namedCIS BIND DNS v3.0.1 Authoritative Name ServerUnix

ACCESS CONTROL

2.1 Run BIND as a non-root User - UIDCIS BIND DNS v3.0.1 Authoritative Name ServerUnix

ACCESS CONTROL

2.1 Run BIND as a non-root User - UIDCIS BIND DNS v1.0.0 L1 Caching Only Name ServerUnix

ACCESS CONTROL

2.1 Run BIND as a non-root User - UIDCIS BIND DNS v1.0.0 L1 Authoritative Name ServerUnix

ACCESS CONTROL

2.1 Run BIND as a non-root User - UIDCIS BIND DNS v3.0.1 Caching Only Name ServerUnix

ACCESS CONTROL

2.2.1.2 Ensure ntp is configured - daemonCIS Amazon Linux 2 STIG v1.0.0 L1Unix

AUDIT AND ACCOUNTABILITY

2.2.1.2 Ensure ntp is configured - restrict -4CIS Amazon Linux 2 STIG v1.0.0 L1Unix

AUDIT AND ACCOUNTABILITY

2.2.1.2 Ensure ntp is configured - restrict -6CIS Amazon Linux 2 STIG v1.0.0 L1Unix

AUDIT AND ACCOUNTABILITY

2.2.1.4 Ensure NTP 'maxpoll' is set - maxpoll is set.CIS Amazon Linux 2 STIG v1.0.0 L3Unix

AUDIT AND ACCOUNTABILITY

2.2.3 Ensure X Window System is not installedCIS Amazon Linux 2 STIG v1.0.0 L1Unix

CONFIGURATION MANAGEMENT

3.1.2 Ensure packet redirect sending is disabled - /etc/sysctl.conf /etc/sysctl.d/* net.ipv4.conf.all.send_redirects=0CIS Amazon Linux 2 STIG v1.0.0 L1Unix

CONFIGURATION MANAGEMENT

3.1.2 Ensure packet redirect sending is disabled - sysctl net.ipv4.conf.default.send_redirects=0CIS Amazon Linux 2 STIG v1.0.0 L1Unix

CONFIGURATION MANAGEMENT

3.2.7 Ensure Reverse Path Filtering is enabled - /etc/sysctl.conf /etc/sysctl.d/* net.ipv4.conf.default.rp_filter = 1CIS Amazon Linux 2 STIG v1.0.0 L1Unix

CONFIGURATION MANAGEMENT

4.1.2.19 Ensure audit of semanage commandCIS Amazon Linux 2 STIG v1.0.0 L3Unix

AUDIT AND ACCOUNTABILITY

4.1.2.22 Ensure audit of setfiles commandCIS Amazon Linux 2 STIG v1.0.0 L3Unix

AUDIT AND ACCOUNTABILITY

4.1.9 Ensure login and logout events are collectedCIS Amazon Linux 2 STIG v1.0.0 L2Unix

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

5.1.8 Ensure at/cron is restricted to authorized users - at.allow existCIS Amazon Linux 2 STIG v1.0.0 L1Unix

CONFIGURATION MANAGEMENT

5.1.8 Ensure at/cron is restricted to authorized users - at.deny does not existCIS Amazon Linux 2 STIG v1.0.0 L1Unix

CONFIGURATION MANAGEMENT

5.1.8 Ensure at/cron is restricted to authorized users - cron.deny does not existCIS Amazon Linux 2 STIG v1.0.0 L1Unix

CONFIGURATION MANAGEMENT

5.2.23 Ensure RSA rhosts authentication is not allowedCIS Amazon Linux 2 STIG v1.0.0 L3Unix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

5.2.29 Ensrue SSH performs checks of home directory configuration files.CIS Amazon Linux 2 STIG v1.0.0 L3Unix

CONFIGURATION MANAGEMENT

5.3.10 Ensure certificate status checking for PKI authentication.CIS Amazon Linux 2 STIG v1.0.0 L3Unix

SYSTEM AND COMMUNICATIONS PROTECTION

5.4.1.2 Ensure minimum days between password changes is 7 or more - login.defsCIS Amazon Linux 2 STIG v1.0.0 L1Unix

IDENTIFICATION AND AUTHENTICATION

5.4.1.2 Ensure minimum days between password changes is 7 or more - usersCIS Amazon Linux 2 STIG v1.0.0 L1Unix

IDENTIFICATION AND AUTHENTICATION

5.4.6 Ensure no accounts are configured with blank or null passwords - password-authCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIGUnix

