CCI|CCI-002385

Title

The information system protects against or limits the effects of organization-defined types of denial of service attacks by employing organization-defined security safeguards.

Reference Item Details

Category: 2013

Audit Items

View all Reference Audit Items

NamePluginAudit Name
3.097 - The system is configured for a greater keep-alive time than recommended.WindowsDISA Windows Vista STIG v6r41
3.101 - The system must be configured to ignore NetBIOS name release requests except from WINS servers.WindowsDISA Windows Vista STIG v6r41
3.104 - The system is configured to detect and configure default gateway addresses.WindowsDISA Windows Vista STIG v6r41
5.098 - The system must limit how many times unacknowledged TCP data is retransmitted.WindowsDISA Windows Vista STIG v6r41
5.239 - Windows Explorer - Heap TerminationWindowsDISA Windows Vista STIG v6r41
AIX7-00-003097 - AIX must protect against or limit the effects of Denial of Service (DoS) attacks by ensuring AIX is implementing rate-limiting measures on impacted network interfacesUnixDISA STIG AIX 7.x v2r9
AMLS-L3-000260 - The Arista Multilayer Switch must ensure all Exterior Border Gateway Protocol (eBGP) routers are configured to use Generalized TTL Security Mechanism (GTSM) or are configured to meet RFC3682.AristaDISA STIG Arista MLS DCS-7000 Series RTR v1r3
ARST-L2-000030 - The Arista MLS layer 2 switch must be configured for Storm Control to limit the effects of packet flooding types of denial-of-service (DoS) attacks.AristaDISA STIG Arista MLS EOS 4.2x L2S v1r1
ARST-L2-000050 - The Arista MLS switch must have Root Guard enabled on all switch ports connecting to access layer switches and hosts.AristaDISA STIG Arista MLS EOS 4.2x L2S v1r1
ARST-L2-000060 - The Arista MLS layer 2 switch must have BPDU Guard enabled on all switch ports connecting to access layer switches and hosts.AristaDISA STIG Arista MLS EOS 4.2x L2S v1r1
ARST-L2-000070 - The Arista MLS switch must have STP Loop Guard enabled on all nondesignated STP switch ports.AristaDISA STIG Arista MLS EOS 4.2x L2S v1r1
ARST-L2-000090 - The Arista MLS layer 2 switch must have DHCP snooping for all user VLANs to validate DHCP messages from untrusted sources.AristaDISA STIG Arista MLS EOS 4.2x L2S v1r1
ARST-L2-000100 - The Arista MLS layer 2 switch must have IP Source Guard enabled on all user-facing or untrusted access switch ports.AristaDISA STIG Arista MLS EOS 4.2x L2S v1r1
ARST-L2-000110 - The Arista MLS layer 2 switch must have Dynamic Address Resolution Protocol (ARP) Inspection (DAI) enabled on all user VLANs.AristaDISA STIG Arista MLS EOS 4.2x L2S v1r1
ARST-RT-000490 - The Arista router must not be configured to have any zero-touch deployment feature enabled when connected to an operational network.AristaDISA STIG Arista MLS EOS 4.2x Router v1r1
ARST-RT-000510 - The Arista router must be configured to have gratuitous ARP disabled on all external interfaces.AristaDISA STIG Arista MLS EOS 4.2x Router v1r1
ARST-RT-000520 - The Arista router must be configured to have IP directed broadcast disabled on all interfaces.AristaDISA STIG Arista MLS EOS 4.2x Router v1r1
ARST-RT-000530 - The Arista router must be configured to have Internet Control Message Protocol (ICMP) unreachable notifications disabled on all external interfaces.AristaDISA STIG Arista MLS EOS 4.2x Router v1r1
ARST-RT-000540 - The Arista router must be configured to have Internet Control Message Protocol (ICMP) mask replies disabled on all external interfaces.AristaDISA STIG Arista MLS EOS 4.2x Router v1r1
ARST-RT-000550 - The Arista router must be configured to have Internet Control Message Protocol (ICMP) redirects disabled on all external interfaces.AristaDISA STIG Arista MLS EOS 4.2x Router v1r1
ARST-RT-000560 - The Arista BGP router must be configured to use the maximum prefixes feature to protect against route table flooding and prefix de-aggregation attacks.AristaDISA STIG Arista MLS EOS 4.2x Router v1r1
ARST-RT-000570 - The Arista BGP router must be configured to limit the prefix size on any inbound route advertisement to /24 or the least significant prefixes issued to the customer.AristaDISA STIG Arista MLS EOS 4.2x Router v1r1
ARST-RT-000600 - The Arista BGP router must be configured to enable the Generalized TTL Security Mechanism (GTSM).AristaDISA STIG Arista MLS EOS 4.2x Router v1r1
