Item Search

NameAudit NamePluginCategory
1.2.1 Configure Connection to the RHN RPM RepositoriesCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

SYSTEM AND INFORMATION INTEGRITY

1.2.2 Verify Red Hat GPG Key is InstalledCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

SYSTEM AND INFORMATION INTEGRITY

1.2.4 Ensure Red Hat Network or Subscription Manager connection is configuredCIS Red Hat 6 Workstation L1 v3.0.0Unix

SYSTEM AND INFORMATION INTEGRITY

1.2.4 Ensure Red Hat Network or Subscription Manager connection is configuredCIS Red Hat 6 Server L1 v3.0.0Unix

SYSTEM AND INFORMATION INTEGRITY

1.2.4 Ensure Red Hat Subscription Manager connection is configuredCIS Red Hat Enterprise Linux 7 STIG v2.0.0 L2 ServerUnix

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

1.2.4 Ensure Red Hat Subscription Manager connection is configuredCIS Red Hat Enterprise Linux 7 STIG v2.0.0 L1 ServerUnix

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

1.2.6 Ensure the version of the operating system is an active vendor supported releaseCIS Amazon Linux 2 STIG v2.0.0 STIGUnix

SYSTEM AND SERVICES ACQUISITION

1.2.8 Ensure the version of the operating system is an active vendor supported releaseCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIGUnix

CONFIGURATION MANAGEMENT

1.3 Ensure Apache Is Installed From the Appropriate BinariesCIS Apache HTTP Server 2.4 v2.2.0 L1Unix

CONFIGURATION MANAGEMENT

1.3 Ensure Apache Is Installed From the Appropriate BinariesCIS Apache HTTP Server 2.2 L1 v3.6.0 MiddlewareUnix

CONFIGURATION MANAGEMENT

1.3 Ensure Apache Is Installed From the Appropriate BinariesCIS Apache HTTP Server 2.2 L2 v3.6.0Unix

CONFIGURATION MANAGEMENT

1.3 Ensure Apache Is Installed From the Appropriate BinariesCIS Apache HTTP Server 2.2 L1 v3.6.0Unix

CONFIGURATION MANAGEMENT

1.7 Use the Latest OS ReleaseCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

SYSTEM AND INFORMATION INTEGRITY

1.7.3 Ensure the Standard Mandatory DoD Notice and Consent Banner are configuredCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIGUnix

ACCESS CONTROL

1.7.3 Ensure the Standard Mandatory DoD Notice and Consent Banner are configuredCIS Amazon Linux 2 STIG v2.0.0 STIGUnix

CONFIGURATION MANAGEMENT

1.8.3 Ensure GDM session lock is enabledCIS Amazon Linux 2 STIG v2.0.0 STIGUnix

ACCESS CONTROL

1.8.6 Ensure GDM session lock is enabledCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIGUnix

ACCESS CONTROL

2.1.1 Remove telnet-serverCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

CONFIGURATION MANAGEMENT

2.1.2 Remove telnet ClientsCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

CONFIGURATION MANAGEMENT

3.11 Remove HTTP ServerCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

CONFIGURATION MANAGEMENT

3.14 Remove HTTP Proxy ServerCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

CONFIGURATION MANAGEMENT

5.2 Ensure SELinux security options are set, if applicableCIS Docker Community Edition v1.1.0 L2 DockerUnix

ACCESS CONTROL

5.2 Verify SELinux security options, if applicableCIS Docker 1.12.0 v1.0.0 L2 DockerUnix

ACCESS CONTROL

5.2 Verify SELinux security options, if applicable (Scored)CIS Docker 1.6 v1.0.0 L2 DockerUnix

ACCESS CONTROL

5.3 Ensure that, if applicable, SELinux security options are setCIS Docker v1.7.0 L2 Docker - LinuxUnix

SYSTEM AND INFORMATION INTEGRITY

5.5.1.6 Ensure shadow file is configured to use only encrypted representations of passwordsCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIGUnix

IDENTIFICATION AND AUTHENTICATION

5.5.6 Ensure user and group account administration utilities are configured to store only encrypted representations of passwordsCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIGUnix

IDENTIFICATION AND AUTHENTICATION

6.7 Ensure FIPS 140-2 OpenSSL Cryptography Is UsedCIS PostgreSQL 14 OS v 1.2.0Unix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

6.7 Ensure FIPS 140-2 OpenSSL Cryptography Is UsedCIS PostgreSQL 15 OS v1.1.0Unix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

