5.1.13 Set 'Configure Outlook object model prompt... | CIS MS Office Outlook 2010 v1.0.0 | Windows | CONFIGURATION MANAGEMENT |
5.2.5 Ensure Complex Password Must Contain Special Character Is Configured | CIS Apple macOS 11.0 Big Sur v4.0.0 L2 | Unix | IDENTIFICATION AND AUTHENTICATION |
CIS_Docker_v1.7.0_L1_Docker_Swarm.audit from CIS Docker Benchmark v1.7.0 | CIS Docker v1.7.0 L1 Docker Swarm | Unix | |
CIS_IBM_DB2_9_v3.0.1_Level_2_OS_Linux.audit from CIS DB2 9 Linux | CIS IBM DB2 9 Benchmark v3.0.1 Level 2 OS Linux | Unix | |
CIS_Kubernetes_v1.11.1_L1_Worker_Node.audit from CIS Kubernetes Benchmark v1.11.1 | CIS Kubernetes v1.11.1 L1 Worker Node | Unix | |
CIS_MariaDB_10.6_Benchmark_v1.1.0_L1_Database.audit from CIS MariaDB 10.6 Benchmark | CIS MariaDB 10.6 Database L1 v1.1.0 | MySQLDB | |
CIS_MariaDB_10.6_Benchmark_v1.1.0_L2_Linux_OS.audit from CIS MariaDB 10.6 Benchmark | CIS MariaDB 10.6 on Linux L2 v1.1.0 | Unix | |
CIS_NGINX_v2.1.0_Level_2_Loadbalancer.audit from CIS NGINX Benchmark v2.1.0 | CIS NGINX Benchmark v2.1.0 L2 Loadbalancer | Unix | |
CIS_NGINX_v2.1.0_Level_2_Webserver.audit from CIS NGINX Benchmark v2.1.0 | CIS NGINX Benchmark v2.1.0 L2 Webserver | Unix | |
EP11-00-009100 - The EDB Postgres Advanced Server must only accept end entity certificates issued by DoD PKI or DoD-approved PKI Certification Authorities (CAs) for the establishment of all encrypted sessions. | EDB PostgreSQL Advanced Server v11 Windows OS Audit v2r4 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
EX13-CA-000145 - Exchange must provide redundancy. | DISA Microsoft Exchange 2013 Client Access Server STIG v2r2 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
EX13-CA-000165 - Exchange must be configured in accordance with the security configuration settings based on DoD security configuration or implementation guidance, including STIGs, NSA configuration guides, CTOs, and DTMs. | DISA Microsoft Exchange 2013 Client Access Server STIG v2r2 | Windows | CONFIGURATION MANAGEMENT |
EX13-EG-000015 - Exchange must have accepted domains configured. | DISA Microsoft Exchange 2013 Edge Transport Server STIG v1r6 | Windows | ACCESS CONTROL |
EX13-EG-000130 - Exchange Send connectors must be clearly named. | DISA Microsoft Exchange 2013 Edge Transport Server STIG v1r6 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
EX13-EG-000150 - Exchange Receive connectors must control the number of recipients per message. | DISA Microsoft Exchange 2013 Edge Transport Server STIG v1r6 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
EX13-EG-000155 - The Exchange Internet Receive connector connections count must be set to default. | DISA Microsoft Exchange 2013 Edge Transport Server STIG v1r6 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
EX13-EG-000165 - Exchange messages with a blank sender field must be rejected. | DISA Microsoft Exchange 2013 Edge Transport Server STIG v1r6 | Windows | SYSTEM AND INFORMATION INTEGRITY |
EX13-EG-000180 - The Exchange Sender filter must block unaccepted domains. | DISA Microsoft Exchange 2013 Edge Transport Server STIG v1r6 | Windows | SYSTEM AND INFORMATION INTEGRITY |
EX13-EG-000240 - The Exchange tarpitting interval must be set. | DISA Microsoft Exchange 2013 Edge Transport Server STIG v1r6 | Windows | SYSTEM AND INFORMATION INTEGRITY |
EX13-EG-000260 - The Exchange Simple Mail Transfer Protocol (SMTP) Sender filter must be enabled. | DISA Microsoft Exchange 2013 Edge Transport Server STIG v1r6 | Windows | SYSTEM AND INFORMATION INTEGRITY |
EX13-EG-000295 - The Exchange software baseline copy must exist. | DISA Microsoft Exchange 2013 Edge Transport Server STIG v1r6 | Windows | CONFIGURATION MANAGEMENT |
EX13-EG-000345 - Exchange internal Send connectors must require encryption. | DISA Microsoft Exchange 2013 Edge Transport Server STIG v1r6 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
Join Microsoft MAPS | MSCT Windows 10 1809 v1.0.0 | Windows | ACCESS CONTROL |
Join Microsoft MAPS | MSCT Windows 10 v2004 v1.0.0 | Windows | ACCESS CONTROL |
MS.EXO.15.1v1 - URL comparison with a block-list SHOULD be enabled. | CISA SCuBA Microsoft 365 Exchange Online v1.5.0 | microsoft_azure | ACCESS CONTROL, SECURITY ASSESSMENT AND AUTHORIZATION, CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY |
SP13-00-000005 - SharePoint must support the requirement to initiate a session lock after 15 minutes of system or application inactivity has transpired. | DISA STIG SharePoint 2013 v2r4 | Windows | ACCESS CONTROL |
SP13-00-000010 - SharePoint must maintain and support the use of security attributes with stored information - Document Library' | DISA STIG SharePoint 2013 v2r4 | Windows | CONFIGURATION MANAGEMENT |
SP13-00-000020 - SharePoint must use cryptography to protect the integrity of the remote access session. | DISA STIG SharePoint 2013 v2r4 | Windows | ACCESS CONTROL |
SP13-00-000035 - SharePoint must identify data type, specification, and usage when transferring information between different security domains so policy restrictions may be applied. | DISA STIG SharePoint 2013 v2r4 | Windows | CONFIGURATION MANAGEMENT |
