Item Search

NameAudit NamePluginCategory
1.9.1.2 Ensure 'NTP authentication key' is configured correctlyCIS Cisco Firewall ASA 9 L1 v4.1.0Cisco

IDENTIFICATION AND AUTHENTICATION

2.8 Ensure 'credentials' are not stored in configuration files - ApplicationsCIS IIS 10 v1.2.0 Level 2Windows

IDENTIFICATION AND AUTHENTICATION

2.8 Ensure 'credentials' are not stored in configuration files - DefaultCIS IIS 10 v1.2.0 Level 2Windows

IDENTIFICATION AND AUTHENTICATION

4.1.1 Ensure peer authentication is set to MD5CIS Juniper OS Benchmark v2.1.0 L1Juniper

IDENTIFICATION AND AUTHENTICATION

4.2.1 Ensure IS-IS neighbor authentication is set to MD5CIS Juniper OS Benchmark v2.1.0 L1Juniper

IDENTIFICATION AND AUTHENTICATION

4.2.3 Ensure authentication check is not suppressedCIS Juniper OS Benchmark v2.1.0 L1Juniper

IDENTIFICATION AND AUTHENTICATION

4.2.4 Ensure loose authentication check is not configuredCIS Juniper OS Benchmark v2.1.0 L1Juniper

IDENTIFICATION AND AUTHENTICATION

4.2.5 Ensure IS-IS Hello authentication check is not suppressedCIS Juniper OS Benchmark v2.1.0 L1Juniper

IDENTIFICATION AND AUTHENTICATION

4.2.7 Ensure CSNP authentication check is not set to suppressedCIS Juniper OS Benchmark v2.1.0 L1Juniper

IDENTIFICATION AND AUTHENTICATION

4.3.1 Ensure OSPF authentication is set to MD5CIS Juniper OS Benchmark v2.1.0 L1Juniper

IDENTIFICATION AND AUTHENTICATION

4.3.2 Ensure OSPF authentication is set to IPSEC SA with SHACIS Juniper OS Benchmark v2.1.0 L2Juniper

IDENTIFICATION AND AUTHENTICATION

4.4.1 Ensure OSPFv3 authentication is set to IPSEC SA - ipsec-saCIS Juniper OS Benchmark v2.1.0 L1Juniper

IDENTIFICATION AND AUTHENTICATION

4.4.1 Ensure OSPFv3 authentication is set to IPSEC SA - md5CIS Juniper OS Benchmark v2.1.0 L1Juniper

IDENTIFICATION AND AUTHENTICATION

4.5.1 Ensure RIP authentication is set to MD5CIS Juniper OS Benchmark v2.1.0 L1Juniper

IDENTIFICATION AND AUTHENTICATION

4.7.1 Ensure authentication is set to MD5CIS Juniper OS Benchmark v2.1.0 L1Juniper

IDENTIFICATION AND AUTHENTICATION

4.8.1 Ensure authentication is set to MD5CIS Juniper OS Benchmark v2.1.0 L1Juniper

IDENTIFICATION AND AUTHENTICATION

4.9.1 Ensure Secure Neighbor Discovery is configuredCIS Juniper OS Benchmark v2.1.0 L2Juniper

IDENTIFICATION AND AUTHENTICATION

4.11.1 Ensure authentication is set to MD5CIS Juniper OS Benchmark v2.1.0 L1Juniper

IDENTIFICATION AND AUTHENTICATION

5.3.3 Ensure password hashing algorithm is SHA-512CIS Fedora 19 Family Linux Workstation L1 v1.0.0Unix

IDENTIFICATION AND AUTHENTICATION

5.3.4 Ensure password hashing algorithm is SHA-512CIS Debian 9 Workstation L1 v1.0.1Unix

IDENTIFICATION AND AUTHENTICATION

5.3.4 Ensure password hashing algorithm is SHA-512CIS Debian 9 Server L1 v1.0.1Unix

IDENTIFICATION AND AUTHENTICATION

5.3.4 Ensure password hashing algorithm is SHA-512CIS Debian Family Server L1 v1.0.0Unix

IDENTIFICATION AND AUTHENTICATION

5.3.4 Ensure password hashing algorithm is SHA-512CIS Debian Family Workstation L1 v1.0.0Unix

IDENTIFICATION AND AUTHENTICATION

5.3.4 Ensure password hashing algorithm is SHA-512 - password-authCIS Amazon Linux 2 STIG v1.0.0 L1Unix

IDENTIFICATION AND AUTHENTICATION

5.3.4 Ensure password hashing algorithm is SHA-512 - system-authCIS Amazon Linux 2 STIG v1.0.0 L1Unix

