Item Search

NameAudit NamePluginCategory
2.9 Ensure monitoring and alerting exists for sessions from unsupported Snowflake Connector for Python and JDBC and ODBC driversCIS Snowflake Foundations v1.0.0 L2Snowflake

AUDIT AND ACCOUNTABILITY

3.1 Validate Proxy SettingsCIS Mozilla Firefox 38 ESR Windows L1 v1.0.0Windows

CONFIGURATION MANAGEMENT

4.1.5 Ensure events that modify the system's network environment are collected - /etc/hostsCIS Debian Family Server L2 v1.0.0Unix

CONFIGURATION MANAGEMENT

4.1.5 Ensure events that modify the system's network environment are collected - /etc/hostsCIS Ubuntu Linux 16.04 LTS Server L2 v2.0.0Unix

CONFIGURATION MANAGEMENT

4.1.5 Ensure events that modify the system's network environment are collected - /etc/issueCIS Debian Family Server L2 v1.0.0Unix

CONFIGURATION MANAGEMENT

4.1.5 Ensure events that modify the system's network environment are collected - /etc/networkCIS Ubuntu Linux 16.04 LTS Server L2 v2.0.0Unix

CONFIGURATION MANAGEMENT

4.1.5 Ensure events that modify the system's network environment are collected - /etc/sysconfig/networkCIS Debian Family Server L2 v1.0.0Unix

CONFIGURATION MANAGEMENT

4.1.5 Ensure events that modify the system's network environment are collected - auditctl '/etc/hosts'CIS Debian Family Workstation L2 v1.0.0Unix

CONFIGURATION MANAGEMENT

4.1.5 Ensure events that modify the system's network environment are collected - auditctl '/etc/issue'CIS Debian Family Server L2 v1.0.0Unix

CONFIGURATION MANAGEMENT

4.1.5 Ensure events that modify the system's network environment are collected - auditctl '/etc/network'CIS Debian Family Server L2 v1.0.0Unix

CONFIGURATION MANAGEMENT

4.1.5 Ensure events that modify the system's network environment are collected - auditctl 'sethostname setdomainname'CIS Debian Family Workstation L2 v1.0.0Unix

CONFIGURATION MANAGEMENT

4.1.5 Ensure events that modify the system's network environment are collected - auditctl 'sethostname setdomainname' x64CIS Debian Family Workstation L2 v1.0.0Unix

CONFIGURATION MANAGEMENT

4.1.5 Ensure events that modify the system's network environment are collected - auditctl /etc/hostsCIS Ubuntu Linux 16.04 LTS Workstation L2 v2.0.0Unix

CONFIGURATION MANAGEMENT

4.1.5 Ensure events that modify the system's network environment are collected - auditctl /etc/hostsCIS Ubuntu Linux 16.04 LTS Server L2 v2.0.0Unix

CONFIGURATION MANAGEMENT

4.1.5 Ensure events that modify the system's network environment are collected - auditctl issueCIS Ubuntu Linux 16.04 LTS Server L2 v2.0.0Unix

CONFIGURATION MANAGEMENT

4.1.5 Ensure events that modify the system's network environment are collected - auditctl networkCIS Ubuntu Linux 16.04 LTS Workstation L2 v2.0.0Unix

CONFIGURATION MANAGEMENT

4.1.5 Ensure events that modify the system's network environment are collected - auditctl sethostname (32-bit)CIS Ubuntu Linux 16.04 LTS Server L2 v2.0.0Unix

CONFIGURATION MANAGEMENT

4.1.5 Ensure events that modify the system's network environment are collected - auditctl sethostname (64-bit)CIS Ubuntu Linux 16.04 LTS Workstation L2 v2.0.0Unix

CONFIGURATION MANAGEMENT

4.1.5 Ensure events that modify the system's network environment are collected - issueCIS Ubuntu Linux 16.04 LTS Server L2 v2.0.0Unix

CONFIGURATION MANAGEMENT

4.1.5 Ensure events that modify the system's network environment are collected - issueCIS Ubuntu Linux 16.04 LTS Workstation L2 v2.0.0Unix

CONFIGURATION MANAGEMENT

4.1.5 Ensure events that modify the system's network environment are collected - issue.netCIS Ubuntu Linux 16.04 LTS Server L2 v2.0.0Unix

CONFIGURATION MANAGEMENT

4.1.5 Ensure events that modify the system's network environment are collected - sethostname (64-bit)CIS Ubuntu Linux 16.04 LTS Workstation L2 v2.0.0Unix

CONFIGURATION MANAGEMENT

4.1.5 Ensure events that modify the system's network environment are collected - sethostname setdomainnameCIS Debian Family Server L2 v1.0.0Unix

CONFIGURATION MANAGEMENT

4.1.5 Ensure events that modify the system's network environment are collected - sethostname setdomainnameCIS Debian Family Workstation L2 v1.0.0Unix

CONFIGURATION MANAGEMENT

4.1.5 Ensure events that modify the system's network environment are collected - sethostname setdomainname x64CIS Debian Family Workstation L2 v1.0.0Unix

