Item Search

NameAudit NamePluginCategory
3.2 Ensure that MongoDB only listens for network connections on authorized interfacesCIS MongoDB 3.2 L1 Windows Audit v1.0.0Windows

CONFIGURATION MANAGEMENT

3.5 Review User-Defined RolesCIS MongoDB 3.2 Database Audit L2 v1.0.0MongoDB

ACCESS CONTROL

4.1 Ensure TLS or SSL protects all network communicationsCIS MongoDB 3.2 L1 Windows Audit v1.0.0Windows

SYSTEM AND COMMUNICATIONS PROTECTION

4.2 Ensure Federal Information Processing Standard (FIPS) is enabledCIS MongoDB 3.2 L1 Windows Audit v1.0.0Windows

SYSTEM AND COMMUNICATIONS PROTECTION

5.2.4.1 Ensure the audit log directory is 0750 or more restrictiveCIS CentOS Linux 7 v4.0.0 L2 ServerUnix

ACCESS CONTROL, MEDIA PROTECTION

5.2.4.1 Ensure the audit log directory is 0750 or more restrictiveCIS Amazon Linux 2 v3.0.0 L2Unix

ACCESS CONTROL, MEDIA PROTECTION

5.2.4.1 Ensure the audit log directory is 0750 or more restrictiveCIS AlmaLinux OS 8 Workstation L2 v3.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

5.2.4.1 Ensure the audit log directory is 0750 or more restrictiveCIS Red Hat EL8 Server L2 v3.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

5.2.4.1 Ensure the audit log directory is 0750 or more restrictiveCIS Rocky Linux 8 Workstation L2 v2.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

5.2.4.4 Ensure the audit log directory is 0750 or more restrictiveCIS Ubuntu Linux 18.04 LTS v2.2.0 L2 ServerUnix

ACCESS CONTROL, MEDIA PROTECTION

5.2.4.11 Ensure cryptographic mechanisms are used to protect the integrity of audit toolsCIS Ubuntu Linux 18.04 LTS v2.2.0 L1 WorkstationUnix

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

5.2.4.11 Ensure cryptographic mechanisms are used to protect the integrity of audit toolsCIS Debian 10 Server L1 v2.0.0Unix

SYSTEM AND INFORMATION INTEGRITY

5.2.4.11 Ensure cryptographic mechanisms are used to protect the integrity of audit toolsCIS Ubuntu Linux 18.04 LTS v2.2.0 L1 ServerUnix

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

5.3 Ensure that logging captures as much information as possibleCIS MongoDB 3.2 L2 Unix Audit v1.0.0Unix

AUDIT AND ACCOUNTABILITY

5.3.3 Ensure cryptographic mechanisms are used to protect the integrity of audit toolsCIS Red Hat EL8 Workstation L1 v3.0.0Unix

SYSTEM AND INFORMATION INTEGRITY

5.3.3 Ensure cryptographic mechanisms are used to protect the integrity of audit toolsCIS Rocky Linux 8 Workstation L1 v2.0.0Unix

SYSTEM AND INFORMATION INTEGRITY

5.3.3 Ensure cryptographic mechanisms are used to protect the integrity of audit toolsCIS Oracle Linux 8 Workstation L1 v3.0.0Unix

SYSTEM AND INFORMATION INTEGRITY

5.3.3 Ensure cryptographic mechanisms are used to protect the integrity of audit toolsCIS Red Hat EL8 Server L1 v3.0.0Unix

SYSTEM AND INFORMATION INTEGRITY

5.3.3 Ensure cryptographic mechanisms are used to protect the integrity of audit toolsCIS Rocky Linux 8 Server L1 v2.0.0Unix

SYSTEM AND INFORMATION INTEGRITY

5.4 Ensure that new entries are appended to the end of the log fileCIS MongoDB 3.2 L2 Unix Audit v1.0.0Unix

AUDIT AND ACCOUNTABILITY

6.1.3 Ensure cryptographic mechanisms are used to protect the integrity of audit toolsCIS Oracle Linux 9 v2.0.0 L1 ServerUnix

SYSTEM AND INFORMATION INTEGRITY

6.1.3 Ensure cryptographic mechanisms are used to protect the integrity of audit toolsCIS Red Hat Enterprise Linux 9 v2.0.0 L1 ServerUnix

SYSTEM AND INFORMATION INTEGRITY

6.1.3 Ensure cryptographic mechanisms are used to protect the integrity of audit toolsCIS SUSE Linux Enterprise 15 v2.0.1 L1 WorkstationUnix

SYSTEM AND INFORMATION INTEGRITY

6.1.3 Ensure cryptographic mechanisms are used to protect the integrity of audit toolsCIS Rocky Linux 9 v2.0.0 L1 WorkstationUnix

SYSTEM AND INFORMATION INTEGRITY

6.1.3 Ensure cryptographic mechanisms are used to protect the integrity of audit toolsCIS Debian Linux 11 v2.0.0 L2 WorkstationUnix

SYSTEM AND INFORMATION INTEGRITY

6.1.3 Ensure cryptographic mechanisms are used to protect the integrity of audit toolsCIS Rocky Linux 9 v2.0.0 L1 ServerUnix

SYSTEM AND INFORMATION INTEGRITY

6.1.3 Ensure cryptographic mechanisms are used to protect the integrity of audit toolsCIS AlmaLinux OS 9 v2.0.0 L1 ServerUnix