AS24-U1-000590 - The Apache web server must be tuned to handle the operational requirements of the hosted application.UnixDISA STIG Apache Server 2.4 Unix Server v2r6 Middleware
AS24-U1-000590 - The Apache web server must be tuned to handle the operational requirements of the hosted application.UnixDISA STIG Apache Server 2.4 Unix Server v2r6
AS24-U1-000820 - The Apache web server must be protected from being stopped by a non-privileged user - apachectlUnixDISA STIG Apache Server 2.4 Unix Server v2r6 Middleware
AS24-U1-000820 - The Apache web server must be protected from being stopped by a non-privileged user - apachectlUnixDISA STIG Apache Server 2.4 Unix Server v2r6
AS24-U1-000820 - The Apache web server must be protected from being stopped by a non-privileged user - httpd pidUnixDISA STIG Apache Server 2.4 Unix Server v2r6 Middleware
AS24-U1-000820 - The Apache web server must be protected from being stopped by a non-privileged user - httpd pidUnixDISA STIG Apache Server 2.4 Unix Server v2r6
AS24-U1-000820 - The Apache web server must be protected from being stopped by a non-privileged user - serviceUnixDISA STIG Apache Server 2.4 Unix Server v2r6
AS24-U1-000820 - The Apache web server must be protected from being stopped by a non-privileged user - serviceUnixDISA STIG Apache Server 2.4 Unix Server v2r6 Middleware
AS24-W1-000820 - The Apache web server must be protected from being stopped by a non-privileged user.WindowsDISA STIG Apache Server 2.4 Windows Server v2r3
AS24-W1-000830 - The Apache web server must be tuned to handle the operational requirements of the hosted application.WindowsDISA STIG Apache Server 2.4 Windows Server v2r3
AS24-W2-000830 - The Apache web server must be tuned to handle the operational requirements of the hosted application.WindowsDISA STIG Apache Server 2.4 Windows Site v2r1
Big Sur - Protect Against Denial of Service Attacks by Ensuring Rate-Limiting Measures on Network InterfacesUnixNIST macOS Big Sur v1.4.0 - 800-53r4 High
Big Sur - Protect Against Denial of Service Attacks by Ensuring Rate-Limiting Measures on Network InterfacesUnixNIST macOS Big Sur v1.4.0 - 800-53r5 High
Big Sur - Protect Against Denial of Service Attacks by Ensuring Rate-Limiting Measures on Network InterfacesUnixNIST macOS Big Sur v1.4.0 - CNSSI 1253
Big Sur - Protect Against Denial of Service Attacks by Ensuring Rate-Limiting Measures on Network InterfacesUnixNIST macOS Big Sur v1.4.0 - 800-53r4 Moderate
Big Sur - Protect Against Denial of Service Attacks by Ensuring Rate-Limiting Measures on Network InterfacesUnixNIST macOS Big Sur v1.4.0 - All Profiles
Big Sur - Protect Against Denial of Service Attacks by Ensuring Rate-Limiting Measures on Network InterfacesUnixNIST macOS Big Sur v1.4.0 - 800-53r5 Moderate
Big Sur - Protect Against Denial of Service Attacks by Ensuring Rate-Limiting Measures on Network InterfacesUnixNIST macOS Big Sur v1.4.0 - 800-53r4 Low
Big Sur - Protect Against Denial of Service Attacks by Ensuring Rate-Limiting Measures on Network InterfacesUnixNIST macOS Big Sur v1.4.0 - 800-53r5 Low
CASA-FW-000220 - The Cisco ASA must be configured to implement scanning threat detection.CiscoDISA STIG Cisco ASA FW v1r4
CASA-ND-001180 - The Cisco ASA must be configured to protect against known types of denial-of-service (DoS) attacks by enabling the Threat Detection feature - DoS attacks by enabling the Threat Detection featureCiscoDISA STIG Cisco ASA NDM v1r6
CISC-L2-000090 - The Cisco switch must have Root Guard enabled on all switch ports connecting to access layer switches and hosts.CiscoDISA STIG Cisco NX-OS Switch L2S v2r2
CISC-L2-000090 - The Cisco switch must have Root Guard enabled on all switch ports connecting to access layer switches.CiscoDISA STIG Cisco IOS XE Switch L2S v2r5
CISC-L2-000090 - The Cisco switch must have Root Guard enabled on all switch ports connecting to access layer switches.CiscoDISA STIG Cisco IOS Switch L2S v2r4
CISC-L2-000100 - The Cisco switch must have BPDU Guard enabled on all user-facing or untrusted access switch ports.CiscoDISA STIG Cisco NX-OS Switch L2S v2r2
CISC-L2-000100 - The Cisco switch must have BPDU Guard enabled on all user-facing or untrusted access switch ports.CiscoDISA STIG Cisco IOS XE Switch L2S v2r5
CISC-L2-000100 - The Cisco switch must have Bridge Protocol Data Unit (BPDU) Guard enabled on all user-facing or untrusted access switch ports.CiscoDISA STIG Cisco IOS Switch L2S v2r4