Item Search

NameAudit NamePluginCategory
2.2 Ensure that MongoDB does not bypass authentication via the localhost exceptionCIS MongoDB 3.6 L1 Windows Audit v1.1.0Windows

IDENTIFICATION AND AUTHENTICATION

2.4 Ensure an industry standard authentication mechanism is used - authenticationMechanismsCIS MongoDB 3.4 L2 Unix Audit v1.0.0Unix

CONFIGURATION MANAGEMENT

2.4 Ensure an industry standard authentication mechanism is used - clusterAuthModeCIS MongoDB 3.4 L2 Windows Audit v1.0.0Windows

IDENTIFICATION AND AUTHENTICATION

2.4 Ensure an industry standard authentication mechanism is used - modeCIS MongoDB 3.4 L2 Windows Audit v1.0.0Windows

IDENTIFICATION AND AUTHENTICATION

3.2 Ensure that MongoDB only listens for network connections on authorized interfacesCIS MongoDB 3.6 L1 Unix Audit v1.1.0Unix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

3.3 Ensure that MongoDB is run using a Least Privileges, dedicated service accountCIS MongoDB 3.6 L1 Unix Audit v1.1.0Unix

ACCESS CONTROL

3.5 Review User-Defined RolesCIS MongoDB 3.4 Database Audit L2 v1.0.0MongoDB

ACCESS CONTROL

3.5 Review User-Defined RolesCIS MongoDB 3.6 Database Audit L2 v1.1.0MongoDB

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

3.6 Review Superuser/Admin Roles - readWriteAnyDatabaseCIS MongoDB 3.4 Database Audit L2 v1.0.0MongoDB

ACCESS CONTROL

3.6 Review Superuser/Admin Roles - readWriteAnyDatabaseCIS MongoDB 3.6 Database Audit L1 v1.1.0MongoDB

ACCESS CONTROL

3.6 Review Superuser/Admin Roles - userAdminCIS MongoDB 3.4 Database Audit L2 v1.0.0MongoDB

ACCESS CONTROL

4.1 Ensure Encryption of Data in Transit TLS/SSL (Transport Encryption)CIS MongoDB 3.6 L1 Windows Audit v1.1.0Windows

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

5.1 Ensure that system activity is auditedCIS MongoDB 3.4 L1 Windows Audit v1.0.0Windows

AUDIT AND ACCOUNTABILITY

5.1 Ensure that system activity is auditedCIS MongoDB 3.6 L1 Windows Audit v1.1.0Windows

AUDIT AND ACCOUNTABILITY

5.2.4.8 Ensure audit tools are 755 or more restrictiveCIS Ubuntu Linux 20.04 LTS Workstation L2 v2.0.1Unix

ACCESS CONTROL, MEDIA PROTECTION

5.2.4.8 Ensure audit tools are 755 or more restrictiveCIS Ubuntu Linux 18.04 LTS v2.2.0 L2 ServerUnix

ACCESS CONTROL, MEDIA PROTECTION

5.2.4.8 Ensure audit tools are 755 or more restrictiveCIS Red Hat Enterprise Linux 7 v4.0.0 L2 ServerUnix

ACCESS CONTROL, MEDIA PROTECTION

5.2.4.8 Ensure audit tools are 755 or more restrictiveCIS Red Hat Enterprise Linux 7 v4.0.0 L2 WorkstationUnix

ACCESS CONTROL, MEDIA PROTECTION

5.2.4.9 Ensure audit tools are owned by rootCIS Debian 10 Workstation L2 v2.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

5.2.4.9 Ensure audit tools are owned by rootCIS Red Hat EL8 Server L2 v3.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

5.2.4.10 Ensure audit tools belong to group rootCIS Ubuntu Linux 20.04 LTS Workstation L2 v2.0.1Unix

ACCESS CONTROL, MEDIA PROTECTION

5.2.4.10 Ensure audit tools belong to group rootCIS Red Hat Enterprise Linux 7 v4.0.0 L2 WorkstationUnix

ACCESS CONTROL, MEDIA PROTECTION

5.2.4.10 Ensure audit tools belong to group rootCIS AlmaLinux OS 8 Server L2 v3.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

