5.4 Ensure 'SQL Server Audit' is set to capture both 'failed' and 'successful logins' | CIS SQL Server 2022 Database L1 AWS RDS v1.1.0 | MS_SQLDB | AUDIT AND ACCOUNTABILITY |
Big Sur - Access Control for Mobile Devices | NIST macOS Big Sur v1.4.0 - 800-53r5 High | Unix | ACCESS CONTROL |
Big Sur - Access Control for Mobile Devices | NIST macOS Big Sur v1.4.0 - 800-53r5 Moderate | Unix | ACCESS CONTROL |
Big Sur - Configure Automated Flaw Remediation | NIST macOS Big Sur v1.4.0 - 800-53r4 High | Unix | SYSTEM AND INFORMATION INTEGRITY |
Big Sur - Configure the System to Notify upon Account Disabled Actions | NIST macOS Big Sur v1.4.0 - 800-53r4 High | Unix | ACCESS CONTROL |
Big Sur - Configure the System to Notify upon Account Disabled Actions | NIST macOS Big Sur v1.4.0 - CNSSI 1253 | Unix | ACCESS CONTROL |
Big Sur - Configure the System to Notify upon Account Enabled Actions | NIST macOS Big Sur v1.4.0 - 800-53r4 High | Unix | ACCESS CONTROL |
Big Sur - Configure the System to Notify upon Account Modified Actions | NIST macOS Big Sur v1.4.0 - 800-53r4 High | Unix | ACCESS CONTROL |
Big Sur - Configure the System to Notify upon Account Removed Actions | NIST macOS Big Sur v1.4.0 - All Profiles | Unix | ACCESS CONTROL |
Big Sur - Configure the System to Notify upon Account Removed Actions | NIST macOS Big Sur v1.4.0 - CNSSI 1253 | Unix | ACCESS CONTROL |
Big Sur - Employ Automated Mechanisms for Account Management Functions | NIST macOS Big Sur v1.4.0 - 800-53r5 High | Unix | ACCESS CONTROL |
Big Sur - Employ Automated Mechanisms for Account Management Functions | NIST macOS Big Sur v1.4.0 - 800-53r5 Moderate | Unix | ACCESS CONTROL |
Big Sur - Employ Automated Mechanisms for Account Management Functions | NIST macOS Big Sur v1.4.0 - CNSSI 1253 | Unix | ACCESS CONTROL |
Big Sur - Off-Load Audit Records | NIST macOS Big Sur v1.4.0 - All Profiles | Unix | AUDIT AND ACCOUNTABILITY |
Big Sur - Prevent the Use of Dictionary Words for Passwords | NIST macOS Big Sur v1.4.0 - All Profiles | Unix | CONFIGURATION MANAGEMENT |
Big Sur - Protect Against Denial of Service Attacks by Ensuring Rate-Limiting Measures on Network Interfaces | NIST macOS Big Sur v1.4.0 - 800-53r5 Low | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
Big Sur - Protect Against Denial of Service Attacks by Ensuring Rate-Limiting Measures on Network Interfaces | NIST macOS Big Sur v1.4.0 - 800-53r5 Moderate | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
Big Sur - Require a Minimum of Fifty Percent Character Change in New Passwords | NIST macOS Big Sur v1.4.0 - 800-171 | Unix | IDENTIFICATION AND AUTHENTICATION |
Big Sur - Require a Minimum of Fifty Percent Character Change in New Passwords | NIST macOS Big Sur v1.4.0 - All Profiles | Unix | IDENTIFICATION AND AUTHENTICATION |
Big Sur - Require Devices to Reauthenticate when Changing Authenticators | NIST macOS Big Sur v1.4.0 - 800-53r5 High | Unix | IDENTIFICATION AND AUTHENTICATION |
Big Sur - Secure Name Address Resolution Service | NIST macOS Big Sur v1.4.0 - 800-53r5 High | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
Big Sur - Secure Name Address Resolution Service | NIST macOS Big Sur v1.4.0 - 800-53r5 Low | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
Catalina - Access Control for Mobile Devices | NIST macOS Catalina v1.5.0 - All Profiles | Unix | ACCESS CONTROL |
Catalina - Audit Record Reduction and Report Generation - processing | NIST macOS Catalina v1.5.0 - 800-53r4 High | Unix | AUDIT AND ACCOUNTABILITY |
Catalina - Audit Record Reduction and Report Generation - processing | NIST macOS Catalina v1.5.0 - 800-53r5 High | Unix | AUDIT AND ACCOUNTABILITY |
Catalina - Configure Automated Flaw Remediation | NIST macOS Catalina v1.5.0 - 800-53r4 High | Unix | SYSTEM AND INFORMATION INTEGRITY |
Catalina - Configure Automated Flaw Remediation | NIST macOS Catalina v1.5.0 - 800-53r4 Moderate | Unix | SYSTEM AND INFORMATION INTEGRITY |