SP13-00-000055 - SharePoint must allow designated organizational personnel to select which auditable events are to be audited by specific components of the system. | DISA STIG SharePoint 2013 v2r4 | Windows | AUDIT AND ACCOUNTABILITY |
SP13-00-000060 - SharePoint must reject or delay, as defined by the organization, network traffic generated above configurable traffic volume thresholds - ConnectionTimeout | DISA STIG SharePoint 2013 v2r4 | Windows | CONFIGURATION MANAGEMENT |
SP13-00-000060 - SharePoint must reject or delay, as defined by the organization, network traffic generated above configurable traffic volume thresholds - maxConnections | DISA STIG SharePoint 2013 v2r4 | Windows | CONFIGURATION MANAGEMENT |
SP13-00-000065 - SharePoint must prevent the execution of prohibited mobile code. | DISA STIG SharePoint 2013 v2r4 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
SP13-00-000085 - SharePoint must implement required cryptographic protections using cryptographic modules complying with applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance. | DISA STIG SharePoint 2013 v2r4 | Windows | IDENTIFICATION AND AUTHENTICATION |
SP13-00-000100 - SharePoint must employ FIPS-validated cryptography to protect unclassified information when such information must be separated from individuals who have the necessary clearances yet lack the necessary access approvals. | DISA STIG SharePoint 2013 v2r4 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
SP13-00-000105 - SharePoint must validate the integrity of security attributes exchanged between systems. | DISA STIG SharePoint 2013 v2r4 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
SP13-00-000115 - SharePoint must terminate user sessions upon user logoff, and when idle time limit is exceeded. | DISA STIG SharePoint 2013 v2r4 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
SP13-00-000120 - SharePoint must maintain the confidentiality of information during aggregation, packaging, and transformation in preparation for transmission. When transmitting data, applications need to leverage transmission protection mechanisms such as TLS, SSL VPNs, or IPSec. | DISA STIG SharePoint 2013 v2r4 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
SP13-00-000125 - SharePoint must implement an information system isolation boundary that minimizes the number of nonsecurity functions included within the boundary containing security functions. | DISA STIG SharePoint 2013 v2r4 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
SP13-00-000130 - SharePoint must implement security functions as a layered structure minimizing interactions between layers of the design and avoiding any dependence by lower layers on the functionality or correctness of higher layers. | DISA STIG SharePoint 2013 v2r4 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
SP13-00-000135 - SharePoint must employ cryptographic mechanisms preventing the unauthorized disclosure of information during transmission, unless the transmitted data is otherwise protected by alternative physical measures. | DISA STIG SharePoint 2013 v2r4 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
SP13-00-000140 - SharePoint must prevent non-privileged users from circumventing malicious code protection capabilities. | DISA STIG SharePoint 2013 v2r4 | Windows | ACCESS CONTROL |
SP13-00-000145 - SharePoint must use mechanisms for authentication to a cryptographic module that meet the requirements of applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance for such authentication. | DISA STIG SharePoint 2013 v2r4 | Windows | IDENTIFICATION AND AUTHENTICATION |
SP13-00-000150 - The SharePoint Central Administration site must not be accessible from Extranet or Internet connections. | DISA STIG SharePoint 2013 v2r4 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
SP13-00-000160 - The SharePoint farm service account (database access account) must be configured with minimum privileges in Active Directory (AD). | DISA STIG SharePoint 2013 v2r4 | Windows | CONFIGURATION MANAGEMENT |
SP13-00-000170 - The SharePoint setup account must be configured with the minimum privileges in Active Directory. | DISA STIG SharePoint 2013 v2r4 | Windows | CONFIGURATION MANAGEMENT |
SP13-00-000185 - A secondary SharePoint site collection administrator must be defined when creating a new site collection. | DISA STIG SharePoint 2013 v2r4 | Windows | CONFIGURATION MANAGEMENT |
SP13-00-000190 - When configuring SharePoint Central Administration, the port number selected must comply with DoD Ports and Protocol Management (PPSM) program requirements. | DISA STIG SharePoint 2013 v2r4 | Windows | CONFIGURATION MANAGEMENT |
SP13-00-000195 - SharePoint-specific malware (i.e. anti-virus) protection software must be integrated and configured - 'Attempt to Clean Infected Documents is enabled' | DISA STIG SharePoint 2013 v2r4 | Windows | CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION |
SP13-00-000195 - SharePoint-specific malware (i.e. anti-virus) protection software must be integrated and configured - 'Scan Documents on Upload is enabled' | DISA STIG SharePoint 2013 v2r4 | Windows | CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION |