Item Search

NameAudit NamePluginCategory
1.3.1 Ensure AIDE is installedCIS Amazon Linux 2 STIG v1.0.0 L1Unix

AUDIT AND ACCOUNTABILITY

1.3.4 Ensure AIDE is configured to verify XATTRSCIS Amazon Linux 2 STIG v1.0.0 L3Unix

ACCESS CONTROL

1.4.4 Ensure UEFI requires authentication for single-user and maintenance modes - superusersCIS Amazon Linux 2 STIG v1.0.0 L3Unix

CONFIGURATION MANAGEMENT

1.5.4 Ensure the Ctrl-Alt-Delete key sequence is disabled.CIS Amazon Linux 2 STIG v1.0.0 L3Unix

CONFIGURATION MANAGEMENT

1.8.13 Ensure GNOME Idle activation is setCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIGUnix

ACCESS CONTROL

2.2.1.2 Ensure ntp is configured - remote serverCIS Amazon Linux 2 STIG v1.0.0 L1Unix

AUDIT AND ACCOUNTABILITY

2.8 Enable user namespace supportCIS Docker 1.13.0 v1.0.0 L2 DockerUnix
2.8 Enable user namespace supportCIS Docker 1.11.0 v1.0.0 L2 DockerUnix
2.8 Enable user namespace support - /etc/subgidCIS Docker Community Edition v1.1.0 L2 DockerUnix
2.8 Enable user namespace support - /etc/subuidCIS Docker Community Edition v1.1.0 L2 DockerUnix
2.9 Enable user namespace supportCIS Docker v1.7.0 L2 Docker - LinuxUnix

SYSTEM AND SERVICES ACQUISITION

3.2.2 Ensure ICMP redirects are not accepted - /etc/sysctl.conf /etc/sysctl.d/* net.ipv4.conf.all.accept_redirects=0CIS Amazon Linux 2 STIG v1.0.0 L1Unix

CONFIGURATION MANAGEMENT

3.2.2 Ensure ICMP redirects are not accepted - /etc/sysctl.conf /etc/sysctl.d/* net.ipv4.conf.default.accept_redirects=0CIS Amazon Linux 2 STIG v1.0.0 L1Unix

CONFIGURATION MANAGEMENT

3.2.2 Ensure ICMP redirects are not accepted - sysctl net.ipv6.conf.all.accept_redirects=0CIS Amazon Linux 2 STIG v1.0.0 L1Unix