Catalina - Configure Automated Flaw Remediation | NIST macOS Catalina v1.5.0 - 800-53r5 High | Unix | SYSTEM AND INFORMATION INTEGRITY |
Catalina - Configure the System to Notify upon Account Disabled Actions | NIST macOS Catalina v1.5.0 - 800-53r4 Moderate | Unix | ACCESS CONTROL |
Catalina - Configure the System to Notify upon Account Modified Actions | NIST macOS Catalina v1.5.0 - All Profiles | Unix | ACCESS CONTROL |
Catalina - Configure the System to Notify upon Account Removed Actions | NIST macOS Catalina v1.5.0 - 800-53r4 High | Unix | ACCESS CONTROL |
Catalina - Configure the System to Notify upon Account Removed Actions | NIST macOS Catalina v1.5.0 - All Profiles | Unix | ACCESS CONTROL |
Catalina - Configure the System to Notify upon Baseline Configuration Changes | NIST macOS Catalina v1.5.0 - All Profiles | Unix | CONFIGURATION MANAGEMENT |
Catalina - Disable Wi-Fi When Connected to Ethernet | NIST macOS Catalina v1.5.0 - 800-53r4 High | Unix | ACCESS CONTROL |
Catalina - Enforce Dual Authorization for Movement and Deletion of Audit Information | NIST macOS Catalina v1.5.0 - All Profiles | Unix | AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT |
Catalina - Require a Minimum of Fifty Percent Character Change in New Passwords | NIST macOS Catalina v1.5.0 - 800-53r4 Moderate | Unix | IDENTIFICATION AND AUTHENTICATION |
Catalina - Require a Minimum of Fifty Percent Character Change in New Passwords | NIST macOS Catalina v1.5.0 - All Profiles | Unix | IDENTIFICATION AND AUTHENTICATION |
Catalina - Secure Name Address Resolution Service | NIST macOS Catalina v1.5.0 - 800-53r4 Moderate | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
Catalina - Secure Name Address Resolution Service | NIST macOS Catalina v1.5.0 - 800-53r5 Low | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
GEN002760 - System must be configured to audit all admin/privileged/security actions - '/etc/security/audit/events FILE_Mknod exists' | DISA STIG AIX 5.3 v1r2 | Unix | CONFIGURATION MANAGEMENT |
GEN002760 - System must be configured to audit all admin/privileged/security actions - '/etc/security/audit/events FS_Chroot exists' | DISA STIG AIX 5.3 v1r2 | Unix | CONFIGURATION MANAGEMENT |
GEN002760 - System must be configured to audit all admin/privileged/security actions - '/etc/security/audit/events PROC_Kill exists' | DISA STIG AIX 5.3 v1r2 | Unix | CONFIGURATION MANAGEMENT |
GEN002760 - System must be configured to audit all admin/privileged/security actions - '/etc/security/audit/events PROC_Privilege exists' | DISA STIG AIX 5.3 v1r2 | Unix | CONFIGURATION MANAGEMENT |
GEN002760 - System must be configured to audit all admin/privileged/security actions - '/etc/security/audit/events PROC_Setpgid exists' | DISA STIG AIX 5.3 v1r2 | Unix | CONFIGURATION MANAGEMENT |
GEN002760 - System must be configured to audit all admin/privileged/security actions - '/etc/security/audit/events RESTORE_Import exists' | DISA STIG AIX 5.3 v1r2 | Unix | CONFIGURATION MANAGEMENT |
GEN002760 - System must be configured to audit all admin/privileged/security actions - '/etc/security/audit/events TCBCK_Delete exists' | DISA STIG AIX 5.3 v1r2 | Unix | CONFIGURATION MANAGEMENT |
GEN002760 - System must be configured to audit all admin/privileged/security actions - '/etc/security/audit/events USER_Create exists' | DISA STIG AIX 5.3 v1r2 | Unix | CONFIGURATION MANAGEMENT |
GEN002760 - System must be configured to audit all admin/privileged/security actions - '/etc/security/audit/events USER_Reboot exists' | DISA STIG AIX 5.3 v1r2 | Unix | CONFIGURATION MANAGEMENT |
GEN002760 - System must be configured to audit all admin/privileged/security actions - '/etc/security/audit/events USER_SetEnv exists' | DISA STIG AIX 5.3 v1r2 | Unix | CONFIGURATION MANAGEMENT |
UBTU-18-010306 - The Ubuntu operating system must permit only authorized accounts ownership of the audit log files. | DISA STIG Ubuntu 18.04 LTS v2r15 | Unix | AUDIT AND ACCOUNTABILITY |