Item Search

NameAudit NamePluginCategory
1.1.4.1.1 Ensure select data center regions for meetings/webinars hosted by your account is set to enabledCIS Zoom L1 v1.0.0Zoom

CONFIGURATION MANAGEMENT

1.2.2 Ensure the latest software package is installedCIS NGINX Benchmark v2.1.0 L1 LoadbalancerUnix

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

1.2.2 Ensure the latest software package is installedCIS NGINX Benchmark v2.1.0 L1 WebserverUnix

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

1.4.1 Enable SELinux in /etc/grub.conf - enforcing != 0CIS Red Hat Enterprise Linux 5 L2 v2.2.1Unix

ACCESS CONTROL

1.4.2 Set the SELinux State - SELINUX=enforcingCIS Red Hat Enterprise Linux 5 L2 v2.2.1Unix

ACCESS CONTROL

1.4.4 Remove SETroubleshootCIS Red Hat Enterprise Linux 5 L2 v2.2.1Unix

SYSTEM AND INFORMATION INTEGRITY

1.5.1.2 Ensure local login warning banner is configured properlyCIS Google Container-Optimized OS v1.2.0 L1 ServerUnix

CONFIGURATION MANAGEMENT

1.6.4 Enable XD/NX Support on 32-bit x86 Systems - cpuinfoCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY

2.1.1 Remove telnet-serverCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

CONFIGURATION MANAGEMENT

2.1.3 Remove rsh-serverCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

CONFIGURATION MANAGEMENT

2.1.4 Remove rshCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

CONFIGURATION MANAGEMENT

2.1.10 (L1) Ensure DMARC Records for all Exchange Online domains are publishedCIS Microsoft 365 Foundations v5.0.0 L1 E3microsoft_azure

SYSTEM AND COMMUNICATIONS PROTECTION

2.1.11 Remove xinetdCIS Red Hat Enterprise Linux 5 L2 v2.2.1Unix

CONFIGURATION MANAGEMENT

2.3.1.1 (L1) Ensure 'Accounts: Block Microsoft accounts' is set to 'Users can't add or log on with Microsoft accounts'CIS Microsoft Windows 10 Enterprise v4.0.0 L1Windows

ACCESS CONTROL

2.3.1.1 (L1) Ensure 'Accounts: Block Microsoft accounts' is set to 'Users can't add or log on with Microsoft accounts'CIS Microsoft Windows 10 Enterprise v4.0.0 L1 BLWindows

ACCESS CONTROL

2.3.1.1 (L1) Ensure 'Accounts: Block Microsoft accounts' is set to 'Users can't add or log on with Microsoft accounts'CIS Microsoft Windows 10 Enterprise v4.0.0 L1 NGWindows

ACCESS CONTROL

2.24 Rotate swarm manager auto-lock key periodicallyCIS Docker 1.13.0 v1.0.0 L1 DockerUnix
3.4 Ensure 'slow_query_log' Has Appropriate PermissionsCIS MySQL 5.6 Enterprise Windows OS L1 v2.0.0Windows

ACCESS CONTROL, MEDIA PROTECTION

3.4 Ensure 'slow_query_log' Has Appropriate PermissionsCIS MariaDB 10.6 on Linux L1 v1.1.0Unix

ACCESS CONTROL, MEDIA PROTECTION

3.4 Ensure 'slow_query_log' Has Appropriate PermissionsCIS MySQL 5.6 Enterprise Linux OS L1 v2.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

3.4 Ensure 'slow_query_log' Has Appropriate PermissionsCIS MySQL 5.7 Community Linux OS L1 v2.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

3.4 Ensure 'slow_query_log' Has Appropriate PermissionsCIS MySQL 5.7 Enterprise Database L1 v2.0.0MySQLDB

ACCESS CONTROL, MEDIA PROTECTION

3.4 Ensure 'slow_query_log' Has Appropriate PermissionsCIS MySQL 5.6 Community Windows OS L1 v2.0.0Windows

ACCESS CONTROL, MEDIA PROTECTION

3.4 Ensure 'slow_query_log' Has Appropriate PermissionsCIS MySQL 5.6 Community Linux OS L1 v2.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

3.4 Ensure 'slow_query_log' Has Appropriate PermissionsCIS MySQL 5.7 Community Database L1 v2.0.0MySQLDB

ACCESS CONTROL, MEDIA PROTECTION

3.4 Ensure 'slow_query_log' Has Appropriate PermissionsCIS MySQL 5.7 Enterprise Linux OS L1 v2.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

