Item Search

NameAudit NamePluginCategory
1.1.8 Set 'aaa accounting connection'CIS Cisco IOS 15 L2 v4.1.1Cisco

ACCESS CONTROL

1.1.9 Set 'aaa accounting exec'CIS Cisco IOS 15 L2 v4.1.1Cisco

AUDIT AND ACCOUNTABILITY

1.1.11 Set 'aaa accounting system'CIS Cisco IOS 12 L2 v4.0.0Cisco

AUDIT AND ACCOUNTABILITY

1.2.8 Set 'exec-timeout' less than or equal to 10 minutes 'line tty'CIS Cisco IOS 15 L1 v4.1.1Cisco

ACCESS CONTROL

1.2.10 Set 'transport input none' for 'line aux 0'CIS Cisco IOS 12 L1 v4.0.0Cisco

CONFIGURATION MANAGEMENT

1.4.2 Enable 'service password-encryption'CIS Cisco IOS 12 L1 v4.0.0Cisco

IDENTIFICATION AND AUTHENTICATION

1.5.10 Require 'aes 128' as minimum for 'snmp-server user' when using SNMPv3CIS Cisco IOS 12 L2 v4.0.0Cisco

IDENTIFICATION AND AUTHENTICATION

2.1.1.1.4 Set 'seconds' for 'ip ssh timeout'CIS Cisco IOS 15 L1 v4.1.1Cisco

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

2.1.1.1.5 Set maximimum value for 'ip ssh authentication-retries'CIS Cisco IOS 12 L1 v4.0.0Cisco

ACCESS CONTROL

2.2.2 Set 'buffer size' for 'logging buffered'CIS Cisco IOS 15 L1 v4.1.1Cisco

AUDIT AND ACCOUNTABILITY

2.2.4 Set IP address for 'logging host'CIS Cisco IOS 12 L1 v4.0.0Cisco

AUDIT AND ACCOUNTABILITY

2.3.1.3 Set the 'ntp trusted-key'CIS Cisco IOS 12 L2 v4.0.0Cisco

IDENTIFICATION AND AUTHENTICATION

2.3.1.3 Set the 'ntp trusted-key'CIS Cisco IOS 15 L2 v4.1.1Cisco

AUDIT AND ACCOUNTABILITY

2.4.1 Create a single 'interface loopback' - 'Only one loopback interface is defined'CIS Cisco IOS 12 L2 v4.0.0Cisco

CONFIGURATION MANAGEMENT

2.4.2 Set AAA 'source-interface'CIS Cisco IOS 12 L2 v4.0.0Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

2.4.3 Set 'ntp source' to Loopback Interface - 'NTP is bound to loopback'CIS Cisco IOS 15 L2 v4.1.1Cisco

AUDIT AND ACCOUNTABILITY

3.1.1 Set 'no ip source-route'CIS Cisco IOS 12 L1 v4.0.0Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

3.2.1 Set 'ip access-list extended' to Forbid Private Source Addresses from External Networks - 'Default deny configured'CIS Cisco IOS 12 L2 v4.0.0Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

3.2.1 Set 'ip access-list extended' to Forbid Private Source Addresses from External Networks - 'Deny 10.0.0.0'CIS Cisco IOS 12 L2 v4.0.0Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

3.2.1 Set 'ip access-list extended' to Forbid Private Source Addresses from External Networks - 'Deny 172.16.0.0'CIS Cisco IOS 12 L2 v4.0.0Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

3.2.1 Set 'ip access-list extended' to Forbid Private Source Addresses from External Networks - 'Deny 192.0.2.0'CIS Cisco IOS 15 L2 v4.1.1Cisco

CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

3.2.2 Set inbound 'ip access-group' on the External InterfaceCIS Cisco IOS 12 L2 v4.0.0Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

3.3.1.2 Set 'key'CIS Cisco IOS 12 L2 v4.0.0Cisco

IDENTIFICATION AND AUTHENTICATION

3.3.1.7 Set 'authentication mode md5'CIS Cisco IOS 12 L2 v4.0.0Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

3.3.3.2 Set 'key'CIS Cisco IOS 15 L2 v4.1.1Cisco

CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

3.3.4.1 Set 'neighbor password'CIS Cisco IOS 12 L2 v4.0.0Cisco

IDENTIFICATION AND AUTHENTICATION

AMLS-NM-000430 - The Arista Multilayer Switch must employ AAA service to centrally manage authentication settings - aaa login console groupDISA STIG Arista MLS DCS-7000 Series NDM v1r4Arista

