Item Search

NameAudit NamePluginCategory
1.4.6 Ensure a unique name is set as the superusers account (UEFI)CIS Red Hat Enterprise Linux 8 STIG v2.0.0 STIGUnix

ACCESS CONTROL

2.1.2 Ensure X Window System is not installedCIS Google Container-Optimized OS v1.2.0 L1 ServerUnix

CONFIGURATION MANAGEMENT

2.1.7 Set 'no service pad'CIS Cisco IOS XE 17.x v2.2.1 L1Cisco

SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION

2.1.7 Set 'no service pad'CIS Cisco IOS XE 16.x v2.2.0 L1Cisco

CONFIGURATION MANAGEMENT

2.1.19 Ensure xinetd services are not in useCIS Debian Linux 11 v2.0.0 L1 ServerUnix

CONFIGURATION MANAGEMENT

2.1.20 Ensure X window server services are not in useCIS Debian Linux 11 v2.0.0 L2 ServerUnix

CONFIGURATION MANAGEMENT

2.1.20 Ensure X window server services are not in useCIS Oracle Linux 9 v2.0.0 L2 ServerUnix

CONFIGURATION MANAGEMENT

2.1.20 Ensure X window server services are not in useCIS Red Hat Enterprise Linux 8 STIG v2.0.0 STIGUnix

CONFIGURATION MANAGEMENT

2.1.20 Ensure X window server services are not in useCIS Red Hat Enterprise Linux 10 v1.0.1 L2 ServerUnix

CONFIGURATION MANAGEMENT

2.1.20 Ensure X window server services are not in useCIS Rocky Linux 10 v1.0.0 L2 ServerUnix

CONFIGURATION MANAGEMENT

2.1.20 Ensure X window server services are not in useCIS Red Hat Enterprise Linux 8 STIG v2.0.0 L2 ServerUnix

CONFIGURATION MANAGEMENT

2.1.20 Ensure X window server services are not in useCIS Ubuntu Linux 20.04 LTS v3.0.0 L2 ServerUnix

CONFIGURATION MANAGEMENT

2.1.20 Ensure X window server services are not in useCIS AlmaLinux OS 9 v2.0.0 L2 ServerUnix

CONFIGURATION MANAGEMENT

2.1.20 Ensure X window server services are not in useCIS AlmaLinux OS 10 v1.0.0 L2 ServerUnix

CONFIGURATION MANAGEMENT

2.1.20 Ensure X window server services are not in useCIS Debian Linux 12 v1.1.0 L2 ServerUnix

CONFIGURATION MANAGEMENT

2.1.21 Ensure X window server services are not in useCIS SUSE Linux Enterprise 15 v2.0.1 L2 ServerUnix

CONFIGURATION MANAGEMENT

2.1.22 Ensure X window server services are not in useCIS Rocky Linux 8 v3.0.0 L2 ServerUnix

CONFIGURATION MANAGEMENT

2.1.22 Ensure X window server services are not in useCIS Oracle Linux 8 v4.0.0 L2 ServerUnix

CONFIGURATION MANAGEMENT

2.1.22 Ensure X window server services are not in useCIS Red Hat Enterprise Linux 8 v4.0.0 L2 ServerUnix

CONFIGURATION MANAGEMENT

2.2.1 Ensure X Window System is not installedCIS Debian Linux 10 v2.0.0 L2 ServerUnix

CONFIGURATION MANAGEMENT

2.2.2 Ensure X Window System is not installedCIS Ubuntu Linux 14.04 LTS Server L1 v2.1.0Unix

CONFIGURATION MANAGEMENT

2.2.2 Ensure X Window System is not installedCIS Debian 8 Server L1 v2.0.2Unix

CONFIGURATION MANAGEMENT

2.2.2 Ensure X Window System is not installedCIS Debian 9 Server L1 v1.0.1Unix

CONFIGURATION MANAGEMENT

2.2.2 Ensure X11 Server components are not installedCIS Red Hat 6 Server L1 v3.0.0Unix

CONFIGURATION MANAGEMENT

2.2.2 Ensure X11 Server components are not installedCIS Fedora 19 Family Linux Server L1 v1.0.0Unix

CONFIGURATION MANAGEMENT

2.2.2 Ensure X11 Server components are not installedCIS CentOS 6 Server L1 v3.0.0Unix

CONFIGURATION MANAGEMENT

2.2.2 Ensure X11 Server components are not installedCIS Oracle Linux 6 Server L1 v2.0.0Unix

CONFIGURATION MANAGEMENT

2.2.2 Ensure X11 Server components are not installedCIS Amazon Linux 2 STIG v2.0.0 STIGUnix

CONFIGURATION MANAGEMENT

2.2.2 Ensure xorg-x11-server-common is not installedCIS CentOS Linux 8 Server L1 v2.0.0Unix

CONFIGURATION MANAGEMENT

