Item Search

NameAudit NamePluginCategory
1.2.6 - AirWatch - Disable 'plug-ins'AirWatch - CIS Google Android 4 v1.0.0 L2MDM

ACCESS CONTROL

2.2.7 - MobileIron - Set Maximum number of failed attemptsMobileIron - CIS Apple iOS 9 v1.0.0 L1MDM

ACCESS CONTROL

AMLS-L3-000160 - If Border Gateway Protocol (BGP) is enabled on The Arista Multilayer Switch, The Arista Multilayer Switch must not be a BGP peer with a router from an Autonomous System belonging to any Alternate Gateway.DISA STIG Arista MLS DCS-7000 Series RTR v1r4Arista

ACCESS CONTROL

AMLS-L3-000190 - The Arista Multilayer Switch must enforce that the managed network domain and the management network domain are separate routing domains and the Interior Gateway Protocol instances are not redistributed or advertised to each other.DISA STIG Arista MLS DCS-7000 Series RTR v1r4Arista

ACCESS CONTROL

AMLS-L3-000220 - The Arista Multilayer Switch must enable neighbor router authentication for control plane protocols except RIP - IS-IS auth modeDISA STIG Arista MLS DCS-7000 Series RTR v1r4Arista

ACCESS CONTROL, CONFIGURATION MANAGEMENT

AMLS-L3-000220 - The Arista Multilayer Switch must enable neighbor router authentication for control plane protocols except RIP - IS-IS md5 keyDISA STIG Arista MLS DCS-7000 Series RTR v1r4Arista

ACCESS CONTROL, CONFIGURATION MANAGEMENT

AMLS-L3-000220 - The Arista Multilayer Switch must enable neighbor router authentication for control plane protocols except RIP - OSPF message-digestDISA STIG Arista MLS DCS-7000 Series RTR v1r4Arista

ACCESS CONTROL, CONFIGURATION MANAGEMENT

AMLS-L3-000240 - The Arista Multilayer Switch must be configured to disable non-essential capabilities.DISA STIG Arista MLS DCS-7000 Series RTR v1r4Arista

CONFIGURATION MANAGEMENT

AMLS-L3-000270 - The Arista Multilayer Switch must manage excess bandwidth to limit the effects of packet flooding types of denial of service (DoS) attacks - DoS attacks.DISA STIG Arista MLS DCS-7000 Series RTR v1r4Arista

SYSTEM AND COMMUNICATIONS PROTECTION

AMLS-L3-000320 - The Arista Multilayer Switch must not enable the RIP routing protocol.DISA STIG Arista MLS DCS-7000 Series RTR v1r4Arista

IDENTIFICATION AND AUTHENTICATION

AMLS-NM-000130 - The Arista Multilayer Switch must automatically audit account modification.DISA STIG Arista MLS DCS-7000 Series NDM v1r4Arista

ACCESS CONTROL

AMLS-NM-000140 - The Arista Multilayer Switch must automatically audit account disabling actions.DISA STIG Arista MLS DCS-7000 Series NDM v1r4Arista

ACCESS CONTROL

AMLS-NM-000170 - The Arista Multilayer Switch must protect against an individual (or process acting on behalf of an individual) falsely denying having performed organization-defined actions to be covered by non-repudiation.DISA STIG Arista MLS DCS-7000 Series NDM v1r4Arista

AUDIT AND ACCOUNTABILITY

AMLS-NM-000180 - The Arista Multilayer Switch must generate audit records when successful/unsuccessful attempts to access privileges occur.DISA STIG Arista MLS DCS-7000 Series NDM v1r4Arista

AUDIT AND ACCOUNTABILITY

AMLS-NM-000200 - The Arista Multilayer Switch must generate audit records containing the full-text recording of privileged commands.DISA STIG Arista MLS DCS-7000 Series NDM v1r4Arista

AUDIT AND ACCOUNTABILITY

AMLS-NM-000210 - The Arista Multilayer Switch must be configured to prohibit the use of all unnecessary and/or nonsecure functions, ports, protocols, and/or services, as defined in the PPSM CAL and vulnerability assessments.DISA STIG Arista MLS DCS-7000 Series NDM v1r4Arista

