Item Search

NameAudit NamePluginCategory
1.1.12 Ensure noexec option set on /dev/shm partitionCIS Google Container-Optimized OS v1.2.0 L1 ServerUnix

CONFIGURATION MANAGEMENT

1.1.14 Add nodev Option to /dev/shm PartitionCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

2.2.17 Ensure 'PDB_OS_CREDENTIAL' is NOT nullCIS Oracle Server 18c DB Traditional Auditing v1.1.0OracleDB

ACCESS CONTROL

5.1 Turn on inetd tracing, Check if 'ENABLE_CONNECTION_LOGGING' is set to YES in /etc/default/inetd.CIS Solaris 9 v1.3Unix

AUDIT AND ACCOUNTABILITY

5.3.4 (L1) Ensure approval is required for Global Administrator role activationCIS Microsoft 365 Foundations v5.0.0 L1 E5microsoft_azure

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

9.1.14 Find SGID System ExecutablesCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

ACCESS CONTROL

9.4 Ensure 'safRegistry' is configuredCIS IBM WebSphere Liberty v1.0.0 L1Unix

ACCESS CONTROL

AOSX-14-001020 - The macOS system must audit the enforcement actions used to restrict access associated with changes to the system.DISA STIG Apple Mac OSX 10.14 v2r6Unix

AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT

APPL-11-001020 - The macOS system must audit the enforcement actions used to restrict access associated with changes to the system - frDISA STIG Apple macOS 11 v1r8Unix

AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT

APPL-11-001020 - The macOS system must audit the enforcement actions used to restrict access associated with changes to the system - fwDISA STIG Apple macOS 11 v1r8Unix

AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT

APPL-11-001020 - The macOS system must audit the enforcement actions used to restrict access associated with changes to the system - fwDISA STIG Apple macOS 11 v1r5Unix

AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT

APPL-12-001020 - The macOS system must audit the enforcement actions used to restrict access associated with changes to the system.DISA STIG Apple macOS 12 v1r9Unix

AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT

GEN003820 - The rsh daemon must not be running.DISA STIG Solaris 10 SPARC v2r4Unix

ACCESS CONTROL

GEN003830 - The rlogind service must not be running.DISA STIG Solaris 10 X86 v2r4Unix

ACCESS CONTROL

GEN005510 - The SSH client must be configured to only use FIPS 140-2 approved ciphers.DISA STIG Solaris 10 SPARC v2r4Unix

ACCESS CONTROL

GEN005512 - The SSH client must be configured to only use Message Authentication Codes (MACs) employing FIPS 140-2 approved cryptographic hash algorithms.DISA STIG Solaris 10 X86 v2r4Unix

ACCESS CONTROL

MYS8-00-003100 - The MySQL Database Server 8.0 must generate audit records when unsuccessful attempts to modify categories of information (e.g., classification levels/security levels) occur.DISA Oracle MySQL 8.0 v2r2 DBMySQLDB

AUDIT AND ACCOUNTABILITY

MYS8-00-003700 - The MySQL Database Server 8.0 must generate audit records when unsuccessful attempts to delete categories of information (e.g., classification levels/security levels) occur.DISA Oracle MySQL 8.0 v2r2 DBMySQLDB

AUDIT AND ACCOUNTABILITY

MYS8-00-006100 - The MySQL Database Server 8.0 must uniquely identify and authenticate organizational users (or processes acting on behalf of organizational users).DISA Oracle MySQL 8.0 v2r2 DBMySQLDB

IDENTIFICATION AND AUTHENTICATION

MYS8-00-007400 - The MySQL Database Server 8.0 and associated applications must reserve the use of dynamic code execution for situations that require it.DISA Oracle MySQL 8.0 v2r2 DBMySQLDB

SYSTEM AND INFORMATION INTEGRITY

MYS8-00-008000 - The MySQL Database Server 8.0 must protect its audit features from unauthorized access.DISA Oracle MySQL 8.0 v2r2 DBMySQLDB

AUDIT AND ACCOUNTABILITY

MYS8-00-009900 - The MySQL Database Server 8.0 must provide an immediate real-time alert to appropriate support staff of all audit log failures.DISA Oracle MySQL 8.0 v2r2 DBMySQLDB

AUDIT AND ACCOUNTABILITY

MYS8-00-010500 - The MySQL Database Server 8.0 must enforce discretionary access control policies, as defined by the data owner, over defined subjects and objects.DISA Oracle MySQL 8.0 v2r2 DBMySQLDB

ACCESS CONTROL

OL07-00-020111 - The Oracle Linux operating system must disable the graphical user interface automounter unless required.DISA Oracle Linux 7 STIG v3r2Unix

CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION

OL07-00-030700 - The Oracle Linux operating system must audit all uses of the sudoers file and all files in the /etc/sudoers.d/ directory.DISA Oracle Linux 7 STIG v3r2Unix

AUDIT AND ACCOUNTABILITY

PHTN-67-000009 - The Photon operating system must configure sshd to use approved encryption algorithms.DISA STIG VMware vSphere 6.7 Photon OS v1r6Unix

