Audits
Settings
Links
Tenable Cloud
Tenable Community & Support
Tenable University
Theme
Light
Dark
Auto
Help
Plugins
Overview
Plugins Pipeline
Newest
Updated
Search
Nessus Families
WAS Families
NNM Families
LCE Families
Tenable OT Security Families
About Plugin Families
Release Notes
Audits
Overview
Newest
Updated
Search Audit Files
Search Items
References
Authorities
Documentation
Download All Audit Files
Policies
Overview
Search
AWS Resources
Azure Resources
GCP Resources
Kubernetes Resources
Indicators
Overview
Search
Indicators of Attack
Indicators of Exposure
CVEs
Overview
Newest
Search
Attack Path Techniques
Overview
Search
Links
Tenable Cloud
Tenable Community & Support
Tenable University
Settings
Theme
Light
Dark
Auto
Detections
Plugins
Overview
Plugins Pipeline
Release Notes
Newest
Updated
Search
Nessus Families
WAS Families
NNM Families
LCE Families
Tenable OT Security Families
About Plugin Families
Audits
Overview
Newest
Updated
Search Audit Files
Search Items
References
Authorities
Documentation
Download All Audit Files
Policies
Overview
Search
AWS Resources
Azure Resources
GCP Resources
Kubernetes Resources
Indicators
Overview
Search
Indicators of Attack
Indicators of Exposure
Analytics
CVEs
Overview
Newest
Search
Attack Path Techniques
Overview
Search
Audits
References
CCI
CCI-002385
CCI
CCI|CCI-002385
Title
The information system protects against or limits the effects of organization-defined types of denial of service attacks by employing organization-defined security safeguards.
Reference Item Details
Reference:
CCI - DISA Control Correlation Identifier
Category:
2013
Audit Items
View all Reference Audit Items
Name
Plugin
Audit Name
3.097 - The system is configured for a greater keep-alive time than recommended.
Windows
DISA Windows Vista STIG v6r41
3.101 - The system must be configured to ignore NetBIOS name release requests except from WINS servers.
Windows
DISA Windows Vista STIG v6r41
3.104 - The system is configured to detect and configure default gateway addresses.
Windows
DISA Windows Vista STIG v6r41
5.098 - The system must limit how many times unacknowledged TCP data is retransmitted.
Windows
DISA Windows Vista STIG v6r41
5.239 - Windows Explorer - Heap Termination
Windows
DISA Windows Vista STIG v6r41
AIX7-00-003097 - AIX must protect against or limit the effects of Denial of Service (DoS) attacks by ensuring AIX is implementing rate-limiting measures on impacted network interfaces
Unix
DISA STIG AIX 7.x v2r8
AMLS-L3-000260 - The Arista Multilayer Switch must ensure all Exterior Border Gateway Protocol (eBGP) routers are configured to use Generalized TTL Security Mechanism (GTSM) or are configured to meet RFC3682.
Arista
DISA STIG Arista MLS DCS-7000 Series RTR v1r3
AS24-U1-000590 - The Apache web server must be tuned to handle the operational requirements of the hosted application.
Unix
DISA STIG Apache Server 2.4 Unix Server v2r6 Middleware
AS24-U1-000590 - The Apache web server must be tuned to handle the operational requirements of the hosted application.
Unix
DISA STIG Apache Server 2.4 Unix Server v2r6
AS24-U1-000820 - The Apache web server must be protected from being stopped by a non-privileged user - apachectl
Unix
DISA STIG Apache Server 2.4 Unix Server v2r6
AS24-U1-000820 - The Apache web server must be protected from being stopped by a non-privileged user - apachectl
Unix
DISA STIG Apache Server 2.4 Unix Server v2r6 Middleware
AS24-U1-000820 - The Apache web server must be protected from being stopped by a non-privileged user - httpd pid
Unix
DISA STIG Apache Server 2.4 Unix Server v2r6
AS24-U1-000820 - The Apache web server must be protected from being stopped by a non-privileged user - httpd pid
Unix
DISA STIG Apache Server 2.4 Unix Server v2r6 Middleware
AS24-U1-000820 - The Apache web server must be protected from being stopped by a non-privileged user - service
Unix
DISA STIG Apache Server 2.4 Unix Server v2r6
AS24-U1-000820 - The Apache web server must be protected from being stopped by a non-privileged user - service
Unix
DISA STIG Apache Server 2.4 Unix Server v2r6 Middleware
AS24-W1-000820 - The Apache web server must be protected from being stopped by a non-privileged user.
Windows
DISA STIG Apache Server 2.4 Windows Server v2r3
AS24-W1-000830 - The Apache web server must be tuned to handle the operational requirements of the hosted application.
Windows
DISA STIG Apache Server 2.4 Windows Server v2r3
AS24-W2-000830 - The Apache web server must be tuned to handle the operational requirements of the hosted application.