5.3 Ensure that logging captures as much information as possibleCIS MongoDB 3.4 L2 Unix Audit v1.0.0Unix

AUDIT AND ACCOUNTABILITY

5.4 Ensure that new entries are appended to the end of the log fileCIS MongoDB 3.4 L2 Unix Audit v1.0.0Unix

AUDIT AND ACCOUNTABILITY

6.2 Ensure that operating system resource limits are set for MongoDBCIS MongoDB 3.6 L2 Windows Audit v1.1.0Windows

ACCESS CONTROL, SYSTEM AND INFORMATION INTEGRITY

6.3 Ensure that operating system resource limits are set for MongoDBCIS MongoDB 3.4 L2 Windows Audit v1.0.0Windows

SYSTEM AND COMMUNICATIONS PROTECTION

6.3.4.8 Ensure audit tools mode is configuredCIS Ubuntu Linux 22.04 LTS v2.0.0 L2 ServerUnix

ACCESS CONTROL, MEDIA PROTECTION

6.3.4.9 Ensure audit tools owner is configuredCIS Oracle Linux 9 v2.0.0 L2 ServerUnix

ACCESS CONTROL, MEDIA PROTECTION

6.3.4.9 Ensure audit tools owner is configuredCIS SUSE Linux Enterprise 15 v2.0.1 L2 WorkstationUnix

ACCESS CONTROL, MEDIA PROTECTION

6.3.4.10 Ensure audit tools group owner is configuredCIS Red Hat Enterprise Linux 9 v2.0.0 L2 ServerUnix

ACCESS CONTROL, MEDIA PROTECTION

6.3.4.10 Ensure audit tools group owner is configuredCIS AlmaLinux OS 9 v2.0.0 L2 WorkstationUnix

ACCESS CONTROL, MEDIA PROTECTION

6.3.4.10 Ensure audit tools group owner is configuredCIS SUSE Linux Enterprise 15 v2.0.1 L2 WorkstationUnix

ACCESS CONTROL, MEDIA PROTECTION

6.4.4.10 Ensure audit tools group owner is configuredCIS Debian Linux 11 v2.0.0 L2 WorkstationUnix

ACCESS CONTROL, MEDIA PROTECTION

7.1 Ensure authentication file permissions are set correctlyCIS MongoDB 3.6 L1 Windows Audit v1.1.0Windows

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

7.1 Ensure that key file permissions are set correctlyCIS MongoDB 3.4 L1 Windows Audit v1.0.0Windows

CONFIGURATION MANAGEMENT

APPL-13-001010 - The macOS system must shut down by default upon audit failure (unless availability is an overriding concern).DISA STIG Apple macOS 13 v1r5Unix

AUDIT AND ACCOUNTABILITY

CD12-00-012200 - PostgreSQL must protect its audit configuration from unauthorized modification.DISA STIG Crunchy Data PostgreSQL OS v3r1Unix

AUDIT AND ACCOUNTABILITY

EP11-00-003000 - The EDB Postgres Advanced Server must protect its audit configuration from unauthorized modification.EDB PostgreSQL Advanced Server v11 Windows OS Audit v2r4Windows

AUDIT AND ACCOUNTABILITY

Fortigate - AAA - LDAP server is trustedTNS Fortigate FortiOS Best Practices v2.0.0FortiGate

IDENTIFICATION AND AUTHENTICATION

OL08-00-030090 - OL 8 audit logs must be group-owned by root to prevent unauthorized read access.DISA Oracle Linux 8 STIG v2r4Unix

AUDIT AND ACCOUNTABILITY

OL08-00-030100 - The OL 8 audit log directory must be owned by root to prevent unauthorized read access.DISA Oracle Linux 8 STIG v2r4Unix

AUDIT AND ACCOUNTABILITY

OL08-00-030110 - The OL 8 audit log directory must be group-owned by root to prevent unauthorized read access.DISA Oracle Linux 8 STIG v2r4Unix

AUDIT AND ACCOUNTABILITY

PGS9-00-011200 - PostgreSQL must protect its audit features from unauthorized removal.DISA STIG PostgreSQL 9.x on RHEL OS v2r5Unix

AUDIT AND ACCOUNTABILITY

PPS9-00-001300 - The EDB Postgres Advanced Server must generate audit records when unsuccessful attempts to retrieve privileges/permissions occur.EDB PostgreSQL Advanced Server DB Audit v2r3PostgreSQLDB

AUDIT AND ACCOUNTABILITY

PPS9-00-003100 - The EDB Postgres Advanced Server must protect its audit features from unauthorized removal.EDB PostgreSQL Advanced Server OS Linux Audit v2r3Unix

AUDIT AND ACCOUNTABILITY

UBTU-16-010550 - The Ubuntu operating system must use cryptographic mechanisms to protect the integrity of audit tools - auditctlDISA STIG Ubuntu 16.04 LTS v2r3Unix

AUDIT AND ACCOUNTABILITY

UBTU-16-010550 - The Ubuntu operating system must use cryptographic mechanisms to protect the integrity of audit tools - augenrulesDISA STIG Ubuntu 16.04 LTS v2r3Unix

AUDIT AND ACCOUNTABILITY

UBTU-20-010123 - The Ubuntu operating system must be configured to permit only authorized users ownership of the audit log files.DISA Canonical Ubuntu 20.04 LTS STIG v2r2Unix

AUDIT AND ACCOUNTABILITY

UBTU-20-010124 - The Ubuntu operating system must permit only authorized groups ownership of the audit log files.DISA Canonical Ubuntu 20.04 LTS STIG v2r2Unix

AUDIT AND ACCOUNTABILITY