Item Search

NameAudit NamePluginCategory
2.3 Ensure authentication is enabled in the sharded clusterCIS MongoDB 3.2 L1 Unix Audit v1.0.0Unix

IDENTIFICATION AND AUTHENTICATION

2.4 Ensure an industry standard authentication mechanism is used - authorizationCIS MongoDB 3.2 L2 Unix Audit v1.0.0Unix

IDENTIFICATION AND AUTHENTICATION

2.4 Ensure an industry standard authentication mechanism is used - modeCIS MongoDB 3.2 L2 Unix Audit v1.0.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION

3.1.6 Ensure the log file permissions are set correctlyCIS PostgreSQL 10 DB v1.0.0PostgreSQLDB

ACCESS CONTROL

3.1.6 Ensure the log file permissions are set correctlyCIS PostgreSQL 9.5 DB v1.1.0PostgreSQLDB

ACCESS CONTROL

3.6 Review Superuser/Admin Roles - userAdminCIS MongoDB 3.2 Database Audit L2 v1.0.0MongoDB

ACCESS CONTROL

5.1 Ensure that system activity is auditedCIS MongoDB 3.2 L1 Windows Audit v1.0.0Windows

AUDIT AND ACCOUNTABILITY

5.2 Ensure that audit filters are configured properlyCIS MongoDB 3.2 L1 Unix Audit v1.0.0Unix

AUDIT AND ACCOUNTABILITY

5.2.4.1 Ensure the audit log directory is 0750 or more restrictiveCIS Oracle Linux 7 v4.0.0 L2 WorkstationUnix

ACCESS CONTROL, MEDIA PROTECTION

5.2.4.1 Ensure the audit log directory is 0750 or more restrictiveCIS CentOS Linux 7 v4.0.0 L2 WorkstationUnix

ACCESS CONTROL, MEDIA PROTECTION

5.2.4.4 Ensure the audit log directory is 0750 or more restrictiveCIS Amazon Linux 2023 Server L2 v1.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

5.9 Ensure the Guest Home Folder Does Not ExistCIS Apple macOS 14.0 Sonoma v2.1.0 L1Unix

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

5.10 Ensure the Guest Home Folder Does Not ExistCIS Apple macOS 13.0 Ventura v3.1.0 L1Unix

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

6.1 Mongodb Database Running with Least PrivilegesCIS MongoDB 3.2 L1 Unix Audit v1.0.0Unix

ACCESS CONTROL

6.2.4.4 Ensure the audit log file directory mode is configuredCIS Ubuntu Linux 24.04 LTS v1.0.0 L2 ServerUnix

ACCESS CONTROL, MEDIA PROTECTION

6.2.4.4 Ensure the audit log file directory mode is configuredCIS Debian Linux 12 v1.1.0 L2 ServerUnix

ACCESS CONTROL, MEDIA PROTECTION

6.3 Ensure that operating system resource limits are set for MongoDBCIS MongoDB 3.2 L2 Unix Audit v1.0.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION

6.3.4.1 Ensure the audit log file directory mode is configuredCIS Rocky Linux 9 v2.0.0 L2 WorkstationUnix

ACCESS CONTROL, MEDIA PROTECTION

6.3.4.1 Ensure the audit log file directory mode is configuredCIS Oracle Linux 9 v2.0.0 L2 ServerUnix

ACCESS CONTROL, MEDIA PROTECTION

6.3.4.4 Ensure the audit log file directory mode is configuredCIS Ubuntu Linux 22.04 LTS v2.0.0 L2 WorkstationUnix

ACCESS CONTROL, MEDIA PROTECTION

6.4.4.4 Ensure the audit log file directory mode is configuredCIS Debian Linux 11 v2.0.0 L2 ServerUnix

ACCESS CONTROL, MEDIA PROTECTION

7.1 Ensure that key file permissions are set correctlyCIS MongoDB 3.2 L1 Unix Audit v1.0.0Unix

CONFIGURATION MANAGEMENT

7.1 Ensure that key file permissions are set correctlyCIS MongoDB 3.2 L1 Windows Audit v1.0.0Windows

CONFIGURATION MANAGEMENT

7.2 Ensure that database file permissions are set correctlyCIS MongoDB 3.2 L1 Windows Audit v1.0.0Windows

CONFIGURATION MANAGEMENT

Event Logging is not available or enabled - Event Logging category checks not performedTNS Fortigate FortiOS Best Practices v2.0.0FortiGate

AUDIT AND ACCOUNTABILITY

F5BI-AP-000153 - The BIG-IP APM module access policy profile must control remote access methods to virtual servers.DISA F5 BIG-IP Access Policy Manager STIG v2r4F5

ACCESS CONTROL

O112-C2-003500 - The DBMS must restrict grants to sensitive information to authorized user roles.DISA STIG Oracle 11.2g v2r5 DatabaseOracleDB

ACCESS CONTROL

PPS9-00-001200 - The EDB Postgres Advanced Server must generate audit records when privileges/permissions are retrieved.EDB PostgreSQL Advanced Server DB Audit v2r3PostgreSQLDB

AUDIT AND ACCOUNTABILITY

PPS9-00-001800 - The EDB Postgres Advanced Server must produce audit records containing sufficient information to establish where the events occurred.EDB PostgreSQL Advanced Server DB Audit v2r3PostgreSQLDB

