Item Search

NameAudit NamePluginCategory
1.2 Ensure the Server Is Not a Multi-Use SystemCIS Apache HTTP Server 2.2 L1 v3.6.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION

1.2 Ensure the Server Is Not a Multi-Use SystemCIS Apache HTTP Server 2.2 L1 v3.6.0 MiddlewareUnix

SYSTEM AND COMMUNICATIONS PROTECTION

1.2 Ensure the Server Is Not a Multi-Use SystemCIS Apache HTTP Server 2.2 L2 v3.6.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION

1.2 Ensure the Server Is Not a Multi-Use SystemCIS Apache HTTP Server 2.4 v2.3.0 L1Unix

CONFIGURATION MANAGEMENT

1.2 RHEL-09-211010CIS Red Hat Enterprise Linux 9 STIG v1.0.0 CAT IUnix

CONFIGURATION MANAGEMENT

1.2.1 Configure Connection to the RHN RPM RepositoriesCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

SYSTEM AND INFORMATION INTEGRITY

1.2.1.6 Ensure cryptographic verification of vendor software packagesCIS Red Hat Enterprise Linux 8 STIG v2.0.0 STIGUnix

CONFIGURATION MANAGEMENT

1.2.2 Verify Red Hat GPG Key is InstalledCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

SYSTEM AND INFORMATION INTEGRITY

1.2.4 Ensure Red Hat Network or Subscription Manager connection is configuredCIS Red Hat 6 Server L1 v3.0.0Unix

SYSTEM AND INFORMATION INTEGRITY

1.2.4 Ensure Red Hat Network or Subscription Manager connection is configuredCIS Red Hat 6 Workstation L1 v3.0.0Unix

SYSTEM AND INFORMATION INTEGRITY

1.2.4 Ensure Red Hat Subscription Manager connection is configuredCIS Red Hat Enterprise Linux 7 STIG v2.0.0 L1 ServerUnix

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

1.2.4 Ensure Red Hat Subscription Manager connection is configuredCIS Red Hat Enterprise Linux 7 STIG v2.0.0 L2 ServerUnix

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

1.2.6 Ensure the version of the operating system is an active vendor supported releaseCIS Amazon Linux 2 STIG v2.0.0 STIGUnix

CONFIGURATION MANAGEMENT

1.2.8 Ensure the version of the operating system is an active vendor supported releaseCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIGUnix

CONFIGURATION MANAGEMENT

1.2.21 Configure Kubernetes API Server Maximum Audit Log SizeCIS Red Hat OpenShift Container Platform v1.9.0 L1OpenShift

AUDIT AND ACCOUNTABILITY

1.3 Ensure Apache Is Installed From the Appropriate BinariesCIS Apache HTTP Server 2.2 L1 v3.6.0 MiddlewareUnix

CONFIGURATION MANAGEMENT

1.3 Ensure Apache Is Installed From the Appropriate BinariesCIS Apache HTTP Server 2.2 L1 v3.6.0Unix

CONFIGURATION MANAGEMENT

1.3 Ensure Apache Is Installed From the Appropriate BinariesCIS Apache HTTP Server 2.2 L2 v3.6.0Unix

CONFIGURATION MANAGEMENT

1.3 Ensure Apache Is Installed From the Appropriate BinariesCIS Apache HTTP Server 2.4 v2.3.0 L1Unix

CONFIGURATION MANAGEMENT

1.7 Use the Latest OS ReleaseCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

SYSTEM AND INFORMATION INTEGRITY

1.43 RHEL-09-214010CIS Red Hat Enterprise Linux 9 STIG v1.0.0 CAT IIUnix

CONFIGURATION MANAGEMENT

1.49 RHEL-09-215010CIS Red Hat Enterprise Linux 9 STIG v1.0.0 CAT IIUnix

CONFIGURATION MANAGEMENT

2.1.1 Remove telnet-serverCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

CONFIGURATION MANAGEMENT

2.2.4 Ensure 'LOCAL_LISTENER' Is Set AppropriatelyCIS Oracle Server 11g R2 DB v2.2.0OracleDB
3.11 Remove HTTP ServerCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

CONFIGURATION MANAGEMENT

3.14 Remove HTTP Proxy ServerCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

CONFIGURATION MANAGEMENT

7.2 Disable System AccountsCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

ACCESS CONTROL

JBOS-AS-000225 - Google Analytics must be disabled in EAP Console.DISA JBoss Enterprise Application Platform 6.3 STIG v2r6Unix

CONFIGURATION MANAGEMENT

JBOS-AS-000680 - Production JBoss servers must be supported by the vendor.DISA JBoss Enterprise Application Platform 6.3 STIG v2r6Unix

