Item Search

NameAudit NamePluginCategory
1.1.1.3 Ensure mounting of jffs2 filesystems is disabledCIS Ubuntu Linux 18.04 LTS v2.2.0 L1 WorkstationUnix

CONFIGURATION MANAGEMENT

1.1.1.3 Ensure mounting of jffs2 filesystems is disabled (lsmod)CIS Ubuntu Linux 14.04 LTS Workstation L1 v2.1.0Unix

CONFIGURATION MANAGEMENT

1.1.1.5 Ensure jffs2 kernel module is not availableCIS Oracle Linux 7 v4.0.0 L1 ServerUnix

CONFIGURATION MANAGEMENT

1.1.1.5 Ensure jffs2 kernel module is not availableCIS Oracle Linux 7 v4.0.0 L1 WorkstationUnix

CONFIGURATION MANAGEMENT

1.1.1.5 Ensure jffs2 kernel module is not availableCIS CentOS Linux 7 v4.0.0 L1 WorkstationUnix

CONFIGURATION MANAGEMENT

1.1.1.5 Ensure jffs2 kernel module is not availableCIS Debian Linux 12 v1.1.0 L1 WorkstationUnix

CONFIGURATION MANAGEMENT

1.1.1.5 Ensure jffs2 kernel module is not availableCIS Red Hat EL8 Server L1 v3.0.0Unix

CONFIGURATION MANAGEMENT

1.1.1.5 Ensure jffs2 kernel module is not availableCIS Red Hat EL8 Workstation L1 v3.0.0Unix

CONFIGURATION MANAGEMENT

1.1.1.5 Ensure jffs2 kernel module is not availableCIS Oracle Linux 9 v2.0.0 L1 ServerUnix

CONFIGURATION MANAGEMENT

1.1.1.5 Ensure jffs2 kernel module is not availableCIS Oracle Linux 9 v2.0.0 L1 WorkstationUnix

CONFIGURATION MANAGEMENT

1.4.1 Ensure bootloader password is setCIS Red Hat Enterprise Linux 7 STIG v2.0.0 L1 ServerUnix

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

1.4.1 Ensure bootloader password is set - password efi grubCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIGUnix

ACCESS CONTROL

1.13.3.1.2 Ensure 'Display Level 1 attachments' is set to DisabledCIS Microsoft Office Outlook 2013 v1.1.0 Level 1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

1.13.3.1.2 Ensure 'Display Level 1 attachments' is set to DisabledCIS Microsoft Office Outlook 2016 v1.1.0 Level 1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