ACCESS CONTROL, MAINTENANCE, SYSTEM AND COMMUNICATIONS PROTECTION

RHEL-07-021350 - The Red Hat Enterprise Linux operating system must implement NIST FIPS-validated cryptography for the following: to provision digital signatures, to generate cryptographic hashes, and to protect data requiring data-at-rest protections in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, and standards.DISA Red Hat Enterprise Linux 7 STIG v3r15Unix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

RHEL-07-030870 - The Red Hat Enterprise Linux operating system must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/passwd.DISA Red Hat Enterprise Linux 7 STIG v3r15Unix

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

SLES-12-020210 - The SUSE operating system must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/group.DISA SLES 12 STIG v3r2Unix

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

SLES-12-020220 - The SUSE operating system must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/shadow.DISA SLES 12 STIG v3r2Unix

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

SLES-12-020260 - The SUSE operating system must generate audit records for all uses of the sudo command.DISA SLES 12 STIG v3r2Unix

AUDIT AND ACCOUNTABILITY, MAINTENANCE

SLES-15-030030 - The SUSE operating system must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/security/opasswd.DISA SLES 15 STIG v2r2Unix

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

SLES-15-030140 - The SUSE operating system must audit all uses of the sudoers file and all files in the /etc/sudoers.d/ directory.DISA SLES 15 STIG v2r2Unix

AUDIT AND ACCOUNTABILITY, MAINTENANCE

SLES-15-030500 - The SUSE operating system must generate audit records for all uses of the usermod command.DISA SLES 15 STIG v2r2Unix

AUDIT AND ACCOUNTABILITY, MAINTENANCE

SOL-11.1-050240 - The boundary protection system (firewall) must be configured to deny network traffic by default and must allow network traffic by exception (i.e., deny all, permit by exception).DISA STIG Solaris 11 SPARC v3r1Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION, MAINTENANCE

SQL2-00-014600 - SQL Server must support the organizational requirement to employ automated mechanisms for enforcing access restrictions.DISA STIG SQL Server 2012 Database OS Audit v1r20Windows

CONFIGURATION MANAGEMENT

UBTU-16-020380 - Successful/unsuccessful uses of the mount command must generate an audit record - b32DISA STIG Ubuntu 16.04 LTS v2r3Unix

AUDIT AND ACCOUNTABILITY, MAINTENANCE

UBTU-16-020380 - Successful/unsuccessful uses of the mount command must generate an audit record - path=/bin/mountDISA STIG Ubuntu 16.04 LTS v2r3Unix

AUDIT AND ACCOUNTABILITY, MAINTENANCE

UBTU-16-020410 - Successful/unsuccessful uses of the ssh-keysign command must generate an audit record.DISA STIG Ubuntu 16.04 LTS v2r3Unix

AUDIT AND ACCOUNTABILITY, MAINTENANCE

UBTU-16-020460 - The audit system must be configured to audit any usage of the setxattr system call - root b64DISA STIG Ubuntu 16.04 LTS v2r3Unix

AUDIT AND ACCOUNTABILITY, MAINTENANCE

UBTU-16-020520 - Successful/unsuccessful uses of the chown command must generate an audit record - b32DISA STIG Ubuntu 16.04 LTS v2r3Unix

AUDIT AND ACCOUNTABILITY, MAINTENANCE

UBTU-16-020520 - Successful/unsuccessful uses of the chown command must generate an audit record - b64DISA STIG Ubuntu 16.04 LTS v2r3Unix

AUDIT AND ACCOUNTABILITY, MAINTENANCE

UBTU-16-020550 - Successful/unsuccessful uses of the lchown command must generate an audit record - b64DISA STIG Ubuntu 16.04 LTS v2r3Unix

AUDIT AND ACCOUNTABILITY, MAINTENANCE

UBTU-16-020580 - Successful/unsuccessful uses of the fchmodat command must generate an audit record - b64DISA STIG Ubuntu 16.04 LTS v2r3Unix

AUDIT AND ACCOUNTABILITY, MAINTENANCE

UBTU-16-020590 - Successful/unsuccessful uses of the open command must generate an audit record - EPERM b32DISA STIG Ubuntu 16.04 LTS v2r3Unix

AUDIT AND ACCOUNTABILITY, MAINTENANCE

UBTU-16-020620 - Successful/unsuccessful uses of the creat command must generate an audit record - EACCES b32DISA STIG Ubuntu 16.04 LTS v2r3Unix

AUDIT AND ACCOUNTABILITY, MAINTENANCE

UBTU-16-020620 - Successful/unsuccessful uses of the creat command must generate an audit record - EACCES b64DISA STIG Ubuntu 16.04 LTS v2r3Unix

AUDIT AND ACCOUNTABILITY, MAINTENANCE

UBTU-16-020620 - Successful/unsuccessful uses of the creat command must generate an audit record - EPERM b64DISA STIG Ubuntu 16.04 LTS v2r3Unix

AUDIT AND ACCOUNTABILITY, MAINTENANCE

UBTU-16-020630 - Successful/unsuccessful uses of the openat command must generate an audit record - EPERM b32DISA STIG Ubuntu 16.04 LTS v2r3Unix

AUDIT AND ACCOUNTABILITY, MAINTENANCE

UBTU-16-020720 - Successful/unsuccessful uses of the chacl command must generate an audit record.DISA STIG Ubuntu 16.04 LTS v2r3Unix

AUDIT AND ACCOUNTABILITY, MAINTENANCE