6.7 Ensure FIPS 140-2 OpenSSL Cryptography Is Used - openssl versionCIS PostgreSQL 10 OS v1.0.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION

6.7 Ensure FIPS 140-2 OpenSSL Cryptography Is Used - openssl versionCIS PostgreSQL 11 OS v1.0.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION

7.2 Disable System AccountsCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

ACCESS CONTROL

JBOS-AS-000680 - Production JBoss servers must be supported by the vendor.DISA JBoss EAP 6.3 STIG v2r6Unix

SYSTEM AND INFORMATION INTEGRITY

RHEL-06-000008 - Vendor-provided cryptographic certificates must be installed to verify the integrity of system software.DISA Red Hat Enterprise Linux 6 STIG v2r2Unix

CONFIGURATION MANAGEMENT

RHEL-06-000010 - The Red Hat Enterprise Linux operating system must be a vendor-supported release.DISA Red Hat Enterprise Linux 6 STIG v2r2Unix

CONFIGURATION MANAGEMENT

RHEL-06-000011 - System security patches and updates must be installed and up-to-date.DISA Red Hat Enterprise Linux 6 STIG v2r2Unix

SYSTEM AND INFORMATION INTEGRITY

RHEL-06-000275 - The operating system must employ cryptographic mechanisms to protect information in storage.DISA Red Hat Enterprise Linux 6 STIG v2r2Unix

CONFIGURATION MANAGEMENT

RHEL-06-000276 - The operating system must protect the confidentiality and integrity of data at rest.DISA Red Hat Enterprise Linux 6 STIG v2r2Unix

SYSTEM AND COMMUNICATIONS PROTECTION

RHEL-06-000277 - The operating system must employ cryptographic mechanisms to prevent unauthorized disclosure of data at rest unless otherwise protected by alternative physical measures.DISA Red Hat Enterprise Linux 6 STIG v2r2Unix

CONFIGURATION MANAGEMENT

RHEL-07-010019 - The Red Hat Enterprise Linux operating system must ensure cryptographic verification of vendor software packages.DISA Red Hat Enterprise Linux 7 STIG v3r15Unix

CONFIGURATION MANAGEMENT

RHEL-07-020029 - The Red Hat Enterprise Linux operating system must use a file integrity tool to verify correct operation of all security functions.DISA Red Hat Enterprise Linux 7 STIG v3r15Unix

SYSTEM AND INFORMATION INTEGRITY

RHEL-07-021620 - The Red Hat Enterprise Linux operating system must use a file integrity tool that is configured to use FIPS 140-2 approved cryptographic hashes for validating file contents and directories.DISA Red Hat Enterprise Linux 7 STIG v3r15Unix

CONFIGURATION MANAGEMENT

RHEL-07-030201 - The Red Hat Enterprise Linux operating system must be configured to off-load audit logs onto a different system or storage media from the system being audited.DISA Red Hat Enterprise Linux 7 STIG v3r15Unix

AUDIT AND ACCOUNTABILITY

RHEL-07-030210 - The Red Hat Enterprise Linux operating system must take appropriate action when the remote logging buffer is full.DISA Red Hat Enterprise Linux 7 STIG v3r15Unix

AUDIT AND ACCOUNTABILITY

RHEL-07-030211 - The Red Hat Enterprise Linux operating system must label all off-loaded audit logs before sending them to the central log server.DISA Red Hat Enterprise Linux 7 STIG v3r15Unix

AUDIT AND ACCOUNTABILITY

RHEL-07-030320 - The Red Hat Enterprise Linux operating system must be configured so that the audit system takes appropriate action when the audit storage volume is full.DISA Red Hat Enterprise Linux 7 STIG v3r15Unix

AUDIT AND ACCOUNTABILITY

RHEL-07-030321 - The Red Hat Enterprise Linux operating system must be configured so that the audit system takes appropriate action when there is an error sending audit records to a remote system.DISA Red Hat Enterprise Linux 7 STIG v3r15Unix

AUDIT AND ACCOUNTABILITY

RHEL-08-010000 - RHEL 8 must be a vendor-supported release.DISA Red Hat Enterprise Linux 8 STIG v2r3Unix

CONFIGURATION MANAGEMENT

RHEL-09-211010 - RHEL 9 must be a vendor-supported release.DISA Red Hat Enterprise Linux 9 STIG v2r4Unix

CONFIGURATION MANAGEMENT

RHEL-09-215010 - RHEL 9 subscription-manager package must be installed.DISA Red Hat Enterprise Linux 9 STIG v2r4Unix

CONFIGURATION MANAGEMENT