2.20 Disable Mounting of jffs2 FilesystemsCIS Debian Linux 7 L2 v1.0.0Unix

CONFIGURATION MANAGEMENT

3.3.3 Ensure network interfaces are not in promiscuous modeCIS Amazon Linux 2 STIG v2.0.0 STIGUnix

CONFIGURATION MANAGEMENT

3.3.8 Ensure Reverse Path Filtering is enabledCIS Amazon Linux 2 STIG v2.0.0 STIGUnix

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

3.5.1.4 Ensure firewalld service enabled and runningCIS Amazon Linux 2 STIG v2.0.0 STIGUnix

SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION

3.5.3.2.3 Ensure iptables rules exist for all open portsCIS Amazon Linux 2 STIG v2.0.0 STIGUnix

SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION

4.1.2.3 Ensure audit system is set to single when the disk is full.CIS Amazon Linux 2 STIG v2.0.0 STIGUnix

AUDIT AND ACCOUNTABILITY

4.1.2.9 Ensure audit logs on separate system are encrypted.CIS Amazon Linux 2 STIG v2.0.0 STIGUnix

AUDIT AND ACCOUNTABILITY

4.1.3.13 Ensure login and logout events are collectedCIS Amazon Linux 2 STIG v2.0.0 STIGUnix

AUDIT AND ACCOUNTABILITY

4.1.3.15 Ensure all uses of the passwd command are audited.CIS Amazon Linux 2 STIG v2.0.0 STIGUnix

AUDIT AND ACCOUNTABILITY

4.1.3.23 Ensure audit ssh-keysign command.CIS Amazon Linux 2 STIG v2.0.0 STIGUnix

AUDIT AND ACCOUNTABILITY

4.1.3.24 Ensure audit of crontab commandCIS Amazon Linux 2 STIG v2.0.0 STIGUnix

AUDIT AND ACCOUNTABILITY

4.1.3.25 Ensure audit of kmod commandCIS Amazon Linux 2 STIG v2.0.0 STIGUnix

AUDIT AND ACCOUNTABILITY

4.1.3.27 Ensure audit of unlink syscallCIS Amazon Linux 2 STIG v2.0.0 STIGUnix

AUDIT AND ACCOUNTABILITY

4.1.3.28 Ensure audit unlinkat syscallCIS Amazon Linux 2 STIG v2.0.0 STIGUnix

AUDIT AND ACCOUNTABILITY

4.1.3.30 Ensure audit of the finit_module syscallCIS Amazon Linux 2 STIG v2.0.0 STIGUnix

AUDIT AND ACCOUNTABILITY

4.1.3.38 Ensure audit of the su commandCIS Amazon Linux 2 STIG v2.0.0 STIGUnix

AUDIT AND ACCOUNTABILITY

5.2.6 Ensure the sudoers file restricts sudo access to authorized personnelCIS Amazon Linux 2 STIG v2.0.0 STIGUnix

ACCESS CONTROL

5.3.19 Ensure SSH Idle Timeout Interval is configuredCIS Amazon Linux 2 STIG v2.0.0 STIGUnix

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

5.3.32 Ensure SSH performs checks of home directory configuration filesCIS Amazon Linux 2 STIG v2.0.0 STIGUnix

CONFIGURATION MANAGEMENT

5.4.1 Ensure password creation requirements are configuredCIS Amazon Linux 2 STIG v2.0.0 STIGUnix

IDENTIFICATION AND AUTHENTICATION

5.5.1.8 Ensure password expiration is 60 Day maximum for existing passwordsCIS Amazon Linux 2 STIG v2.0.0 STIGUnix

IDENTIFICATION AND AUTHENTICATION

5.5.8 Ensure Default user umask is 077CIS Amazon Linux 2 STIG v2.0.0 STIGUnix

ACCESS CONTROL, MEDIA PROTECTION

5.5.10 Ensure upon user creation a home directory is assigned.CIS Amazon Linux 2 STIG v2.0.0 STIGUnix

ACCESS CONTROL, MEDIA PROTECTION

6.1.1 Audit system file permissionsCIS Amazon Linux 2 STIG v2.0.0 STIGUnix

ACCESS CONTROL, MEDIA PROTECTION

6.2.13 Ensure users' home directories permissions are 750 or more restrictiveCIS Amazon Linux 2 STIG v2.0.0 STIGUnix

ACCESS CONTROL, MEDIA PROTECTION

6.2.19 Ensure all local interactive user home directories are group-ownedCIS Amazon Linux 2 STIG v2.0.0 STIGUnix

ACCESS CONTROL, MEDIA PROTECTION

6.2.24 Ensure local interactive users' dot files are group-owned by the users group or root.CIS Amazon Linux 2 STIG v2.0.0 STIGUnix

ACCESS CONTROL, MEDIA PROTECTION

6.12 Set Default Screen Lock for GNOME Users - lockTimeout = 0CIS Solaris 11.2 L1 v1.1.0Unix

ACCESS CONTROL

6.12 Set Default Screen Lock for GNOME Users - timeout = 10CIS Solaris 11.1 L1 v1.0.0Unix

ACCESS CONTROL

18.8.36.2 Ensure 'Configure Solicited Remote Assistance' is set to 'Disabled'CIS Azure Compute Microsoft Windows Server 2022 v1.0.0 L1 MSWindows

CONFIGURATION MANAGEMENT

Big Sur - Out of Scope SupplementalNIST macOS Big Sur v1.4.0 - All ProfilesUnix

CONFIGURATION MANAGEMENT

Catalina - Configure Apple System Log Files To Mode 640 or Less PermissiveNIST macOS Catalina v1.5.0 - All ProfilesUnix

SYSTEM AND INFORMATION INTEGRITY

CISC-L2-000230 - The Cisco switch must have the default VLAN pruned from all trunk ports that do not require it.DISA Cisco NX OS Switch L2S STIG v3r2Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

Monterey - Configure Apple System Log Files To Mode 640 or Less PermissiveNIST macOS Monterey v1.0.0 - 800-53r5 ModerateUnix

SYSTEM AND INFORMATION INTEGRITY

MYS8-00-006200 - The MySQL Database Server 8.0 must use NIST FIPS 140-2 or 140-3 validated cryptographic modules for cryptographic operations.DISA Oracle MySQL 8.0 v2r2 DBMySQLDB

IDENTIFICATION AND AUTHENTICATION

SQL6-D0-008700 - SQL Server must use NIST FIPS 140-2 or 140-3 validated cryptographic modules for cryptographic operations.DISA STIG SQL Server 2016 Instance OS Audit v3r4Windows

IDENTIFICATION AND AUTHENTICATION