CONFIGURATION MANAGEMENT

AMLS-NM-000350 - Arista Multilayer Switches used for nonlocal maintenance sessions must implement cryptographic mechanisms to protect the confidentiality of nonlocal maintenance and diagnostic communications - api httpDISA STIG Arista MLS DCS-7000 Series NDM v1r4Arista

MAINTENANCE

AMLS-NM-000360 - The Arista Multilayer Switch must generate audit records for privileged activities or other system-level access - aaa execDISA STIG Arista MLS DCS-7000 Series NDM v1r4Arista

AUDIT AND ACCOUNTABILITY

AMLS-NM-000420 - The Arista Multilayer Switch must protect the audit records of nonlocal accesses to privileged accounts and the execution of privileged functions - show user-accountDISA STIG Arista MLS DCS-7000 Series NDM v1r4Arista

CONFIGURATION MANAGEMENT

AMLS-NM-000430 - The Arista Multilayer Switch must employ AAA service to centrally manage authentication settings - aaa policy on-failureDISA STIG Arista MLS DCS-7000 Series NDM v1r4Arista

CONFIGURATION MANAGEMENT

AMLS-NM-200825 - The Arista Multilayer Switch must use FIPS-compliant mechanisms for authentication to a cryptographic module - SSH FIPSDISA STIG Arista MLS DCS-7000 Series NDM v1r4Arista

IDENTIFICATION AND AUTHENTICATION

EX13-EG-000195 - The Exchange Sender Reputation filter must identify the spam block level.DISA Microsoft Exchange 2013 Edge Transport Server STIG v1r6Windows

SYSTEM AND INFORMATION INTEGRITY

MD4X-00-002000 - MongoDB must limit privileges to change software modules, to include stored procedures, functions and triggers, and links to software external to MongoDB.DISA STIG MongoDB Enterprise Advanced 4.x v1r4 DBMongoDB

CONFIGURATION MANAGEMENT

MD4X-00-002800 - MongoDB must uniquely identify and authenticate organizational users (or processes acting on behalf of organizational users).DISA STIG MongoDB Enterprise Advanced 4.x v1r4 OSUnix

IDENTIFICATION AND AUTHENTICATION

MD4X-00-003400 - MongoDB must uniquely identify and authenticate non-organizational users (or processes acting on behalf of non-organizational users).DISA STIG MongoDB Enterprise Advanced 4.x v1r4 DBMongoDB

IDENTIFICATION AND AUTHENTICATION

MD4X-00-003700 - MongoDB must maintain the authenticity of communications sessions by guarding against man-in-the-middle attacks that guess at Session ID values.DISA STIG MongoDB Enterprise Advanced 4.x v1r4 OSUnix

SYSTEM AND COMMUNICATIONS PROTECTION

MD4X-00-006500 - MongoDB products must be a version supported by the vendor.DISA STIG MongoDB Enterprise Advanced 4.x v1r4 DBMongoDB

SYSTEM AND SERVICES ACQUISITION

SLEM-05-255035 - SLEM 5 must be configured so that all network connections associated with SSH traffic are terminated after 10 minutes of becoming unresponsive.DISA SUSE Linux Enterprise Micro SLEM 5 STIG v1r4Unix

ACCESS CONTROL, MAINTENANCE, SYSTEM AND COMMUNICATIONS PROTECTION

SLEM-05-255055 - SLEM 5 SSH server must be configured to use only FIPS 140-2/140-3 validated key exchange algorithms.DISA SUSE Linux Enterprise Micro SLEM 5 STIG v1r4Unix

ACCESS CONTROL

SLEM-05-255070 - SLEM 5 must display the date and time of the last successful account logon upon an SSH logon.DISA SUSE Linux Enterprise Micro SLEM 5 STIG v1r4Unix

CONFIGURATION MANAGEMENT

SLEM-05-255075 - SLEM 5 SSH daemon must be configured to not allow authentication using known hosts authentication.DISA SUSE Linux Enterprise Micro SLEM 5 STIG v1r4Unix

CONFIGURATION MANAGEMENT

SLEM-05-255080 - SLEM 5 SSH daemon must perform strict mode checking of home directory configuration files.DISA SUSE Linux Enterprise Micro SLEM 5 STIG v1r4Unix