AUDIT AND ACCOUNTABILITY

PPS9-00-002100 - The EDB Postgres Advanced Server must produce audit records containing sufficient information to establish the identity of any user/subject or process associated with the event.EDB PostgreSQL Advanced Server DB Audit v2r3PostgreSQLDB

AUDIT AND ACCOUNTABILITY

PPS9-00-002200 - The EDB Postgres Advanced Server must include additional, more detailed, organization-defined information in the audit records for audit events identified by type, location, or subject.EDB PostgreSQL Advanced Server DB Audit v2r3PostgreSQLDB

AUDIT AND ACCOUNTABILITY

PPS9-00-003700 - Default, demonstration and sample databases, database objects, and applications must be removed.EDB PostgreSQL Advanced Server DB Audit v2r3PostgreSQLDB

CONFIGURATION MANAGEMENT

PPS9-00-006400 - The EDB Postgres Advanced Server and associated applications, when making use of dynamic code execution, must scan input data for invalid values that may indicate a code injection attack.EDB PostgreSQL Advanced Server DB Audit v2r3PostgreSQLDB

SYSTEM AND INFORMATION INTEGRITY

PPS9-00-006500 - The EDB Postgres Advanced Server must provide non-privileged users with error messages that provide information necessary for corrective actions without revealing information that could be exploited by adversaries.EDB PostgreSQL Advanced Server DB Audit v2r3PostgreSQLDB

SYSTEM AND INFORMATION INTEGRITY

PPS9-00-007100 - The EDB Postgres Advanced Server must associate organization-defined types of security labels having organization-defined security label values with information in transmission.EDB PostgreSQL Advanced Server DB Audit v2r3PostgreSQLDB

ACCESS CONTROL

PPS9-00-007510 - Execution of software modules (to include stored procedures, functions, and triggers) with elevated privileges must be restricted to necessary cases only.EDB PostgreSQL Advanced Server DB Audit v2r3PostgreSQLDB

ACCESS CONTROL

PPS9-00-008100 - The EDB Postgres Advanced Server must provide an immediate real-time alert to appropriate support staff of all audit log failures.EDB PostgreSQL Advanced Server DB Audit v2r3PostgreSQLDB

AUDIT AND ACCOUNTABILITY

PPS9-00-010000 - The EDB Postgres Advanced Server must generate audit records when security objects are accessed.EDB PostgreSQL Advanced Server DB Audit v2r3PostgreSQLDB

AUDIT AND ACCOUNTABILITY

PPS9-00-010200 - The DBMS must generate audit records when categories of information (e.g., classification levels/security levels) are accessed.EDB PostgreSQL Advanced Server DB Audit v2r3PostgreSQLDB

AUDIT AND ACCOUNTABILITY

PPS9-00-010500 - The EDB Postgres Advanced Server must generate audit records when unsuccessful attempts to add privileges/permissions occur.EDB PostgreSQL Advanced Server DB Audit v2r3PostgreSQLDB

AUDIT AND ACCOUNTABILITY

PPS9-00-011300 - The EDB Postgres Advanced Server must generate audit records when unsuccessful attempts to delete privileges/permissions occur.EDB PostgreSQL Advanced Server DB Audit v2r3PostgreSQLDB

AUDIT AND ACCOUNTABILITY

PPS9-00-012100 - The EDB Postgres Advanced Server must generate audit records when unsuccessful attempts to execute privileged activities or other system-level access occur.EDB PostgreSQL Advanced Server DB Audit v2r3PostgreSQLDB

AUDIT AND ACCOUNTABILITY

PPS9-00-012200 - The EDB Postgres Advanced Server must generate audit records showing starting and ending time for user access to the database(s) - s.EDB PostgreSQL Advanced Server DB Audit v2r3PostgreSQLDB

AUDIT AND ACCOUNTABILITY

PPS9-00-012400 - The EDB Postgres Advanced Server must be able to generate audit records when successful accesses to objects occur.EDB PostgreSQL Advanced Server DB Audit v2r3PostgreSQLDB

AUDIT AND ACCOUNTABILITY

PPS9-00-012500 - The EDB Postgres Advanced Server must generate audit records when unsuccessful accesses to objects occur.EDB PostgreSQL Advanced Server DB Audit v2r3PostgreSQLDB

AUDIT AND ACCOUNTABILITY

PPS9-00-012600 - The EDB Postgres Advanced Server must generate audit records for all direct access to the database(s).EDB PostgreSQL Advanced Server DB Audit v2r3PostgreSQLDB

AUDIT AND ACCOUNTABILITY

SLES-12-010540 - The SUSE operating system file integrity tool must be configured to protect the integrity of the audit tools.DISA SLES 12 STIG v3r2Unix

AUDIT AND ACCOUNTABILITY

The device does not appear to support or is not configured for administrative password policy settings.TNS Fortigate FortiOS Best Practices v2.0.0FortiGate

IDENTIFICATION AND AUTHENTICATION

UBTU-16-010550 - The Ubuntu operating system must use cryptographic mechanisms to protect the integrity of audit tools - auditdDISA STIG Ubuntu 16.04 LTS v2r3Unix

AUDIT AND ACCOUNTABILITY

UBTU-22-653060 - Ubuntu 22.04 LTS must be configured so that the audit log directory is not write-accessible by unauthorized users.DISA Canonical Ubuntu 22.04 LTS STIG v2r4Unix

AUDIT AND ACCOUNTABILITY