Item Search

NameAudit NamePluginCategory
1.1.4 Set 'login authentication for 'line con 0'CIS Cisco IOS 15 L1 v4.1.1Cisco

ACCESS CONTROL

1.1.5 Set 'login authentication for 'line tty'CIS Cisco IOS 15 L1 v4.1.1Cisco

ACCESS CONTROL

1.1.6 Set 'login authentication for 'line vty'CIS Cisco IOS 15 L1 v4.1.1Cisco

ACCESS CONTROL

2.1.1.1.2 Set the 'ip domain-name'CIS Cisco IOS 15 L1 v4.1.1Cisco

CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

2.1.2 Set 'no cdp run'CIS Cisco IOS 15 L1 v4.1.1Cisco

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

2.2.2 Set 'ip address' for 'ntp server'CIS Cisco IOS XR 7.x v1.0.1 L1Cisco

AUDIT AND ACCOUNTABILITY

2.3.2 Set 'ip address' for 'ntp server'CIS Cisco IOS XE 16.x v2.2.0 L1Cisco

AUDIT AND ACCOUNTABILITY

2.3.2 Set 'ip address' for 'ntp server'CIS Cisco IOS XE 17.x v2.2.1 L1Cisco

AUDIT AND ACCOUNTABILITY

3.1.2 Set 'no ip proxy-arp'CIS Cisco IOS 15 L2 v4.1.1Cisco

CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

3.1.2 Set 'no ip proxy-arp'CIS Cisco IOS XE 16.x v2.2.0 L2Cisco

CONFIGURATION MANAGEMENT

3.1.2 Set 'no ip proxy-arp'CIS Cisco IOS XE 17.x v2.2.1 L2Cisco

SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION

AMLS-L3-000150 - The Arista Multilayer Switch must protect an enclave connected to an Alternate Gateway by using an inbound filter that only permits packets with destination addresses within the sites address space.DISA STIG Arista MLS DCS-7000 Series RTR v1r4Arista

ACCESS CONTROL

AMLS-L3-000160 - If Border Gateway Protocol (BGP) is enabled on The Arista Multilayer Switch, The Arista Multilayer Switch must not be a BGP peer with a router from an Autonomous System belonging to any Alternate Gateway.DISA STIG Arista MLS DCS-7000 Series RTR v1r4Arista

ACCESS CONTROL

AOSX-15-100001 - The macOS system must be a supported release.DISA STIG Apple Mac OSX 10.15 v1r10Unix

CONFIGURATION MANAGEMENT

ARST-RT-000160 - The Arista perimeter router must be configured to protect an enclave connected to an alternate gateway by using an inbound filter that only permits packets with destination addresses within the sites address space.DISA STIG Arista MLS EOS 4.2x Router v2r1Arista

ACCESS CONTROL

ARST-RT-000160 - The Arista perimeter router must be configured to protect an enclave connected to an alternate gateway by using an inbound filter that only permits packets with destination addresses within the sites address space.DISA Arista MLS EOS 4.X Router STIG v2r2Arista

ACCESS CONTROL

ARST-RT-000170 - The Arista perimeter router must be configured to not be a Border Gateway Protocol (BGP) peer to an alternate gateway service provider.DISA Arista MLS EOS 4.X Router STIG v2r2Arista

ACCESS CONTROL

ARST-RT-000170 - The Arista perimeter router must be configured to not be a Border Gateway Protocol (BGP) peer to an alternate gateway service provider.DISA STIG Arista MLS EOS 4.2x Router v2r1Arista

ACCESS CONTROL

ARST-RT-000640 - The Arista perimeter router must be configured to have Proxy ARP disabled on all external interfaces.DISA STIG Arista MLS EOS 4.2x Router v2r1Arista

SYSTEM AND COMMUNICATIONS PROTECTION

ARST-RT-000640 - The Arista perimeter router must be configured to have Proxy ARP disabled on all external interfaces.DISA Arista MLS EOS 4.X Router STIG v2r2Arista

SYSTEM AND COMMUNICATIONS PROTECTION

ARST-RT-000830 - The perimeter router must be configured to block all packets with any IP options.DISA Arista MLS EOS 4.X Router STIG v2r2Arista

SYSTEM AND COMMUNICATIONS PROTECTION

ARST-RT-000830 - The perimeter router must be configured to block all packets with any IP options.DISA STIG Arista MLS EOS 4.2x Router v2r1Arista

SYSTEM AND COMMUNICATIONS PROTECTION

CISC-ND-001030 - The Cisco router must be configured to synchronize its clock with the primary and secondary time sources using redundant authoritative time sources.DISA Cisco IOS Router NDM STIG v3r6Cisco

AUDIT AND ACCOUNTABILITY

CISC-ND-001150 - The Cisco router must be configured to authenticate Network Time Protocol (NTP) sources using authentication with FIPS-compliant algorithms.DISA Cisco IOS XR Router NDM STIG v3r5Cisco

IDENTIFICATION AND AUTHENTICATION

CISC-ND-001310 - The Cisco router must be configured to off-load log records onto a different system than the system being audited.DISA Cisco IOS XR Router NDM STIG v3r5Cisco

AUDIT AND ACCOUNTABILITY

CISC-RT-000280 - The Cisco perimeter router must be configured to protect an enclave connected to an alternate gateway by using an inbound filter that only permits packets with destination addresses within the sites address space.DISA Cisco IOS XR Router RTR STIG v3r3Cisco

