Item Search

NameAudit NamePluginCategory
5.4.2 Ensure system accounts are securedCIS Debian Family Workstation L1 v1.0.0Unix

ACCESS CONTROL

6.2.7 Ensure users' dot files are not group or world writableCIS Ubuntu Linux 16.04 LTS Server L1 v2.0.0Unix

ACCESS CONTROL

6.2.9 Ensure no users have .forward filesCIS Ubuntu Linux 16.04 LTS Workstation L1 v2.0.0Unix

CONFIGURATION MANAGEMENT

6.2.12 Ensure no users have .forward filesCIS Oracle Linux 6 Server L1 v2.0.0Unix

CONFIGURATION MANAGEMENT

6.2.12 Ensure no users have .forward filesCIS Oracle Linux 6 Workstation L1 v2.0.0Unix

CONFIGURATION MANAGEMENT

6.2.12 Ensure no users have .forward filesCIS Red Hat 6 Workstation L1 v3.0.0Unix

CONFIGURATION MANAGEMENT

6.2.13 Ensure no users have .netrc filesCIS CentOS 6 Server L1 v3.0.0Unix

ACCESS CONTROL

6.2.13 Ensure no users have .netrc filesCIS CentOS 6 Workstation L1 v3.0.0Unix

ACCESS CONTROL

6.2.13 Ensure no users have .netrc filesCIS Red Hat 6 Workstation L1 v3.0.0Unix

ACCESS CONTROL

6.2.13 Ensure users' .netrc Files are not group or world accessibleCIS Fedora 28 Family Linux Server L1 v2.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

6.2.13 Ensure users' .netrc Files are not group or world accessibleCIS Fedora 28 Family Linux Workstation L1 v2.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

6.2.13 Ensure users' .netrc Files are not group or world accessibleCIS CentOS Linux 8 Workstation L1 v2.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

6.2.14 Ensure no users have .forward filesCIS Fedora 28 Family Linux Server L1 v2.0.0Unix

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

6.2.14 Ensure no users have .forward filesCIS CentOS Linux 8 Server L1 v2.0.0Unix

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

6.2.14 Ensure no users have .rhosts filesCIS Red Hat 6 Server L1 v3.0.0Unix

IDENTIFICATION AND AUTHENTICATION

6.2.14 Ensure no users have .rhosts filesCIS Red Hat 6 Workstation L1 v3.0.0Unix

IDENTIFICATION AND AUTHENTICATION

6.2.15 Ensure no users have .forward filesCIS Red Hat Enterprise Linux 7 STIG v2.0.0 L1 ServerUnix

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

6.2.15 Ensure no users have .forward filesCIS Amazon Linux 2 STIG v2.0.0 L1 WorkstationUnix

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

6.2.15 Ensure no users have .netrc filesCIS CentOS Linux 8 Workstation L1 v2.0.0Unix

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

6.2.16 Ensure no users have .netrc filesCIS Amazon Linux 2 STIG v2.0.0 L1 WorkstationUnix

CONFIGURATION MANAGEMENT, MAINTENANCE

6.2.17 Ensure no users have .rhosts filesCIS Red Hat Enterprise Linux 7 STIG v2.0.0 L1 WorkstationUnix

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

6.2.17 Ensure no users have .rhosts filesCIS Amazon Linux 2 STIG v2.0.0 L1 WorkstationUnix

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

6.2.17 Ensure no users have .rhosts filesCIS Amazon Linux 2 STIG v2.0.0 L1 ServerUnix

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

8.2 Disable JAR from Opening Unsafe File TypesCIS Mozilla Firefox 38 ESR Linux L1 v1.0.0Unix

CONFIGURATION MANAGEMENT

8.2 Disable JAR from Opening Unsafe File TypesCIS Mozilla Firefox 38 ESR Windows L1 v1.0.0Windows

CONFIGURATION MANAGEMENT

18.9.11.1.14 (BL) Ensure 'Configure use of passwords for fixed data drives' is set to 'Disabled'CIS Microsoft Windows 8.1 v2.4.1 L2 BitlockerWindows

CONFIGURATION MANAGEMENT

18.9.19.2 (L1) Ensure 'Turn Off user-installed desktop gadgets' is set to 'Enabled'CIS Microsoft Windows Server 2008 Domain Controller Level 1 v3.3.1Windows

CONFIGURATION MANAGEMENT

AIX7-00-001004 - AIX must limit the number of concurrent sessions to 10 for all accounts and/or account types.DISA STIG AIX 7.x v3r1Unix