SYSTEM AND INFORMATION INTEGRITY

RHEL-06-000008 - Vendor-provided cryptographic certificates must be installed to verify the integrity of system software.DISA Red Hat Enterprise Linux 6 STIG v2r2Unix

CONFIGURATION MANAGEMENT

RHEL-06-000009 - The Red Hat Network Service (rhnsd) service must not be running, unless using RHN or an RHN Satellite - 'CHKCONFIG'.DISA Red Hat Enterprise Linux 6 STIG v2r2Unix

CONFIGURATION MANAGEMENT

RHEL-06-000009 - The Red Hat Network Service (rhnsd) service must not be running, unless using RHN or an RHN Satellite - 'PROCESS_CHECK'.DISA Red Hat Enterprise Linux 6 STIG v2r2Unix

CONFIGURATION MANAGEMENT

RHEL-06-000011 - System security patches and updates must be installed and up-to-date.DISA Red Hat Enterprise Linux 6 STIG v2r2Unix

SYSTEM AND INFORMATION INTEGRITY

RHEL-07-010019 - The Red Hat Enterprise Linux operating system must ensure cryptographic verification of vendor software packages.DISA Red Hat Enterprise Linux 7 STIG v3r15Unix

CONFIGURATION MANAGEMENT

RHEL-07-020260 - The Red Hat Enterprise Linux operating system security patches and updates must be installed and up to date.DISA Red Hat Enterprise Linux 7 STIG v3r15Unix

CONFIGURATION MANAGEMENT

RHEL-07-021620 - The Red Hat Enterprise Linux operating system must use a file integrity tool that is configured to use FIPS 140-2 approved cryptographic hashes for validating file contents and directories.DISA Red Hat Enterprise Linux 7 STIG v3r15Unix

CONFIGURATION MANAGEMENT

RHEL-07-030320 - The Red Hat Enterprise Linux operating system must be configured so that the audit system takes appropriate action when the audit storage volume is full.DISA Red Hat Enterprise Linux 7 STIG v3r15Unix

AUDIT AND ACCOUNTABILITY

RHEL-07-030321 - The Red Hat Enterprise Linux operating system must be configured so that the audit system takes appropriate action when there is an error sending audit records to a remote system.DISA Red Hat Enterprise Linux 7 STIG v3r15Unix

AUDIT AND ACCOUNTABILITY

RHEL-08-010000 - RHEL 8 must be a vendor-supported release.DISA Red Hat Enterprise Linux 8 STIG v2r7Unix

CONFIGURATION MANAGEMENT

RHEL-08-010010 - RHEL 8 vendor packaged system security patches and updates must be installed and up to date.DISA Red Hat Enterprise Linux 8 STIG v2r7Unix

CONFIGURATION MANAGEMENT

RHEL-08-010019 - RHEL 8 must ensure cryptographic verification of vendor software packages.DISA Red Hat Enterprise Linux 8 STIG v2r7Unix

CONFIGURATION MANAGEMENT

RHEL-08-020090 - RHEL 8 must map the authenticated identity to the user or group account for PKI-based authentication.DISA Red Hat Enterprise Linux 8 STIG v2r7Unix

IDENTIFICATION AND AUTHENTICATION

RHEL-09-211010 - RHEL 9 must be a vendor-supported release.DISA Red Hat Enterprise Linux 9 STIG v2r8Unix

CONFIGURATION MANAGEMENT

RHEL-09-214010 - RHEL 9 must ensure cryptographic verification of vendor software packages.DISA Red Hat Enterprise Linux 9 STIG v2r8Unix

CONFIGURATION MANAGEMENT

RHEL-09-215010 - RHEL 9 subscription-manager package must be installed.DISA Red Hat Enterprise Linux 9 STIG v2r8Unix

CONFIGURATION MANAGEMENT

RHEL-10-000500 - RHEL 10 must enable FIPS mode.DISA Red Hat Enterprise Linux 10 STIG v1r1Unix

ACCESS CONTROL, MAINTENANCE, SYSTEM AND COMMUNICATIONS PROTECTION

RHEL-10-001000 - RHEL 10 must be a vendor-supported release.DISA Red Hat Enterprise Linux 10 STIG v1r1Unix

SYSTEM AND SERVICES ACQUISITION

RHEL-10-001020 - RHEL 10 must ensure cryptographic verification of vendor software packages.DISA Red Hat Enterprise Linux 10 STIG v1r1Unix

CONFIGURATION MANAGEMENT

RHEL-10-200500 - RHEL 10 must have the "subscription-manager" package installed.DISA Red Hat Enterprise Linux 10 STIG v1r1Unix

CONFIGURATION MANAGEMENT

RHEL-10-700640 - RHEL 10 must not allow users to override Secure Shell (SSH) environment variables.DISA Red Hat Enterprise Linux 10 STIG v1r1Unix

CONFIGURATION MANAGEMENT