Item Search

NameAudit NamePluginCategory
1.1.1.3 Ensure mounting of jffs2 filesystems is disabledCIS Ubuntu Linux 18.04 LTS v2.2.0 L1 ServerUnix

CONFIGURATION MANAGEMENT

1.1.1.5 Ensure jffs2 kernel module is not availableCIS Red Hat Enterprise Linux 7 v4.0.0 L1 ServerUnix

CONFIGURATION MANAGEMENT

1.1.1.5 Ensure jffs2 kernel module is not availableCIS Rocky Linux 9 v2.0.0 L1 ServerUnix

CONFIGURATION MANAGEMENT

1.1.1.5 Ensure jffs2 kernel module is not availableCIS Ubuntu Linux 24.04 LTS v1.0.0 L1 ServerUnix

CONFIGURATION MANAGEMENT

1.1.1.5 Ensure jffs2 kernel module is not availableCIS AlmaLinux OS 9 v2.0.0 L1 ServerUnix

CONFIGURATION MANAGEMENT

1.1.26 Ensure all world-writable directories are group-owned.CIS Amazon Linux 2 STIG v2.0.0 STIGUnix

ACCESS CONTROL, MEDIA PROTECTION

1.3.3 Ensure AIDE is configured to verify ACLsCIS Amazon Linux 2 STIG v2.0.0 STIGUnix

ACCESS CONTROL, MEDIA PROTECTION

1.3.4 Ensure AIDE is configured to verify XATTRSCIS Amazon Linux 2 STIG v2.0.0 STIGUnix

ACCESS CONTROL, MEDIA PROTECTION

1.4.3 Ensure authentication required for single user modeCIS Amazon Linux 2 STIG v2.0.0 STIGUnix

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

1.5.8 Ensure DNS is servers are configuredCIS Amazon Linux 2 STIG v2.0.0 STIGUnix

CONFIGURATION MANAGEMENT

1.8.5 Ensure users must authenticate users using MFA via a graphical user logonCIS Amazon Linux 2 STIG v2.0.0 STIGUnix

IDENTIFICATION AND AUTHENTICATION

1.8.6 Ensure GNOME Screensaver period of inactivity is configuredCIS Amazon Linux 2 STIG v2.0.0 STIGUnix

ACCESS CONTROL

1.8.14 Ensure unrestricted logon is not allowedCIS Amazon Linux 2 STIG v2.0.0 STIGUnix

IDENTIFICATION AND AUTHENTICATION

1.10 Ensure required packages for multifactor authentication are installedCIS Amazon Linux 2 STIG v2.0.0 STIGUnix

IDENTIFICATION AND AUTHENTICATION

1.12 Ensure host-based intrusion detection tool is usedCIS Amazon Linux 2 STIG v2.0.0 STIGUnix

SYSTEM AND INFORMATION INTEGRITY

2.2.26 Ensure ldap_tls_cacert is set for LDAP.CIS Amazon Linux 2 STIG v2.0.0 STIGUnix

CONFIGURATION MANAGEMENT

2.3.4 Ensure telnet client is not installedCIS Amazon Linux 2 STIG v2.0.0 STIGUnix

CONFIGURATION MANAGEMENT

2.5 Enable SSL for Network File copy (NFC)CIS VMware ESXi 5.1 v1.0.1 Level 2VMware

SYSTEM AND COMMUNICATIONS PROTECTION

3.2.1 Ensure IP forwarding is disabledCIS Amazon Linux 2 STIG v2.0.0 STIGUnix

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

3.3.1 Ensure source routed packets are not acceptedCIS Amazon Linux 2 STIG v2.0.0 STIGUnix

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

3.5.1.5 Ensure firewalld default zone is setCIS Amazon Linux 2 STIG v2.0.0 STIGUnix

SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION

4.1.2.4 Ensure system notification is sent out when volume is 75% fullCIS Amazon Linux 2 STIG v2.0.0 STIGUnix

AUDIT AND ACCOUNTABILITY

4.1.2.5 Ensure system is disabled when audit logs are fullCIS Amazon Linux 2 STIG v2.0.0 STIGUnix

AUDIT AND ACCOUNTABILITY

4.1.2.8 Ensure audit logs are stored on a different system.CIS Amazon Linux 2 STIG v2.0.0 STIGUnix

AUDIT AND ACCOUNTABILITY

4.1.3.11 Ensure unsuccessful unauthorized file access attempts are collectedCIS Amazon Linux 2 STIG v2.0.0 STIGUnix

AUDIT AND ACCOUNTABILITY

4.1.3.12 Ensure discretionary access control permission modification events are collectedCIS Amazon Linux 2 STIG v2.0.0 STIGUnix