CONFIGURATION MANAGEMENT

5.4.6 Ensure no accounts are configured with blank or null passwords - system-authCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIGUnix

CONFIGURATION MANAGEMENT

5.4.9 Ensure there are no unnecessary accountsCIS Amazon Linux 2 STIG v1.0.0 L3Unix

ACCESS CONTROL

5.4.11 Ensure default user shell timeout is 600 seconds or lessCIS Amazon Linux 2 STIG v1.0.0 L3Unix

ACCESS CONTROL

6.2.10 Ensure users' dot files are not group or world writableCIS Amazon Linux 2 STIG v1.0.0 L1Unix

ACCESS CONTROL

6.2.20 Ensure all local interactive user home directories are group-ownedCIS Amazon Linux 2 STIG v1.0.0 L3Unix

CONFIGURATION MANAGEMENT

CIS_Red_Hat_EL7_STIG_v2.0.0_L1_Server.audit from CIS Red Hat Enterprise Linux 7 STIG v2.0.0CIS Red Hat Enterprise Linux 7 STIG v2.0.0 L1 ServerUnix
CIS_Red_Hat_EL7_STIG_v2.0.0_L1_Workstation.audit from CIS Red Hat Enterprise Linux 7 STIG v2.0.0CIS Red Hat Enterprise Linux 7 STIG v2.0.0 L1 WorkstationUnix
CIS_Red_Hat_EL7_STIG_v2.0.0_L2_Server.audit from CIS Red Hat Enterprise Linux 7 STIG v2.0.0CIS Red Hat Enterprise Linux 7 STIG v2.0.0 L2 ServerUnix
CIS_Red_Hat_EL7_STIG_v2.0.0_L2_Workstation.audit from CIS Red Hat Enterprise Linux 7 STIG v2.0.0CIS Red Hat Enterprise Linux 7 STIG v2.0.0 L2 WorkstationUnix
CIS_Red_Hat_EL7_STIG_v2.0.0_STIG.audit from CIS Red Hat Enterprise Linux 7 STIG v2.0.0CIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIGUnix
CIS_Red_Hat_Enterprise_Linux_7_v4.0.0_L1_Server.audit from CIS Red Hat Enterprise Linux 7 Benchmark v4.0.0CIS Red Hat Enterprise Linux 7 v4.0.0 L1 ServerUnix
CIS_Red_Hat_Enterprise_Linux_7_v4.0.0_L1_Workstation.audit from CIS Red Hat Enterprise Linux 7 Benchmark v4.0.0CIS Red Hat Enterprise Linux 7 v4.0.0 L1 WorkstationUnix
CIS_Red_Hat_Enterprise_Linux_7_v4.0.0_L2_Server.audit from CIS Red Hat Enterprise Linux 7 Benchmark v4.0.0CIS Red Hat Enterprise Linux 7 v4.0.0 L2 ServerUnix
CIS_Red_Hat_Enterprise_Linux_7_v4.0.0_L2_Workstation.audit from CIS Red Hat Enterprise Linux 7 Benchmark v4.0.0CIS Red Hat Enterprise Linux 7 v4.0.0 L2 WorkstationUnix
CIS_Red_Hat_Enterprise_Linux_9_v2.0.0_L1_Server.audit from CIS Red Hat Enterprise Linux 9 Benchmark v2.0.0CIS Red Hat Enterprise Linux 9 v2.0.0 L1 ServerUnix
CIS_Red_Hat_Enterprise_Linux_9_v2.0.0_L1_Workstation.audit from CIS Red Hat Enterprise Linux 9 Benchmark v2.0.0CIS Red Hat Enterprise Linux 9 v2.0.0 L1 WorkstationUnix
CIS_Red_Hat_Enterprise_Linux_9_v2.0.0_L2_Server.audit from CIS Red Hat Enterprise Linux 9 Benchmark v2.0.0CIS Red Hat Enterprise Linux 9 v2.0.0 L2 ServerUnix
CIS_Red_Hat_Enterprise_Linux_9_v2.0.0_L2_Workstation.audit from CIS Red Hat Enterprise Linux 9 Benchmark v2.0.0CIS Red Hat Enterprise Linux 9 v2.0.0 L2 WorkstationUnix
GEN003540 - The system must implement non-executable program stacks - 'kernel.exec-shield'DISA STIG for Oracle Linux 5 v2r1Unix

CONFIGURATION MANAGEMENT

OL6-00-000079 - The system must limit the ability of processes to have simultaneous write and execute access to memory.DISA STIG Oracle Linux 6 v2r7Unix

CONFIGURATION MANAGEMENT