Item Search

NameAudit NamePluginCategory
1.1.26 Ensure all world-writable directories are group-owned.CIS Amazon Linux 2 STIG v2.0.0 STIGUnix

ACCESS CONTROL, MEDIA PROTECTION

1.3.3 Ensure AIDE is configured to verify ACLsCIS Amazon Linux 2 STIG v2.0.0 STIGUnix

ACCESS CONTROL, MEDIA PROTECTION

1.3.4 Ensure AIDE is configured to verify XATTRSCIS Amazon Linux 2 STIG v2.0.0 STIGUnix

ACCESS CONTROL, MEDIA PROTECTION

1.4.3 Ensure authentication required for single user modeCIS Amazon Linux 2 STIG v2.0.0 STIGUnix

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

1.5.8 Ensure DNS is servers are configuredCIS Amazon Linux 2 STIG v2.0.0 STIGUnix

CONFIGURATION MANAGEMENT

1.8.5 Ensure users must authenticate users using MFA via a graphical user logonCIS Amazon Linux 2 STIG v2.0.0 STIGUnix

IDENTIFICATION AND AUTHENTICATION

1.8.6 Ensure GNOME Screensaver period of inactivity is configuredCIS Amazon Linux 2 STIG v2.0.0 STIGUnix

ACCESS CONTROL

1.8.14 Ensure unrestricted logon is not allowedCIS Amazon Linux 2 STIG v2.0.0 STIGUnix

IDENTIFICATION AND AUTHENTICATION

1.10 Ensure required packages for multifactor authentication are installedCIS Amazon Linux 2 STIG v2.0.0 STIGUnix

IDENTIFICATION AND AUTHENTICATION

1.12 Ensure host-based intrusion detection tool is usedCIS Amazon Linux 2 STIG v2.0.0 STIGUnix

SYSTEM AND INFORMATION INTEGRITY

2.2.26 Ensure ldap_tls_cacert is set for LDAP.CIS Amazon Linux 2 STIG v2.0.0 STIGUnix

CONFIGURATION MANAGEMENT

2.3.4 Ensure telnet client is not installedCIS Amazon Linux 2 STIG v2.0.0 STIGUnix

CONFIGURATION MANAGEMENT

2.5 Enable SSL for Network File copy (NFC)CIS VMware ESXi 5.1 v1.0.1 Level 2VMware

SYSTEM AND COMMUNICATIONS PROTECTION

3.2.1 Ensure IP forwarding is disabledCIS Amazon Linux 2 STIG v2.0.0 STIGUnix

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

3.3.1 Ensure source routed packets are not acceptedCIS Amazon Linux 2 STIG v2.0.0 STIGUnix

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

3.5.1.5 Ensure firewalld default zone is setCIS Amazon Linux 2 STIG v2.0.0 STIGUnix

SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION

4.1.2.4 Ensure system notification is sent out when volume is 75% fullCIS Amazon Linux 2 STIG v2.0.0 STIGUnix

AUDIT AND ACCOUNTABILITY

4.1.2.5 Ensure system is disabled when audit logs are fullCIS Amazon Linux 2 STIG v2.0.0 STIGUnix

AUDIT AND ACCOUNTABILITY

4.1.2.8 Ensure audit logs are stored on a different system.CIS Amazon Linux 2 STIG v2.0.0 STIGUnix

AUDIT AND ACCOUNTABILITY

4.1.3.11 Ensure unsuccessful unauthorized file access attempts are collectedCIS Amazon Linux 2 STIG v2.0.0 STIGUnix

AUDIT AND ACCOUNTABILITY

4.1.3.12 Ensure discretionary access control permission modification events are collectedCIS Amazon Linux 2 STIG v2.0.0 STIGUnix