Windows
DISA STIG Apache Server 2.4 Windows Site v2r1
Big Sur - Protect Against Denial of Service Attacks by Ensuring Rate-Limiting Measures on Network Interfaces
Unix
NIST macOS Big Sur v1.4.0 - 800-53r4 High
Big Sur - Protect Against Denial of Service Attacks by Ensuring Rate-Limiting Measures on Network Interfaces
Unix
NIST macOS Big Sur v1.4.0 - 800-53r5 High
Big Sur - Protect Against Denial of Service Attacks by Ensuring Rate-Limiting Measures on Network Interfaces
Unix
NIST macOS Big Sur v1.4.0 - CNSSI 1253
Big Sur - Protect Against Denial of Service Attacks by Ensuring Rate-Limiting Measures on Network Interfaces
Unix
NIST macOS Big Sur v1.4.0 - 800-53r4 Moderate
Big Sur - Protect Against Denial of Service Attacks by Ensuring Rate-Limiting Measures on Network Interfaces
Unix
NIST macOS Big Sur v1.4.0 - All Profiles
Big Sur - Protect Against Denial of Service Attacks by Ensuring Rate-Limiting Measures on Network Interfaces
Unix
NIST macOS Big Sur v1.4.0 - 800-53r5 Moderate
Big Sur - Protect Against Denial of Service Attacks by Ensuring Rate-Limiting Measures on Network Interfaces
Unix
NIST macOS Big Sur v1.4.0 - 800-53r4 Low
Big Sur - Protect Against Denial of Service Attacks by Ensuring Rate-Limiting Measures on Network Interfaces
Unix
NIST macOS Big Sur v1.4.0 - 800-53r5 Low
CASA-FW-000220 - The Cisco ASA must be configured to implement scanning threat detection.
Cisco
DISA STIG Cisco ASA FW v1r4
CASA-ND-001180 - The Cisco ASA must be configured to protect against known types of Denial of Service (DoS) attacks by enabling the Threat Detection feature - DoS attacks by enabling the Threat Detection feature
Cisco
DISA STIG Cisco ASA NDM v1r5
CISC-L2-000090 - The Cisco switch must have Root Guard enabled on all switch ports connecting to access layer switches and hosts.
Cisco
DISA STIG Cisco NX-OS Switch L2S v2r2
CISC-L2-000090 - The Cisco switch must have Root Guard enabled on all switch ports connecting to access layer switches.
Cisco
DISA STIG Cisco IOS Switch L2S v2r3
CISC-L2-000090 - The Cisco switch must have Root Guard enabled on all switch ports connecting to access layer switches.
Cisco
DISA STIG Cisco IOS XE Switch L2S v2r4
CISC-L2-000100 - The Cisco switch must have BPDU Guard enabled on all user-facing or untrusted access switch ports.
Cisco
DISA STIG Cisco NX-OS Switch L2S v2r2
CISC-L2-000100 - The Cisco switch must have BPDU Guard enabled on all user-facing or untrusted access switch ports.
Cisco
DISA STIG Cisco IOS XE Switch L2S v2r4
CISC-L2-000100 - The Cisco switch must have Bridge Protocol Data Unit (BPDU) Guard enabled on all user-facing or untrusted access switch ports.
Cisco
DISA STIG Cisco IOS Switch L2S v2r3
CISC-L2-000110 - The Cisco switch must have Spanning Tree Protocol (STP) Loop Guard enabled
Cisco
DISA STIG Cisco IOS Switch L2S v2r3
CISC-L2-000110 - The Cisco switch must have STP Loop Guard enabled
Cisco
DISA STIG Cisco IOS XE Switch L2S v2r4
CISC-L2-000110 - The Cisco switch must have STP Loop Guard enabled.
Cisco
DISA STIG Cisco NX-OS Switch L2S v2r2
CISC-L2-000120 - The Cisco switch must have Unknown Unicast Flood Blocking (UUFB) enabled.
Cisco
DISA STIG Cisco NX-OS Switch L2S v2r2
CISC-L2-000120 - The Cisco switch must have Unknown Unicast Flood Blocking (UUFB) enabled.
Cisco
DISA STIG Cisco IOS Switch L2S v2r3
CISC-L2-000120 - The Cisco switch must have Unknown Unicast Flood Blocking (UUFB) enabled.
Cisco
DISA STIG Cisco IOS XE Switch L2S v2r4
CISC-L2-000130 - The Cisco switch must have DHCP snooping for all user VLANs to validate DHCP messages from untrusted sources
Cisco
DISA STIG Cisco NX-OS Switch L2S v2r2
CISC-L2-000130 - The Cisco switch must have DHCP snooping for all user VLANs to validate DHCP messages from untrusted sources
Cisco
DISA STIG Cisco IOS XE Switch L2S v2r4
CISC-L2-000130 - The Cisco switch must have DHCP snooping for all user VLANs to validate DHCP messages from untrusted sources
Cisco
DISA STIG Cisco IOS Switch L2S v2r3
CISC-L2-000140 - The Cisco switch must have IP Source Guard enabled on all user-facing or untrusted access switch ports.
Cisco
DISA STIG Cisco NX-OS Switch L2S v2r2
CISC-L2-000140 - The Cisco switch must have IP Source Guard enabled on all user-facing or untrusted access switch ports.
Cisco
DISA STIG Cisco IOS Switch L2S v2r3
CISC-L2-000140 - The Cisco switch must have IP Source Guard enabled on all user-facing or untrusted access switch ports.
Cisco
DISA STIG Cisco IOS XE Switch L2S v2r4
CISC-L2-000150 - The Cisco switch must have Dynamic Address Resolution Protocol (ARP) Inspection (DAI) enabled on all user VLANs.
Cisco
DISA STIG Cisco IOS XE Switch L2S v2r4
CISC-L2-000150 - The Cisco switch must have Dynamic Address Resolution Protocol (ARP) Inspection (DAI) enabled on all user VLANs.
Cisco
DISA STIG Cisco IOS Switch L2S v2r3
CISC-L2-000150 - The Cisco switch must have Dynamic Address Resolution Protocol (ARP) Inspection (DAI) enabled on all user VLANs.
Cisco
DISA STIG Cisco NX-OS Switch L2S v2r2
CISC-ND-001220 - The Cisco router must be configured to protect against known types of denial-of-service (DoS) attacks by employing organization-defined security safeguards.
Cisco
DISA STIG Cisco IOS Router NDM v2r6