3.5 Remove DHCP ServerCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

CONFIGURATION MANAGEMENT

3.11 Remove HTTP ServerCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

CONFIGURATION MANAGEMENT

4.4.2 Disable IPv6 - options ipv6 disable=1CIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

CONFIGURATION MANAGEMENT

4.6.2 Disable SCTPCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

CONFIGURATION MANAGEMENT

5.2.2 Activate the rsyslog Service - rsyslogCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

AUDIT AND ACCOUNTABILITY

5.3.2 Enable auditd ServiceCIS Red Hat Enterprise Linux 5 L2 v2.2.1Unix

AUDIT AND ACCOUNTABILITY

7.2 Ensure base backups are configured and functionalCIS PostgreSQL 11 DB v1.0.0PostgreSQLDB

CONTINGENCY PLANNING

7.3 Ensure base backups are configured and functionalCIS PostgreSQL 13 DB v1.2.0PostgreSQLDB

CONTINGENCY PLANNING

7.3 Ensure base backups are configured and functionalCIS PostgreSQL 16 DB v1.0.0PostgreSQLDB

CONTINGENCY PLANNING

9.2.3 Verify No Legacy '+' Entries Exist in /etc/shadow File - + Entries Exist in /etc/shadow FileCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

CD12-00-011900 - Database contents must be protected from unauthorized and unintended information transfer by enforcement of a data-transfer policy.DISA STIG Crunchy Data PostgreSQL DB v3r1PostgreSQLDB

SYSTEM AND COMMUNICATIONS PROTECTION

DG0102-ORACLE11 - DBMS processes or services should run under custom, dedicated OS accounts - 'No Oracle services are running as LocalSystem'DISA STIG Oracle 11 Instance v9r1 OS WindowsWindows

ACCESS CONTROL

DG0102-ORACLE11 - DBMS processes or services should run under custom, dedicated OS accounts - 'Oracle Services are running under dedicated service accounts'DISA STIG Oracle 11 Instance v9r1 OS WindowsWindows

ACCESS CONTROL

DISA_STIG_PostgreSQL_9-x_on_RHEL_v2r5_OS.audit from DISA PostgreSQL 9.x v2r5 STIGDISA STIG PostgreSQL 9.x on RHEL OS v2r5Unix
EX13-MB-000310 - The Exchange Email application must not share a partition with another application.DISA Microsoft Exchange 2013 Mailbox Server STIG v2r3Windows

SYSTEM AND COMMUNICATIONS PROTECTION

GEN000000-AIX00020 - AIX Trusted Computing Base (TCB) software must be implemented.DISA STIG AIX 5.3 v1r2Unix

ACCESS CONTROL, SYSTEM AND SERVICES ACQUISITION

O19C-00-013200 - OS accounts used to run external procedures called by Oracle Database must have limited privileges.DISA Oracle Database 19c STIG v1r1 WindowsWindows

CONFIGURATION MANAGEMENT

O112-C2-004400 - OS accounts utilized to run external procedures called by the DBMS must have limited privileges.DISA STIG Oracle 11.2g v2r5 LinuxUnix

CONFIGURATION MANAGEMENT

PGS9-00-008300 - PostgreSQL must protect the confidentiality and integrity of all information at rest.DISA STIG PostgreSQL 9.x on RHEL DB v2r5PostgreSQLDB

SYSTEM AND COMMUNICATIONS PROTECTION

PGS9-00-010100 - PostgreSQL must require users to reauthenticate when organization-defined circumstances or situations require reauthentication.DISA STIG PostgreSQL 9.x on RHEL DB v2r5PostgreSQLDB

IDENTIFICATION AND AUTHENTICATION

VCPG-67-000022 - Rsyslog must be configured to monitor VMware Postgres logs - logDISA STIG VMware vSphere 6.7 PostgreSQL v1r2Unix

AUDIT AND ACCOUNTABILITY

VCRP-67-000001 - The rhttpproxy must drop connections to disconnected clients.DISA STIG VMware vSphere 6.7 RhttpProxy v1r3Unix

ACCESS CONTROL

VCUI-67-000018 - vSphere UI must limit the number of allowed connections.DISA STIG VMware vSphere 6.7 UI Tomcat v1r3Unix

SYSTEM AND COMMUNICATIONS PROTECTION

VCUI-70-000020 - vSphere UI must limit the number of allowed connections.DISA STIG VMware vSphere 7.0 vCA UI v1r2Unix

SYSTEM AND COMMUNICATIONS PROTECTION