IDENTIFICATION AND AUTHENTICATION

5.4.4 Ensure password hashing algorithm is SHA-512CIS Ubuntu Linux 16.04 LTS Server L1 v2.0.0Unix

IDENTIFICATION AND AUTHENTICATION

6.1 Setup Client-cert AuthenticationCIS Apache Tomcat 8 L2 v1.1.0Unix

IDENTIFICATION AND AUTHENTICATION

6.1 Setup Client-cert AuthenticationCIS Apache Tomcat 8 L2 v1.1.0 MiddlewareUnix

IDENTIFICATION AND AUTHENTICATION

6.1.2 Ensure permissions on /etc/passwd are configuredCIS Amazon Linux 2 STIG v1.0.0 L1Unix

IDENTIFICATION AND AUTHENTICATION

6.1.3 Ensure permissions on /etc/shadow are configuredCIS Amazon Linux 2 STIG v1.0.0 L1Unix

IDENTIFICATION AND AUTHENTICATION

6.1.5 Ensure permissions on /etc/group- are configuredCIS Ubuntu Linux 16.04 LTS Workstation L1 v2.0.0Unix

IDENTIFICATION AND AUTHENTICATION

6.1.6 Ensure permissions on /etc/shadow are configuredCIS Ubuntu Linux 16.04 LTS Workstation L1 v2.0.0Unix

IDENTIFICATION AND AUTHENTICATION

6.1.8 Ensure permissions on /etc/group- are configuredCIS Amazon Linux 2 STIG v1.0.0 L1Unix

IDENTIFICATION AND AUTHENTICATION

6.1.8 Ensure permissions on /etc/gshadow are configuredCIS Ubuntu Linux 16.04 LTS Workstation L1 v2.0.0Unix

IDENTIFICATION AND AUTHENTICATION

6.1.8 Ensure permissions on /etc/gshadow are configuredCIS Ubuntu Linux 16.04 LTS Server L1 v2.0.0Unix

IDENTIFICATION AND AUTHENTICATION

6.1.9 Ensure permissions on /etc/gshadow- are configuredCIS Amazon Linux 2 STIG v1.0.0 L1Unix

IDENTIFICATION AND AUTHENTICATION

6.1.9 Ensure permissions on /etc/gshadow- are configuredCIS Fedora 19 Family Linux Server L1 v1.0.0Unix

IDENTIFICATION AND AUTHENTICATION

6.2.1 Ensure accounts in /etc/passwd use shadowed passwordsCIS Oracle Linux 6 Workstation L1 v2.0.0Unix

IDENTIFICATION AND AUTHENTICATION

6.2.2 Ensure /etc/shadow password fields are not emptyCIS Oracle Linux 6 Server L1 v2.0.0Unix

IDENTIFICATION AND AUTHENTICATION

6.2.9 Ensure no users have .rhosts filesCIS Debian Family Workstation L1 v1.0.0Unix

IDENTIFICATION AND AUTHENTICATION

6.2.9 Ensure no users have .rhosts filesCIS Debian Family Server L1 v1.0.0Unix

IDENTIFICATION AND AUTHENTICATION

6.2.12 Ensure no users have .netrc filesCIS Amazon Linux 2 STIG v1.0.0 L1Unix

IDENTIFICATION AND AUTHENTICATION

6.2.12 Ensure no users have .rhosts filesCIS Fedora 19 Family Linux Workstation L1 v1.0.0Unix

IDENTIFICATION AND AUTHENTICATION

6.2.12 Ensure no users have .rhosts filesCIS Fedora 19 Family Linux Server L1 v1.0.0Unix

IDENTIFICATION AND AUTHENTICATION

6.2.14 Ensure no users have .rhosts filesCIS SUSE Linux Enterprise Workstation 11 L1 v2.1.1Unix

IDENTIFICATION AND AUTHENTICATION

6.2.14 Ensure no users have .rhosts filesCIS Aliyun Linux 2 L1 v1.0.0Unix

IDENTIFICATION AND AUTHENTICATION

7.1 Ensure appropriate key file permissions are set - PEMKeyFileCIS MongoDB 5 L1 OS Linux v1.1.0Unix

IDENTIFICATION AND AUTHENTICATION

7.1 Ensure appropriate key file permissions are set - PEMKeyFileCIS MongoDB 6 L1 OS Linux v1.0.0Unix

IDENTIFICATION AND AUTHENTICATION

8.5 Ensure each Zone has a Valid Digital SignatureCIS BIND DNS v1.0.0 L2 Authoritative Name ServerUnix

IDENTIFICATION AND AUTHENTICATION

18.8.4.1 Ensure 'Encryption Oracle Remediation' is set to 'Enabled: Force Updated Clients'CIS Microsoft Windows 8.1 v2.4.1 L1Windows

IDENTIFICATION AND AUTHENTICATION