2.2.20 Ensure X window server services are not in useCIS Oracle Linux 7 v4.0.0 L2 ServerUnix

CONFIGURATION MANAGEMENT

2.2.20 Ensure X window server services are not in useCIS Red Hat Enterprise Linux 7 v4.0.0 L2 ServerUnix

CONFIGURATION MANAGEMENT

2.2.20 Ensure X window server services are not in useCIS Amazon Linux 2 v4.0.0 L2 ServerUnix

CONFIGURATION MANAGEMENT

2.2.20 Ensure X window server services are not in useCIS CentOS Linux 7 v4.0.0 L2 ServerUnix

CONFIGURATION MANAGEMENT

2.7.2 iCloud keychainCIS Apple OSX 10.11 El Capitan L2 v1.1.0Unix
GEN005220 - .Xauthority or X*.hosts (or equivalent) file(s) must be used to restrict access to the X server.DISA STIG Solaris 10 X86 v2r4Unix

CONFIGURATION MANAGEMENT

GEN005240 - The .Xauthority utility must only permit access to authorized hosts.DISA STIG Solaris 10 SPARC v2r4Unix

CONFIGURATION MANAGEMENT

GEN005240 - The .Xauthority utility must only permit access to authorized hosts.DISA STIG Solaris 10 X86 v2r4Unix

CONFIGURATION MANAGEMENT

GEN005260 - X Window System connections that are not required must be disabled.DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

JBOS-AS-000095 - JBoss must be configured to initiate session logging upon startup.DISA JBoss Enterprise Application Platform 6.3 STIG v2r6Unix

AUDIT AND ACCOUNTABILITY

JBOS-AS-000110 - JBoss must be configured to produce log records containing information to establish what type of events occurred.DISA JBoss Enterprise Application Platform 6.3 STIG v2r6Unix

AUDIT AND ACCOUNTABILITY

JBOS-AS-000690 - JBoss must be configured to generate log records when successful/unsuccessful attempts to modify privileges occur.DISA JBoss Enterprise Application Platform 6.3 STIG v2r6Unix

AUDIT AND ACCOUNTABILITY

JBOS-AS-000695 - JBoss must be configured to generate log records when successful/unsuccessful attempts to delete privileges occur.DISA JBoss Enterprise Application Platform 6.3 STIG v2r6Unix

AUDIT AND ACCOUNTABILITY

JBOS-AS-000720 - JBoss must be configured to generate log records for all account creations, modifications, disabling, and termination events.DISA JBoss Enterprise Application Platform 6.3 STIG v2r6Unix

AUDIT AND ACCOUNTABILITY

OL08-00-010140 - OL 8 operating systems booted with United Extensible Firmware Interface (UEFI) must require authentication upon booting into single-user mode and maintenance.DISA Oracle Linux 8 STIG v2r8Unix

ACCESS CONTROL

RHEL-08-010140 - RHEL 8 operating systems booted with United Extensible Firmware Interface (UEFI) must require authentication upon booting into single-user mode and maintenance.DISA Red Hat Enterprise Linux 8 STIG v2r7Unix

ACCESS CONTROL

SLEM-05-412015 - SLEM 5 must initiate a session lock after a 15-minute period of inactivity.DISA SUSE Linux Enterprise Micro SLEM 5 STIG v1r4Unix

ACCESS CONTROL

SLEM-05-654120 - SLEM 5 must generate audit records for all uses of the "unix_chkpwd" or "unix2_chkpwd" commands.DISA SUSE Linux Enterprise Micro SLEM 5 STIG v1r4Unix

AUDIT AND ACCOUNTABILITY, MAINTENANCE

SOL-11.1-020560 - X Window System connections that are not required must be disabled.DISA Solaris 11 SPARC STIG v3r4Unix

CONFIGURATION MANAGEMENT

SOL-11.1-060060 - The operating system must employ FIPS-validate or NSA-approved cryptography to implement digital signatures.DISA Solaris 11 SPARC STIG v3r4Unix

SYSTEM AND COMMUNICATIONS PROTECTION

SOL-11.1-060060 - The operating system must employ FIPS-validate or NSA-approved cryptography to implement digital signatures.DISA Solaris 11 X86 STIG v3r4Unix

SYSTEM AND COMMUNICATIONS PROTECTION