CONFIGURATION MANAGEMENT

4.2 Enable 'Show Wi-Fi status in menu bar' - Show Wi-Fi status in menu barCIS Apple macOS 10.12 L1 v1.2.0Unix

CONFIGURATION MANAGEMENT

4.3 Create network specific locationsCIS Apple OSX 10.11 El Capitan L2 v1.1.0Unix
5.1.1 Ensure allow and deny filters limit access to specific IP addressesCIS NGINX Benchmark v2.1.0 L2 ProxyUnix

SYSTEM AND COMMUNICATIONS PROTECTION

5.2.3.2 Ensure actions as another user are always loggedCIS Oracle Linux 8 Server L2 v3.0.0Unix

AUDIT AND ACCOUNTABILITY

5.2.3.2 Ensure actions as another user are always loggedCIS Oracle Linux 8 Workstation L2 v3.0.0Unix

AUDIT AND ACCOUNTABILITY

5.2.3.2 Ensure actions as another user are always loggedCIS Red Hat EL8 Workstation L2 v3.0.0Unix

AUDIT AND ACCOUNTABILITY

6.3.3.8 Ensure events that modify user/group information are collectedCIS Red Hat Enterprise Linux 9 v2.0.0 L2 ServerUnix

AUDIT AND ACCOUNTABILITY

20.60 Ensure 'System files must be monitored for unauthorized changes' (STIG only)CIS Microsoft Windows Server 2022 STIG v2.0.0 STIG DCWindows

CONFIGURATION MANAGEMENT

20.60 Ensure 'System files must be monitored for unauthorized changes' (STIG only)CIS Microsoft Windows Server 2022 STIG v2.0.0 STIG MSWindows

CONFIGURATION MANAGEMENT

AIOS-18-015500 - Apple iOS/iPadOS 18 must disable the download of iOS/iPadOS beta updates.AirWatch - DISA Apple iOS/iPadOS 18 v1r1MDM

CONFIGURATION MANAGEMENT

AIOS-18-015500 - Apple iOS/iPadOS 18 must disable the download of iOS/iPadOS beta updates.MobileIron - DISA Apple iOS/iPadOS 18 v1r1MDM

CONFIGURATION MANAGEMENT

DTAM165 - McAfee VirusScan On-Access Default Processes Policies must be configured to detect unwanted programs.DISA McAfee VirusScan 8.8 Managed Client STIG v6r1Windows

SYSTEM AND INFORMATION INTEGRITY

DTAVSEL-113 - The McAfee VirusScan Enterprise for Linux 1.9.x/2.0.x On-Demand scanner must be configured to include all local drives and their sub-directories.McAfee Virus Scan Enterprise for Linux 1.9x/2.0x Managed Client v1r5Unix

SYSTEM AND INFORMATION INTEGRITY

F5BI-LT-000031 - The BIG-IP Core implementation must be configured to monitor inbound traffic for remote access policy compliance when accepting connections to virtual servers.DISA F5 BIG-IP Local Traffic Manager STIG v2r4F5

ACCESS CONTROL

F5BI-LT-000239 - The BIG-IP Core implementation must continuously monitor inbound communications traffic crossing internal security boundaries for unusual or unauthorized activities or conditions.DISA F5 BIG-IP Local Traffic Manager STIG v2r4F5

SYSTEM AND INFORMATION INTEGRITY

GEN005504 - The SSH daemon must only listen on management network addresses unless authorized for uses other than management.DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

GEN005504 - The SSH daemon must only listen on management network addresses unless authorized for uses other than management.DISA STIG AIX 6.1 v1r14Unix

ACCESS CONTROL

GEN005504 - The SSH daemon must only listen on management network addresses unless authorized for uses other than management.DISA STIG AIX 5.3 v1r2Unix

ACCESS CONTROL

GEN005504 - The SSH daemon must only listen on management network addresses unless authorized for uses other than management.DISA STIG Solaris 10 SPARC v2r4Unix

CONFIGURATION MANAGEMENT

GEN007841 - Wireless network adapters must be disabled.DISA STIG AIX 6.1 v1r14Unix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

GOOG-11-001100 - Google Android 11 allow list must be configured to not include applications with the following characteristics:AirWatch - DISA Google Android 11 COBO v2r1MDM

CONFIGURATION MANAGEMENT

JUNI-RT-000270 - The Juniper perimeter router must be configured to block inbound packets with source Bogon IP address prefixes - prefix-listDISA STIG Juniper Router RTR v3r2Juniper

SYSTEM AND COMMUNICATIONS PROTECTION

PANW-AG-000101 - The Palo Alto Networks security platform being used for TLS/SSL decryption using PKI-based user authentication must only accept end entity certificates issued by DoD PKI or DoD-approved PKI Certificate Authorities (CAs) for the establishment of protected sessions.DISA STIG Palo Alto ALG v3r4Palo_Alto

SYSTEM AND COMMUNICATIONS PROTECTION

SQL2-00-015800 - The OS must limit privileges to change SQL Server software resident within software libraries (including privileged programs) - 'Install'DISA STIG SQL Server 2012 Database OS Audit v1r20Windows

AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT

Wireless network adapters must be disabledDISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION