Item Search

NameAudit NamePluginCategory
1.47 UBTU-24-200610CIS Ubuntu Linux 24.04 LTS STIG v1.0.0 CAT IIIUnix

ACCESS CONTROL

1.80 UBTU-22-411045CIS Ubuntu Linux 22.04 LTS STIG v1.0.0 CAT IIIUnix

ACCESS CONTROL

4.4.2.1.3 Ensure password unlock time is configuredCIS Red Hat Enterprise Linux 7 v4.0.0 L1 WorkstationUnix

ACCESS CONTROL

5.3.2 Ensure lockout for failed password attempts is configuredCIS SUSE Linux Enterprise 12 v3.2.1 L1 ServerUnix

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

5.3.3.1.1 Ensure password failed attempts lockout is configuredCIS Oracle Linux 8 v4.0.0 L1 WorkstationUnix

ACCESS CONTROL

5.3.3.1.1 Ensure password failed attempts lockout is configuredCIS Oracle Linux 9 v2.0.0 L1 ServerUnix

ACCESS CONTROL

5.3.3.1.1 Ensure password failed attempts lockout is configuredCIS Rocky Linux 9 v2.0.0 L1 ServerUnix

ACCESS CONTROL

5.3.3.1.2 Ensure password unlock time is configuredCIS Red Hat Enterprise Linux 9 v2.0.0 L1 ServerUnix

ACCESS CONTROL

5.3.3.1.2 Ensure password unlock time is configuredCIS Rocky Linux 9 v2.0.0 L1 WorkstationUnix

ACCESS CONTROL

5.3.3.1.2 Ensure password unlock time is configuredCIS Ubuntu Linux 24.04 LTS v1.0.0 L1 ServerUnix

ACCESS CONTROL

5.3.3.1.3 Ensure password failed attempts lockout includes root accountCIS Oracle Linux 8 v4.0.0 L2 WorkstationUnix

ACCESS CONTROL

5.3.3.1.3 Ensure password failed attempts lockout includes root accountCIS AlmaLinux OS 8 v4.0.0 L2 ServerUnix

ACCESS CONTROL

5.3.3.1.3 Ensure password failed attempts lockout includes root accountCIS Red Hat Enterprise Linux 9 v2.0.0 L2 WorkstationUnix

ACCESS CONTROL

5.3.3.1.3 Ensure password failed attempts lockout includes root accountCIS AlmaLinux OS 9 v2.0.0 L2 ServerUnix

ACCESS CONTROL

5.3.3.1.3 Ensure password failed attempts lockout includes root accountCIS Debian Linux 12 v1.1.0 L2 ServerUnix

ACCESS CONTROL

5.3.3.1.3 Ensure password failed attempts lockout includes root accountCIS Ubuntu Linux 24.04 LTS v1.0.0 L2 ServerUnix

ACCESS CONTROL

5.3.3.1.3 Ensure password failed attempts lockout includes root accountCIS Ubuntu Linux 24.04 LTS v1.0.0 L2 WorkstationUnix

ACCESS CONTROL

5.3.3.1.7 Ensure fail_interval is configured in /etc/security/faillock.confCIS Red Hat Enterprise Linux 8 STIG v2.0.0 STIGUnix

ACCESS CONTROL

5.3.3.1.17 Ensure even_deny_root is set in /etc/security/faillock.confCIS Red Hat Enterprise Linux 8 STIG v2.0.0 STIGUnix

ACCESS CONTROL

5.4.2 Ensure authselect includes with-faillockCIS Fedora 28 Family Linux Server L1 v2.0.0Unix

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

5.4.2 Ensure authselect includes with-faillockCIS CentOS Linux 8 Workstation L1 v2.0.0Unix

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

5.4.2 Ensure lockout for failed password attempts is configured - password-authCIS Red Hat Enterprise Linux 7 STIG v2.0.0 L1 WorkstationUnix

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

5.4.12 Ensure accounts lock for a minimum of 15 minutes after three unsuccessful logon attempts within a 15-minute timeframe - password-auth denyCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIGUnix

ACCESS CONTROL

5.4.12 Ensure accounts lock for a minimum of 15 minutes after three unsuccessful logon attempts within a 15-minute timeframe - password-auth even_deny_rootCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIGUnix

ACCESS CONTROL

5.4.12 Ensure accounts lock for a minimum of 15 minutes after three unsuccessful logon attempts within a 15-minute timeframe - password-auth fail_intervalCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIGUnix

ACCESS CONTROL

5.4.12 Ensure accounts lock for a minimum of 15 minutes after three unsuccessful logon attempts within a 15-minute timeframe - password-auth unlock_timeCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIGUnix

ACCESS CONTROL

5.4.12 Ensure accounts lock for a minimum of 15 minutes after three unsuccessful logon attempts within a 15-minute timeframe - system-auth denyCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIGUnix

ACCESS CONTROL

5.4.12 Ensure accounts lock for a minimum of 15 minutes after three unsuccessful logon attempts within a 15-minute timeframe - system-auth even_deny_rootCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIGUnix

ACCESS CONTROL

5.4.12 Ensure accounts lock for a minimum of 15 minutes after three unsuccessful logon attempts within a 15-minute timeframe - system-auth fail_intervalCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIGUnix

ACCESS CONTROL

5.4.12 Ensure accounts lock for a minimum of 15 minutes after three unsuccessful logon attempts within a 15-minute timeframe - system-auth unlock_timeCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIGUnix

ACCESS CONTROL

5.4.13 Ensure lockout for unsuccessful root logon attemptsCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIGUnix

ACCESS CONTROL

5.4.13 Ensure lockout for unsuccessful root logon attemptsCIS Amazon Linux 2 STIG v2.0.0 STIGUnix

ACCESS CONTROL

5.4.13 Ensure lockout for unsuccessful root logon attempts - password-auth defaultCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIGUnix

ACCESS CONTROL

5.4.13 Ensure lockout for unsuccessful root logon attempts - system-auth defaultCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIGUnix

ACCESS CONTROL

5.4.13 Ensure lockout for unsuccessful root logon attempts - system-auth requiredCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIGUnix

ACCESS CONTROL

6.2.3 Ensure all groups in /etc/passwd exist in /etc/groupCIS Ubuntu Linux 16.04 LTS Server L1 v2.0.0Unix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

6.2.3 Ensure all groups in /etc/passwd exist in /etc/groupCIS Ubuntu Linux 16.04 LTS Workstation L1 v2.0.0Unix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

6.2.12 Ensure all groups in /etc/passwd exist in /etc/groupCIS Debian Family Workstation L1 v1.0.0Unix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

6.2.12 Ensure all groups in /etc/passwd exist in /etc/groupCIS Debian Family Server L1 v1.0.0Unix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

6.2.15 Ensure all groups in /etc/passwd exist in /etc/groupCIS Ubuntu Linux 18.04 LXD Host L1 Server v1.0.0Unix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

6.2.15 Ensure all groups in /etc/passwd exist in /etc/groupCIS Ubuntu Linux 18.04 LXD Container L1 v1.0.0Unix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

6.2.15 Ensure all groups in /etc/passwd exist in /etc/groupCIS Ubuntu Linux 18.04 LXD Host L1 Workstation v1.0.0Unix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

9.2 Check for Duplicate User NamesCIS Oracle Solaris 11.4 L1 v1.1.0Unix

ACCESS CONTROL

9.3.1 Ensure that the Expiration Date is set for all Keys in RBAC Key VaultsCIS Microsoft Azure Foundations v4.0.0 L1microsoft_azure

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY, SYSTEM AND INFORMATION INTEGRITY

9.3.2 Ensure that the Expiration Date is set for all Keys in Non-RBAC Key Vaults.CIS Microsoft Azure Foundations v4.0.0 L1microsoft_azure

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY, SYSTEM AND INFORMATION INTEGRITY

9.3.3 Ensure that the Expiration Date is set for all Secrets in RBAC Key VaultsCIS Microsoft Azure Foundations v4.0.0 L1microsoft_azure

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY, SYSTEM AND INFORMATION INTEGRITY

9.3.4 Ensure that the Expiration Date is set for all Secrets in Non-RBAC Key VaultsCIS Microsoft Azure Foundations v4.0.0 L1microsoft_azure

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY, SYSTEM AND INFORMATION INTEGRITY

9.13 Check Groups in passwdCIS Oracle Solaris 11.4 L1 v1.1.0Unix

ACCESS CONTROL

10.3.1.2 Ensure that Storage Account access keys are periodically regeneratedCIS Microsoft Azure Foundations v4.0.0 L1microsoft_azure

ACCESS CONTROL, CONFIGURATION MANAGEMENT, MAINTENANCE

10.3.1.3 Ensure 'Allow storage account key access' for Azure Storage Accounts is 'Disabled'CIS Microsoft Azure Foundations v4.0.0 L1microsoft_azure

ACCESS CONTROL, MEDIA PROTECTION