ACCESS CONTROL

AIX7-00-001007 - If AIX is using LDAP for authentication or account information, the /etc/ldap.conf file (or equivalent) must not contain passwords.DISA STIG AIX 7.x v3r1Unix

IDENTIFICATION AND AUTHENTICATION

AIX7-00-001025 - AIX must configure the ttys value for all interactive users.DISA STIG AIX 7.x v3r1Unix

IDENTIFICATION AND AUTHENTICATION

AIX7-00-001031 - All AIX public directories must be owned by root or an application account.DISA STIG AIX 7.x v3r1Unix

CONFIGURATION MANAGEMENT

AIX7-00-001044 - Any publically accessible connection to AIX operating system must display the Standard Mandatory DoD Notice and Consent Banner before granting access to the system.DISA STIG AIX 7.x v3r1Unix

ACCESS CONTROL

AIX7-00-001046 - If LDAP authentication is required, AIX must setup LDAP client to refresh user and group caches less than a day.DISA STIG AIX 7.x v3r1Unix

IDENTIFICATION AND AUTHENTICATION

AIX7-00-001101 - AIX CDE must conceal, via the session lock, information previously visible on the display with a publicly viewable image.DISA STIG AIX 7.x v3r1Unix

ACCESS CONTROL

AIX7-00-001120 - AIX must enforce password complexity by requiring that at least one upper-case character be used.DISA STIG AIX 7.x v3r1Unix

IDENTIFICATION AND AUTHENTICATION

AIX7-00-001121 - AIX must enforce password complexity by requiring that at least one lower-case character be used.DISA STIG AIX 7.x v3r1Unix

IDENTIFICATION AND AUTHENTICATION

AIX7-00-001122 - AIX must enforce password complexity by requiring that at least one numeric character be used.DISA STIG AIX 7.x v3r1Unix

IDENTIFICATION AND AUTHENTICATION

AIX7-00-001125 - AIX Operating systems must enforce 24 hours/1 day as the minimum password lifetime.DISA STIG AIX 7.x v3r1Unix

IDENTIFICATION AND AUTHENTICATION

AIX7-00-001135 - If SNMP service is enabled on AIX, the default SNMP password must not be used in the /etc/snmpd.conf config file.DISA STIG AIX 7.x v3r1Unix

CONFIGURATION MANAGEMENT

AIX7-00-001139 - AIX removable media, remote file systems, and any file system not containing approved device files must be mounted with the nodev option.DISA STIG AIX 7.x v3r1Unix

CONFIGURATION MANAGEMENT

AIX7-00-002011 - AIX must provide the function to filter audit records for events of interest based upon all audit fields within audit records, support on-demand reporting requirements, and an audit reduction function that supports on-demand audit review and analysis and after-the-fact investigations of security incidents.DISA STIG AIX 7.x v3r1Unix

AUDIT AND ACCOUNTABILITY

AIX7-00-002015 - Audit logs on the AIX system must be set to 660 or less permissive.DISA STIG AIX 7.x v3r1Unix

AUDIT AND ACCOUNTABILITY

AIX7-00-002028 - AIX must verify the hash of audit tools.DISA STIG AIX 7.x v3r1Unix

AUDIT AND ACCOUNTABILITY

AIX7-00-002033 - AIX must allocate audit record storage capacity to store at least one weeks worth of audit records, when audit records are not immediately sent to a central audit record storage facility.DISA STIG AIX 7.x v3r1Unix

AUDIT AND ACCOUNTABILITY

AIX7-00-002070 - AIX log files must be owned by a system account.DISA STIG AIX 7.x v3r1Unix

SYSTEM AND INFORMATION INTEGRITY

AIX7-00-002081 - AIX time synchronization configuration file must be owned by root.DISA STIG AIX 7.x v3r1Unix

CONFIGURATION MANAGEMENT

AIX7-00-002083 - The AIX /etc/group file must be owned by root.DISA STIG AIX 7.x v3r1Unix

CONFIGURATION MANAGEMENT

AIX7-00-002085 - All AIX interactive users home directories must be owned by their respective users.DISA STIG AIX 7.x v3r1Unix

CONFIGURATION MANAGEMENT

AIX7-00-002089 - Samba packages must be removed from AIX.DISA STIG AIX 7.x v3r1Unix

CONFIGURATION MANAGEMENT

AIX7-00-002092 - The inetd.conf file on AIX must be group owned by the 'system' group.DISA STIG AIX 7.x v3r1Unix

CONFIGURATION MANAGEMENT