CONFIGURATION MANAGEMENT

4.1.1.4 Ensure audit logs are stored on a different system.CIS Amazon Linux 2 STIG v1.0.0 L3Unix

AUDIT AND ACCOUNTABILITY

4.1.2.1 Ensure all uses of the passwd command are audited.CIS Amazon Linux 2 STIG v1.0.0 L3Unix

AUDIT AND ACCOUNTABILITY

4.1.2.2 Ensure auditing of the unix_chkpwd commandCIS Amazon Linux 2 STIG v1.0.0 L3Unix

AUDIT AND ACCOUNTABILITY

4.1.2.3 Ensure audit of the gpasswd commandCIS Amazon Linux 2 STIG v1.0.0 L3Unix

AUDIT AND ACCOUNTABILITY

4.1.2.4 Ensure audit all uses of chageCIS Amazon Linux 2 STIG v1.0.0 L3Unix

AUDIT AND ACCOUNTABILITY

4.1.2.5 Ensure audit all uses of the newgrp command.CIS Amazon Linux 2 STIG v1.0.0 L3Unix

AUDIT AND ACCOUNTABILITY

4.1.2.6 Ensure audit all uses of the chsh command.CIS Amazon Linux 2 STIG v1.0.0 L3Unix

AUDIT AND ACCOUNTABILITY

4.1.2.8 Ensure audit of postdrop commandCIS Amazon Linux 2 STIG v1.0.0 L3Unix

AUDIT AND ACCOUNTABILITY

4.1.2.9 Ensure audit of postqueue command.CIS Amazon Linux 2 STIG v1.0.0 L3Unix

AUDIT AND ACCOUNTABILITY

4.1.2.10 Ensure audit ssh-keysign command.CIS Amazon Linux 2 STIG v1.0.0 L3Unix

AUDIT AND ACCOUNTABILITY

4.1.2.11 Ensure audit of crontab commandCIS Amazon Linux 2 STIG v1.0.0 L3Unix

AUDIT AND ACCOUNTABILITY

4.1.2.12 Ensure audit pam_timestamp_check commandCIS Amazon Linux 2 STIG v1.0.0 L3Unix

AUDIT AND ACCOUNTABILITY

4.1.2.20 Ensure audit of the setsebool command.CIS Amazon Linux 2 STIG v1.0.0 L3Unix

AUDIT AND ACCOUNTABILITY

4.1.2.24 Ensure audit of the su commandCIS Amazon Linux 2 STIG v1.0.0 L3Unix

AUDIT AND ACCOUNTABILITY

5.1.8 Ensure at/cron is restricted to authorized users - cron.allow existCIS Amazon Linux 2 STIG v1.0.0 L1Unix

CONFIGURATION MANAGEMENT

5.2.27 Ensure SSH does not permit GSSAPICIS Amazon Linux 2 STIG v1.0.0 L3Unix

CONFIGURATION MANAGEMENT

5.2.30 Ensure SSH uses privilege seperationCIS Amazon Linux 2 STIG v1.0.0 L3Unix

CONFIGURATION MANAGEMENT

5.2.31 Ensure SSH compressions setting is delayed.CIS Amazon Linux 2 STIG v1.0.0 L3Unix

CONFIGURATION MANAGEMENT

5.4.7 Ensure users must re-autenticate for privilege escalationCIS Amazon Linux 2 STIG v1.0.0 L3Unix

ACCESS CONTROL

5.4.11 Ensure password prohibited reuse is at a minimum 5CIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIGUnix

IDENTIFICATION AND AUTHENTICATION

5.7 Ensure multi-factor authentication is enable for users - enabledCIS Amazon Linux 2 STIG v1.0.0 L3Unix

IDENTIFICATION AND AUTHENTICATION

5.7 Ensure multi-factor authentication is enable for users - moduleCIS Amazon Linux 2 STIG v1.0.0 L3Unix

IDENTIFICATION AND AUTHENTICATION

5.7 Ensure multi-factor authentication is enable for users - removal actionCIS Amazon Linux 2 STIG v1.0.0 L3Unix

IDENTIFICATION AND AUTHENTICATION

6.2.22 Ensure local interactive user is a member of the group owner.CIS Amazon Linux 2 STIG v1.0.0 L3Unix

CONFIGURATION MANAGEMENT

6.2.24 Ensure local interactive users' dot files are group-owned by the users group or root.CIS Amazon Linux 2 STIG v1.0.0 L3Unix

CONFIGURATION MANAGEMENT

7.1 Ensure mod_ssl and/or mod_nss Is InstalledCIS Apache HTTP Server 2.2 L2 v3.6.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION

CIS_Red_Hat_EL8_Server_L1_v3.0.0.audit from CIS Red Hat Enterprise Linux 8 Benchmark v3.0.0CIS Red Hat EL8 Server L1 v3.0.0Unix
CIS_Red_Hat_EL8_Server_L2_v3.0.0.audit from CIS Red Hat Enterprise Linux 8 Benchmark v3.0.0CIS Red Hat EL8 Server L2 v3.0.0Unix
CIS_Red_Hat_EL8_Workstation_L1_v3.0.0.audit from CIS Red Hat Enterprise Linux 8 Benchmark v3.0.0CIS Red Hat EL8 Workstation L1 v3.0.0Unix
CIS_Red_Hat_EL8_Workstation_L2_v3.0.0.audit from CIS Red Hat Enterprise Linux 8 Benchmark v3.0.0CIS Red Hat EL8 Workstation L2 v3.0.0Unix
DISA_Red_Hat_Enterprise_Linux_8_STIG_v2r3.audit from DISA Red Hat Enterprise Linux 8 STIG v2r3DISA Red Hat Enterprise Linux 8 STIG v2r3Unix
DISA_Red_Hat_Enterprise_Linux_9_STIG_v2r4.audit from DISA Red Hat Enterprise Linux 9 STIG v2r4DISA Red Hat Enterprise Linux 9 STIG v2r4Unix
DISA_STIG_Red_Hat_Enterprise_Linux_7_v3r15.audit from DISA Red Hat Enterprise Linux 7 v3r15 STIGDISA Red Hat Enterprise Linux 7 STIG v3r15Unix
DISA_STIG_RHEL_5_v1r18.audit from DISA Red Hat Enterprise Linux 5 STIG v1r18DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix
DISA_STIG_RHEL_6_v2r2.audit from DISA Red Hat Enterprise Linux 6 v2r2 STIGDISA Red Hat Enterprise Linux 6 STIG v2r2Unix
RHEL-07-020210 - The Red Hat Enterprise Linux operating system must enable SELinux.DISA Red Hat Enterprise Linux 7 STIG v3r15Unix

ACCESS CONTROL, SYSTEM AND INFORMATION INTEGRITY