AUDIT AND ACCOUNTABILITY

4.1.3.21 Ensure audit of postdrop commandCIS Amazon Linux 2 STIG v2.0.0 STIGUnix

AUDIT AND ACCOUNTABILITY

4.1.3.29 Ensure audit pam_timestamp_check commandCIS Amazon Linux 2 STIG v2.0.0 STIGUnix

AUDIT AND ACCOUNTABILITY

4.1.3.31 Ensure audit of the create_module syscallCIS Amazon Linux 2 STIG v2.0.0 STIGUnix

AUDIT AND ACCOUNTABILITY

4.1.3.34 Ensure audit of the setsebool command.CIS Amazon Linux 2 STIG v2.0.0 STIGUnix

AUDIT AND ACCOUNTABILITY

5.1.8 Ensure cron is restricted to authorized usersCIS Amazon Linux 2 STIG v2.0.0 STIGUnix

ACCESS CONTROL, MEDIA PROTECTION

5.2.8 Ensure users password required for privilege escalation when using sudoCIS Amazon Linux 2 STIG v2.0.0 STIGUnix

ACCESS CONTROL

5.4.11 Ensure password prohibited reuse is at a minimum 5CIS Amazon Linux 2 STIG v2.0.0 STIGUnix

IDENTIFICATION AND AUTHENTICATION

5.6 Remove keys from SSH authorized_keys fileCIS VMware ESXi 5.5 v1.2.0 Level 2VMware

SYSTEM AND INFORMATION INTEGRITY

5.11 Ensure contents of exposed configuration files have not been modifiedCIS VMware ESXi 6.7 v1.3.0 Level 2VMware

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

6.4 Ensure VMDK files are zeroed out prior to deletionCIS VMware ESXi 6.5 v1.0.0 Level 2VMware
8.1.2 Ensure only one remote console connection is permitted to a VM at any timeCIS VMware ESXi 6.5 v1.0.0 Level 2VMware

SYSTEM AND INFORMATION INTEGRITY

8.2.2 Disconnect unauthorized devices - CD/DVD DevicesCIS VMware ESXi 5.5 v1.2.0 Level 2VMware
8.2.2 Ensure unnecessary CD/DVD devices are disconnectedCIS VMware ESXi 6.7 v1.3.0 Level 2VMware

CONFIGURATION MANAGEMENT

8.4.26 Ensure all but VGA mode on virtual machines is disabledCIS VMware ESXi 6.7 v1.3.0 Level 2VMware

CONFIGURATION MANAGEMENT

8.4.29 Ensure all but VGA mode on virtual machines is disabledCIS VMware ESXi 6.5 v1.0.0 Level 2VMware

SYSTEM AND INFORMATION INTEGRITY

8.5.1 Ensure VM limits are configured correctly - Mem Share LevelCIS VMware ESXi 6.5 v1.0.0 Level 2VMware

SYSTEM AND COMMUNICATIONS PROTECTION

8.6.1 Ensure nonpersistent disks are limitedCIS VMware ESXi 6.5 v1.0.0 Level 2VMware

AUDIT AND ACCOUNTABILITY

8.6.1 Ensure nonpersistent disks are limitedCIS VMware ESXi 6.7 v1.3.0 Level 2VMware

AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION, SYSTEM AND INFORMATION INTEGRITY

8.7.1 Disable VIX messages from the VMCIS VMware ESXi 5.5 v1.2.0 Level 2VMware

CONFIGURATION MANAGEMENT

8.7.1 Ensure VIX messages from the VM are disabledCIS VMware ESXi 6.7 v1.3.0 Level 2VMware

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

8.7.3 Do not send host information to guestsCIS VMware ESXi 5.5 v1.2.0 Level 2VMware

SYSTEM AND COMMUNICATIONS PROTECTION

DISA_STIG_Docker_Enterprise_2.x_Linux_Unix_DTR_v2r2.audit from DISA Docker Enterprise 2.x Linux/UNIX v2r2 STIGDISA STIG Docker Enterprise 2.x Linux/Unix DTR v2r2Unix
DISA_STIG_Docker_Enterprise_2.x_Linux_Unix_v2r2.audit from DISA Docker Enterprise 2.x Linux/UNIX v2r2 STIGDISA STIG Docker Enterprise 2.x Linux/Unix v2r2Unix
First Hop Security - IP Inspection - Admin StatusTenable Cisco ACICisco_ACI

CONFIGURATION MANAGEMENT