CONFIGURATION MANAGEMENT

AMLS-NM-000430 - The Arista Multilayer Switch must employ AAA service to centrally manage authentication settings - radius/tacacs-server hostDISA STIG Arista MLS DCS-7000 Series NDM v1r4Arista

CONFIGURATION MANAGEMENT

Configure an IPsec Static RouteTenable Cisco Viptela SD-WAN - vEdgeCisco_Viptela

ACCESS CONTROL

Enable IKE Version 1/2 - groupTenable Cisco Viptela SD-WAN - vEdgeCisco_Viptela

SYSTEM AND COMMUNICATIONS PROTECTION

Enable IKE Version 1/2 - rekeyTenable Cisco Viptela SD-WAN - vEdgeCisco_Viptela

ACCESS CONTROL

Ensure 'console session timeout' is less than or equal to '5' minutesTenable Cisco Firepower Best Practices AuditCisco

ACCESS CONTROL

Ensure 'Failover' is enabledTenable Cisco Firepower Best Practices AuditCisco

CONFIGURATION MANAGEMENT

Ensure 'noproxyarp' is enabled for untrusted interfacesTenable Cisco Firepower Best Practices AuditCisco

CONFIGURATION MANAGEMENT

Ensure DHCP services are disabled for untrusted interfaces - dhcprelayTenable Cisco Firepower Best Practices AuditCisco

CONFIGURATION MANAGEMENT

Ensure non-default application inspection is configured correctlyTenable Cisco Firepower Best Practices AuditCisco

SYSTEM AND INFORMATION INTEGRITY

Event Logging - Configure remote syslog - serverTenable Cisco Viptela SD-WAN - vManageCisco_Viptela

AUDIT AND ACCOUNTABILITY

Flaw Remediation - Review version of running imageTenable Cisco Viptela SD-WAN - vManageCisco_Viptela

SYSTEM AND INFORMATION INTEGRITY

GEN000240 - The system clock must be synchronized to an authoritative DoD time source - 'NTP daemon uses approved sources'DISA STIG AIX 6.1 v1r14Unix

AUDIT AND ACCOUNTABILITY

Identification and Authentication - Use out of band authentication - AAA - netconf loggingTenable Cisco Viptela SD-WAN - vBondCisco_Viptela

IDENTIFICATION AND AUTHENTICATION

Identification and Authentication - Use out of band authentication - AAA - netconf loggingTenable Cisco Viptela SD-WAN - vManageCisco_Viptela

IDENTIFICATION AND AUTHENTICATION

Identification and Authentication - Use out of band authentication - Authentication OrderTenable Cisco Viptela SD-WAN - vEdgeCisco_Viptela

IDENTIFICATION AND AUTHENTICATION

Identification and Authentication - Use out of band authentication - Server IPTenable Cisco Viptela SD-WAN - vBondCisco_Viptela

IDENTIFICATION AND AUTHENTICATION

JUEX-NM-000460 - The Juniper EX switch must be configured to enforce access restrictions associated with changes to device configuration.DISA Juniper EX Series Network Device Management v2r2Juniper

CONFIGURATION MANAGEMENT

Secure Name/address Resolution Service - Configure DNS servers - SecondaryTenable Cisco Viptela SD-WAN - vEdgeCisco_Viptela

SYSTEM AND COMMUNICATIONS PROTECTION

SQL2-00-000500 - SQL Server must maintain and support organization-defined security labels on data in transmission.DISA STIG SQL Server 2012 Database Audit v1r20MS_SQLDB

ACCESS CONTROL

SQL4-00-032100 - When supporting applications that require security labeling of data, SQL Server must associate organization-defined types of security labels having organization-defined security label values with information in transmission.DISA STIG SQL Server 2014 Database Audit v1r7MS_SQLDB

ACCESS CONTROL

Time Stamps - Enable NTP - remote serverTenable Cisco Viptela SD-WAN - vEdgeCisco_Viptela

AUDIT AND ACCOUNTABILITY

vEdge Modify IKE Dead-Peer DetectionTenable Cisco Viptela SD-WAN - vEdgeCisco_Viptela

ACCESS CONTROL

WN12-00-000180 - The Server Message Block (SMB) v1 protocol must be disabled on the SMB client - mrxsmb10DISA Windows Server 2012 and 2012 R2 MS STIG v3r7Windows

CONFIGURATION MANAGEMENT