CONFIGURATION MANAGEMENT

SLEM-05-255090 - There must be no .shosts files on SLEM 5.DISA SUSE Linux Enterprise Micro SLEM 5 STIG v1r4Unix

CONFIGURATION MANAGEMENT

SLEM-05-272010 - SLEM 5 must not allow unattended or automatic logon via the graphical user interface (GUI).DISA SUSE Linux Enterprise Micro SLEM 5 STIG v1r4Unix

CONFIGURATION MANAGEMENT

SLEM-05-412020 - SLEM 5 must lock an account after three consecutive invalid access attempts.DISA SUSE Linux Enterprise Micro SLEM 5 STIG v1r4Unix

ACCESS CONTROL

SLEM-05-431015 - SLEM 5 must use a Linux Security Module configured to enforce limits on system services.DISA SUSE Linux Enterprise Micro SLEM 5 STIG v1r4Unix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

SLEM-05-432020 - SLEM 5 must require reauthentication when using the "sudo" command.DISA SUSE Linux Enterprise Micro SLEM 5 STIG v1r4Unix

IDENTIFICATION AND AUTHENTICATION

SLEM-05-432030 - SLEM 5 must specify the default "include" directory for the /etc/sudoers file.DISA SUSE Linux Enterprise Micro SLEM 5 STIG v1r4Unix

CONFIGURATION MANAGEMENT

SLEM-05-611055 - SLEM 5 must not be configured to allow blank or null passwords.DISA SUSE Linux Enterprise Micro SLEM 5 STIG v1r4Unix

CONFIGURATION MANAGEMENT

SLEM-05-611060 - SLEM 5 must not have accounts configured with blank or null passwords.DISA SUSE Linux Enterprise Micro SLEM 5 STIG v1r4Unix

CONFIGURATION MANAGEMENT

SLEM-05-612015 - SLEM 5 must implement multifactor authentication for access to privileged accounts via pluggable authentication modules (PAM).DISA SUSE Linux Enterprise Micro SLEM 5 STIG v1r4Unix

IDENTIFICATION AND AUTHENTICATION

SLEM-05-631015 - SLEM 5 must configure the Linux Pluggable Authentication Modules (PAM) to prohibit the use of cached offline authentications after one day.DISA SUSE Linux Enterprise Micro SLEM 5 STIG v1r4Unix

IDENTIFICATION AND AUTHENTICATION

SLEM-05-651025 - SLEM 5 file integrity tool must be configured to protect the integrity of the audit tools.DISA SUSE Linux Enterprise Micro SLEM 5 STIG v1r4Unix

AUDIT AND ACCOUNTABILITY

SLEM-05-653020 - The audit-audispd-plugins package must be installed on SLEM 5.DISA SUSE Linux Enterprise Micro SLEM 5 STIG v1r4Unix

AUDIT AND ACCOUNTABILITY

SLEM-05-654120 - SLEM 5 must generate audit records for all uses of the "unix_chkpwd" or "unix2_chkpwd" commands.DISA SUSE Linux Enterprise Micro SLEM 5 STIG v1r4Unix

AUDIT AND ACCOUNTABILITY, MAINTENANCE

SLEM-05-654140 - SLEM 5 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/passwd.DISA SUSE Linux Enterprise Micro SLEM 5 STIG v1r4Unix

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

SLEM-05-654150 - SLEM 5 must generate audit records for all uses of the "chmod", "fchmod" and "fchmodat" system calls.DISA SUSE Linux Enterprise Micro SLEM 5 STIG v1r4Unix

AUDIT AND ACCOUNTABILITY, MAINTENANCE

SLEM-05-654165 - SLEM 5 must generate audit records for all uses of the "delete_module" system call.DISA SUSE Linux Enterprise Micro SLEM 5 STIG v1r4Unix

AUDIT AND ACCOUNTABILITY, MAINTENANCE

SLEM-05-654175 - SLEM 5 must generate audit records for all uses of the "mount" system call.DISA SUSE Linux Enterprise Micro SLEM 5 STIG v1r4Unix

AUDIT AND ACCOUNTABILITY, MAINTENANCE

SLEM-05-654230 - SLEM 5 must generate audit records for the "/run/utmp file".DISA SUSE Linux Enterprise Micro SLEM 5 STIG v1r4Unix

AUDIT AND ACCOUNTABILITY