AUDIT AND ACCOUNTABILITY

4.1.3.21 Ensure audit of postdrop commandCIS Amazon Linux 2 STIG v2.0.0 STIGUnix

AUDIT AND ACCOUNTABILITY

4.1.3.29 Ensure audit pam_timestamp_check commandCIS Amazon Linux 2 STIG v2.0.0 STIGUnix

AUDIT AND ACCOUNTABILITY

4.1.3.31 Ensure audit of the create_module syscallCIS Amazon Linux 2 STIG v2.0.0 STIGUnix

AUDIT AND ACCOUNTABILITY

4.1.3.34 Ensure audit of the setsebool command.CIS Amazon Linux 2 STIG v2.0.0 STIGUnix

AUDIT AND ACCOUNTABILITY

5.1.8 Ensure cron is restricted to authorized usersCIS Amazon Linux 2 STIG v2.0.0 STIGUnix

ACCESS CONTROL, MEDIA PROTECTION

5.3.31 Ensure SSH does not permit Kerberos authenticationCIS Amazon Linux 2 STIG v2.0.0 STIGUnix

CONFIGURATION MANAGEMENT

5.3.33 Ensure SSH uses privilege separationCIS Amazon Linux 2 STIG v2.0.0 STIGUnix

SYSTEM AND INFORMATION INTEGRITY

5.3.35 Ensure SSH X11UseLocalhost is enabledCIS Amazon Linux 2 STIG v2.0.0 STIGUnix

CONFIGURATION MANAGEMENT

5.4.6 Ensure no accounts are configured with blank or null passwordsCIS Amazon Linux 2 STIG v2.0.0 STIGUnix

IDENTIFICATION AND AUTHENTICATION

5.4.10 Ensure certificate status checking for PKI authenticationCIS Amazon Linux 2 STIG v2.0.0 STIGUnix

IDENTIFICATION AND AUTHENTICATION

5.5.4 Ensure default user shell timeout is configuredCIS Amazon Linux 2 STIG v2.0.0 STIGUnix

ACCESS CONTROL

5.5.6 Ensure user and group account administration utilities are configured to store only encrypted representations of passwordsCIS Amazon Linux 2 STIG v2.0.0 STIGUnix

IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

5.6 Remove keys from SSH authorized_keys fileCIS VMware ESXi 5.5 v1.2.0 Level 2VMware

SYSTEM AND INFORMATION INTEGRITY

5.11 Ensure contents of exposed configuration files have not been modifiedCIS VMware ESXi 6.7 v1.3.0 Level 2VMware

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

6.2.20 Ensure that all files and directories contained in local interactive user home directories are owned by the userCIS Amazon Linux 2 STIG v2.0.0 STIGUnix

ACCESS CONTROL, MEDIA PROTECTION

6.2.23 Ensure local interactive users' dot files for are owned by the user or root.CIS Amazon Linux 2 STIG v2.0.0 STIGUnix

ACCESS CONTROL, MEDIA PROTECTION

6.2.25 Ensure users' dot files have 0740 or less set.CIS Amazon Linux 2 STIG v2.0.0 STIGUnix

ACCESS CONTROL, MEDIA PROTECTION

6.4 Ensure VMDK files are zeroed out prior to deletionCIS VMware ESXi 6.5 v1.0.0 Level 2VMware
8.1.2 Ensure only one remote console connection is permitted to a VM at any timeCIS VMware ESXi 6.5 v1.0.0 Level 2VMware

SYSTEM AND INFORMATION INTEGRITY

8.2.2 Disconnect unauthorized devices - CD/DVD DevicesCIS VMware ESXi 5.5 v1.2.0 Level 2VMware
8.2.2 Ensure unnecessary CD/DVD devices are disconnectedCIS VMware ESXi 6.7 v1.3.0 Level 2VMware

CONFIGURATION MANAGEMENT

8.4.26 Ensure all but VGA mode on virtual machines is disabledCIS VMware ESXi 6.7 v1.3.0 Level 2VMware

CONFIGURATION MANAGEMENT

8.4.29 Ensure all but VGA mode on virtual machines is disabledCIS VMware ESXi 6.5 v1.0.0 Level 2VMware

SYSTEM AND INFORMATION INTEGRITY

8.5.1 Ensure VM limits are configured correctly - Mem Share LevelCIS VMware ESXi 6.5 v1.0.0 Level 2VMware

SYSTEM AND COMMUNICATIONS PROTECTION

8.6.1 Ensure nonpersistent disks are limitedCIS VMware ESXi 6.5 v1.0.0 Level 2VMware

AUDIT AND ACCOUNTABILITY

8.6.1 Ensure nonpersistent disks are limitedCIS VMware ESXi 6.7 v1.3.0 Level 2VMware

AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION, SYSTEM AND INFORMATION INTEGRITY

8.7.1 Disable VIX messages from the VMCIS VMware ESXi 5.5 v1.2.0 Level 2VMware

CONFIGURATION MANAGEMENT

8.7.1 Ensure VIX messages from the VM are disabledCIS VMware ESXi 6.7 v1.3.0 Level 2VMware

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

8.7.3 Do not send host information to guestsCIS VMware ESXi 5.5 v1.2.0 Level 2VMware

SYSTEM AND COMMUNICATIONS PROTECTION