ACCESS CONTROL

CISC-RT-000280 - The Cisco perimeter router must be configured to protect an enclave connected to an alternate gateway by using an inbound filter that only permits packets with destination addresses within the sites address space.DISA Cisco IOS XE Router RTR STIG v3r5Cisco

ACCESS CONTROL

CISC-RT-000280 - The Cisco perimeter router must be configured to protect an enclave connected to an approved gateway by using an inbound filter that only permits packets with destination addresses within the sites address space.DISA Cisco IOS Router RTR STIG v3r4Cisco

ACCESS CONTROL

CISC-RT-000391 - The Cisco perimeter router must be configured to suppress Router Advertisements on all external IPv6-enabled interfaces.DISA Cisco IOS Router RTR STIG v3r4Cisco

CONFIGURATION MANAGEMENT

CISC-RT-000391 - The Cisco perimeter router must be configured to suppress Router Advertisements on all external IPv6-enabled interfaces.DISA Cisco IOS XE Router RTR STIG v3r5Cisco

CONFIGURATION MANAGEMENT

CISC-RT-000391 - The Cisco perimeter router must be configured to suppress Router Advertisements on all external IPv6-enabled interfaces.DISA Cisco IOS XR Router RTR STIG v3r3Cisco

CONFIGURATION MANAGEMENT

CISC-RT-000392 - The Cisco perimeter router must be configured to drop IPv6 undetermined transport packets.DISA Cisco IOS Router RTR STIG v3r4Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

DISA_IIS_8.5_Web_Server_v2r7.audit from DISA Microsoft IIS 8.5 Server v2r7 STIGDISA IIS 8.5 Server v2r7Windows
DISA_IIS_8.5_Web_Site_v2r9.audit from DISA Microsoft IIS 8.5 Site v2r9 STIGDISA IIS 8.5 Site v2r9Windows
DISA_Oracle_11g_Installation_v9r1_OS_Linux.audit from DISA Oracle Database 11g Installation STIG v9r1 STIGDISA STIG Oracle 11 Installation v9r1 LinuxUnix
DISA_Oracle_11g_Installation_v9r1_OS_Windows.audit from DISA Oracle Database 11g Installation STIG v9r1 STIGDISA STIG Oracle 11 Installation v9r1 WindowsWindows
DISA_Oracle_11g_Instance_v9r1_OS_Linux.audit from DISA Oracle Database 11g Instance STIG v9r1 STIGDISA STIG Oracle 11 Instance v9r1 OS UnixUnix
DISA_Oracle_11g_Instance_v9r1_OS_Windows.audit from DISA Oracle Database 11g Instance STIG v9r1 STIGDISA STIG Oracle 11 Instance v9r1 OS WindowsWindows
DISA_STIG_Cisco_ASA_FW_v2r1.audit from DISA Cisco ASA Firewall v2r1 STIGDISA STIG Cisco ASA FW v2r1Cisco
DISA_STIG_Cisco_ASA_NDM_v2r4.audit from DISA Cisco ASA NDM v2r4 STIGDISA STIG Cisco ASA NDM v2r4Cisco
DISA_STIG_Cisco_ASA_VPN_v2r2.audit from DISA Cisco ASA VPN v2r2 STIGDISA STIG Cisco ASA VPN v2r2Cisco
DISA_STIG_MSSQL_2012_Database_v1r20.audit from DISA Microsoft SQL Server Instance 2012 v1r20 STIGDISA STIG SQL Server 2012 Database Audit v1r20MS_SQLDB
DISA_STIG_MSSQL_2012_Instance-DB_v1r20.audit from DISA Microsoft SQL Server Instance 2012 v1r20 STIGDISA STIG SQL Server 2012 DB Instance Security v1r20MS_SQLDB
DISA_STIG_MSSQL_2012_Instance-OS_v1r20.audit from DISA Microsoft SQL Server Instance 2012 v1r20 STIGDISA STIG SQL Server 2012 Database OS Audit v1r20Windows
GEN000100 - The operating system must be a supported release.DISA STIG Solaris 10 X86 v2r4Unix

CONFIGURATION MANAGEMENT

JUEX-RT-000170 - The Juniper perimeter router must be configured to protect an enclave connected to an alternate gateway by using an inbound filter that only permits packets with destination addresses within the site's address space.DISA Juniper EX Series Router v2r1Juniper

ACCESS CONTROL

JUEX-RT-000180 - The Juniper perimeter router must not be configured to be a Border Gateway Protocol (BGP) peer to an alternate gateway service provider.DISA Juniper EX Series Router v2r1Juniper

ACCESS CONTROL

JUNI-RT-000280 - The Juniper perimeter router must be configured to protect an enclave connected to an approved gateway by using an inbound filter that only permits packets with destination addresses within the site's address space.DISA STIG Juniper Router RTR v3r2Juniper

ACCESS CONTROL

JUNI-RT-000290 - The Juniper perimeter router must be configured to not be a Border Gateway Protocol (BGP) peer to an approved gateway service provider - BGP peer to an alternate gateway service provider.DISA STIG Juniper Router RTR v3r2Juniper

ACCESS CONTROL

OL6-00-000010 - The Oracle Linux operating system must be a vendor-supported release.DISA STIG Oracle Linux 6 v2r7Unix

CONFIGURATION MANAGEMENT