SYSTEM AND INFORMATION INTEGRITY

6.1.3 Ensure cryptographic mechanisms are used to protect the integrity of audit toolsCIS Oracle Linux 9 v2.0.0 L1 WorkstationUnix

SYSTEM AND INFORMATION INTEGRITY

6.2.4.4 Ensure the audit log file directory mode is configuredCIS Ubuntu Linux 24.04 LTS v1.0.0 L2 WorkstationUnix

ACCESS CONTROL, MEDIA PROTECTION

6.3 Ensure that operating system resource limits are set for MongoDBCIS MongoDB 3.2 L2 Windows Audit v1.0.0Windows

SYSTEM AND COMMUNICATIONS PROTECTION

6.4 Ensure that server-side scripting is disabled if not neededCIS MongoDB 3.2 L2 Windows Audit v1.0.0Windows

CONFIGURATION MANAGEMENT

6.4.4.4 Ensure the audit log file directory mode is configuredCIS Debian Linux 11 v2.0.0 L2 WorkstationUnix

ACCESS CONTROL, MEDIA PROTECTION

7.2 Ensure that database file permissions are set correctlyCIS MongoDB 3.2 L1 Unix Audit v1.0.0Unix

CONFIGURATION MANAGEMENT

Fortigate - AAA - TACACS+ server is trustedTNS Fortigate FortiOS Best Practices v2.0.0FortiGate

IDENTIFICATION AND AUTHENTICATION

Fortigate - SNMP v3 auth-priv is not enabledTNS Fortigate FortiOS Best Practices v2.0.0FortiGate

CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

PPS9-00-000900 - The EDB Postgres Advanced Server must protect against a user falsely repudiating having performed organization-defined actions.EDB PostgreSQL Advanced Server DB Audit v2r3PostgreSQLDB

AUDIT AND ACCOUNTABILITY

PPS9-00-001900 - The EDB Postgres Advanced Server must produce audit records containing sufficient information to establish the sources (origins) of the events - origins of the events.EDB PostgreSQL Advanced Server DB Audit v2r3PostgreSQLDB

AUDIT AND ACCOUNTABILITY

PPS9-00-004100 - The EDB Postgres Advanced Server must be configured to prohibit or restrict the use of organization-defined functions, ports, protocols, and/or services, as defined in the PPSM CAL and vulnerability assessments.EDB PostgreSQL Advanced Server DB Audit v2r3PostgreSQLDB

CONFIGURATION MANAGEMENT

PPS9-00-004820 - When using command-line tools such as psql, users must use a logon method that does not expose the password.EDB PostgreSQL Advanced Server DB Audit v2r3PostgreSQLDB

IDENTIFICATION AND AUTHENTICATION

PPS9-00-005800 - The EDB Postgres Advanced Server must isolate security functions from non-security functions.EDB PostgreSQL Advanced Server DB Audit v2r3PostgreSQLDB

SYSTEM AND COMMUNICATIONS PROTECTION

PPS9-00-005900 - Database contents must be protected from unauthorized and unintended information transfer by enforcement of a data-transfer policy.EDB PostgreSQL Advanced Server DB Audit v2r3PostgreSQLDB

SYSTEM AND COMMUNICATIONS PROTECTION

PPS9-00-006200 - The EDB Postgres Advanced Server must check the validity of all data inputs except those specifically identified by the organization.EDB PostgreSQL Advanced Server DB Audit v2r3PostgreSQLDB

SYSTEM AND INFORMATION INTEGRITY

PPS9-00-006600 - The EDB Postgres Advanced Server must reveal detailed error messages only to the ISSO, ISSM, SA and DBA.EDB PostgreSQL Advanced Server DB Audit v2r3PostgreSQLDB

SYSTEM AND INFORMATION INTEGRITY

PPS9-00-007000 - The EDB Postgres Advanced Server must associate organization-defined types of security labels having organization-defined security label values with information in process.EDB PostgreSQL Advanced Server DB Audit v2r3PostgreSQLDB

ACCESS CONTROL

PPS9-00-008600 - The EDB Postgres Advanced Server must produce audit records of its enforcement of access restrictions associated with changes to the configuration of the EDB Postgres Advanced Server or database(s).EDB PostgreSQL Advanced Server DB Audit v2r3PostgreSQLDB

CONFIGURATION MANAGEMENT

PPS9-00-011200 - The EDB Postgres Advanced Server must generate audit records when privileges/permissions are deleted.EDB PostgreSQL Advanced Server DB Audit v2r3PostgreSQLDB

AUDIT AND ACCOUNTABILITY

PPS9-00-011700 - Audit records must be generated when unsuccessful attempts to delete categorized information (e.g., classification levels/security levels) occur.EDB PostgreSQL Advanced Server DB Audit v2r3PostgreSQLDB

AUDIT AND ACCOUNTABILITY

SNMP is not enabled. SNMP specific checks not performed.TNS Fortigate FortiOS Best Practices v2.0.0FortiGate

IDENTIFICATION AND AUTHENTICATION

UBTU-18-010305 - The Ubuntu operating system must be configured so that audit log files cannot be read or write-accessible by unauthorized users.DISA STIG Ubuntu 18.04 LTS v2r15Unix

AUDIT AND ACCOUNTABILITY

UBTU-18-010307 - The Ubuntu operating system must permit only authorized groups to own the audit log files.DISA STIG Ubuntu 18.04 LTS v2r15Unix

AUDIT AND ACCOUNTABILITY