Item Search

NameAudit NamePluginCategory
1.1.21 Ensure all world-writable directories are group-owned.CIS Amazon Linux 2 STIG v1.0.0 L3Unix

CONFIGURATION MANAGEMENT

1.2.1 Configure Connection to the RHN RPM RepositoriesCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

SYSTEM AND INFORMATION INTEGRITY

1.2.4 Ensure Red Hat Network or Subscription Manager connection is configuredCIS Red Hat 6 Workstation L1 v3.0.0Unix

SYSTEM AND INFORMATION INTEGRITY

1.2.4 Ensure Red Hat Network or Subscription Manager connection is configuredCIS Red Hat 6 Server L1 v3.0.0Unix

SYSTEM AND INFORMATION INTEGRITY

1.2.4 Ensure Red Hat Subscription Manager connection is configuredCIS Red Hat Enterprise Linux 7 STIG v2.0.0 L2 ServerUnix

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

1.2.4 Ensure Red Hat Subscription Manager connection is configuredCIS Red Hat Enterprise Linux 7 STIG v2.0.0 L1 ServerUnix

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

1.2.5 Ensure the version of the operating system is an active vendor supported release.CIS Amazon Linux 2 STIG v1.0.0 L3Unix

SYSTEM AND INFORMATION INTEGRITY

1.2.8 Ensure the version of the operating system is an active vendor supported releaseCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIGUnix

CONFIGURATION MANAGEMENT

1.3 Ensure Apache Is Installed From the Appropriate BinariesCIS Apache HTTP Server 2.4 L1 v2.1.0Unix

CONFIGURATION MANAGEMENT

1.5.2 Ensure address space layout randomization (ASLR) is enabled - /etc/sysctl.conf, /etc/sysctl.d/*CIS Amazon Linux 2 STIG v1.0.0 L1Unix

SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY

1.5.2 Ensure address space layout randomization (ASLR) is enabled - sysctlCIS Amazon Linux 2 STIG v1.0.0 L1Unix

SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY

1.6.1.3 Ensure the SELinux state is enforcing - configCIS Amazon Linux 2 STIG v1.0.0 L2Unix

ACCESS CONTROL

1.6.1.3 Ensure the SELinux state is enforcing - sestatusCIS Amazon Linux 2 STIG v1.0.0 L2Unix

ACCESS CONTROL

1.7 Use the Latest OS ReleaseCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

SYSTEM AND INFORMATION INTEGRITY

1.7.3 Ensure the Standard Mandatory DoD Notice and Consent Banner are configuredCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIGUnix

ACCESS CONTROL

1.9 Ensure anti-virus is installed and runningCIS Amazon Linux 2 STIG v1.0.0 L3Unix

SYSTEM AND INFORMATION INTEGRITY

2.1.1 Ensure the rsh package has been removedCIS Amazon Linux 2 STIG v1.0.0 L3Unix

CONFIGURATION MANAGEMENT

2.1.1 Remove telnet-serverCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

CONFIGURATION MANAGEMENT

2.1.2 Ensure the ypserv package has been removedCIS Amazon Linux 2 STIG v1.0.0 L3Unix

CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY

2.1.2 Remove telnet ClientsCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

CONFIGURATION MANAGEMENT

2.1.3 Ensure the TFTP server has not been installedCIS Amazon Linux 2 STIG v1.0.0 L3Unix

SYSTEM AND INFORMATION INTEGRITY

2.2.20 Ensure telnet server is not enabledCIS Amazon Linux 2 STIG v1.0.0 L1Unix

SYSTEM AND INFORMATION INTEGRITY

2.2.21 Ensure tftp server is not enabledCIS Amazon Linux 2 STIG v1.0.0 L1Unix

SYSTEM AND INFORMATION INTEGRITY

3.4.1 Ensure DCCP is disabledCIS Amazon Linux 2 STIG v1.0.0 L2Unix

SYSTEM AND INFORMATION INTEGRITY

3.11 Remove HTTP ServerCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

CONFIGURATION MANAGEMENT

3.14 Remove HTTP Proxy ServerCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

CONFIGURATION MANAGEMENT

5.2 Ensure SELinux security options are set, if applicableCIS Docker Community Edition v1.1.0 L2 DockerUnix

ACCESS CONTROL

5.2 Verify SELinux security options, if applicableCIS Docker 1.12.0 v1.0.0 L2 DockerUnix

ACCESS CONTROL

5.2 Verify SELinux security options, if applicable (Scored)CIS Docker 1.6 v1.0.0 L2 DockerUnix

ACCESS CONTROL

5.2.1 Ensure SSH is installedCIS Amazon Linux 2 STIG v1.0.0 L3Unix

SYSTEM AND COMMUNICATIONS PROTECTION

5.2.2 Ensure SSH is runningCIS Amazon Linux 2 STIG v1.0.0 L3Unix

CONFIGURATION MANAGEMENT

5.2.3 Ensure permissions on /etc/ssh/sshd_config are configuredCIS Amazon Linux 2 STIG v1.0.0 L1Unix

CONFIGURATION MANAGEMENT

5.2.10 Ensure SSH IgnoreRhosts is enabledCIS Amazon Linux 2 STIG v1.0.0 L1Unix

SYSTEM AND INFORMATION INTEGRITY

5.2.11 Ensure SSH HostbasedAuthentication is disabledCIS Amazon Linux 2 STIG v1.0.0 L1Unix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

5.2.12 Ensure SSH root login is disabledCIS Amazon Linux 2 STIG v1.0.0 L1Unix

ACCESS CONTROL

5.2.13 Ensure SSH PermitEmptyPasswords is disabledCIS Amazon Linux 2 STIG v1.0.0 L1Unix

IDENTIFICATION AND AUTHENTICATION

5.2.14 Ensure SSH PermitUserEnvironment is disabledCIS Amazon Linux 2 STIG v1.0.0 L1Unix

CONFIGURATION MANAGEMENT

5.3 Ensure that, if applicable, SELinux security options are setCIS Docker v1.6.0 L2 Docker LinuxUnix

SYSTEM AND INFORMATION INTEGRITY

6.2.5 Ensure root is the only UID 0 accountCIS Amazon Linux 2 STIG v1.0.0 L1Unix

CONFIGURATION MANAGEMENT

6.2.15 Ensure all groups in /etc/passwd exist in /etc/groupCIS Amazon Linux 2 STIG v1.0.0 L1Unix

CONFIGURATION MANAGEMENT

RHEL-06-000008 - Vendor-provided cryptographic certificates must be installed to verify the integrity of system software.DISA Red Hat Enterprise Linux 6 STIG v2r2Unix

CONFIGURATION MANAGEMENT

RHEL-07-020250 - The Red Hat Enterprise Linux operating system must be a vendor supported release.DISA Red Hat Enterprise Linux 7 STIG v3r14Unix

CONFIGURATION MANAGEMENT

RHEL-07-021620 - The Red Hat Enterprise Linux operating system must use a file integrity tool that is configured to use FIPS 140-2 approved cryptographic hashes for validating file contents and directories.DISA Red Hat Enterprise Linux 7 STIG v3r14Unix

CONFIGURATION MANAGEMENT

RHEL-07-030201 - The Red Hat Enterprise Linux operating system must be configured to off-load audit logs onto a different system or storage media from the system being audited.DISA Red Hat Enterprise Linux 7 STIG v3r14Unix

AUDIT AND ACCOUNTABILITY

RHEL-07-030210 - The Red Hat Enterprise Linux operating system must take appropriate action when the remote logging buffer is full.DISA Red Hat Enterprise Linux 7 STIG v3r14Unix

AUDIT AND ACCOUNTABILITY

RHEL-07-030320 - The Red Hat Enterprise Linux operating system must be configured so that the audit system takes appropriate action when the audit storage volume is full.DISA Red Hat Enterprise Linux 7 STIG v3r14Unix

AUDIT AND ACCOUNTABILITY

RHEL-07-030321 - The Red Hat Enterprise Linux operating system must be configured so that the audit system takes appropriate action when there is an error sending audit records to a remote system.DISA Red Hat Enterprise Linux 7 STIG v3r14Unix

AUDIT AND ACCOUNTABILITY

RHEL-08-010000 - RHEL 8 must be a vendor-supported release.DISA Red Hat Enterprise Linux 8 STIG v1r13Unix

CONFIGURATION MANAGEMENT

RHEL-09-211010 - RHEL 9 must be a vendor-supported release.DISA Red Hat Enterprise Linux 9 STIG v1r2Unix

CONFIGURATION MANAGEMENT

RHEL-09-215010 - RHEL 9 subscription-manager package must be installed.DISA Red Hat Enterprise Linux 9 STIG v1r2Unix

CONFIGURATION MANAGEMENT