Item Search

NameAudit NamePluginCategory
1.9.1.2 Ensure 'NTP authentication key' is configured correctlyCIS Cisco Firewall ASA 9 L1 v4.1.0Cisco

IDENTIFICATION AND AUTHENTICATION

2.8 Ensure 'credentials' are not stored in configuration files - ApplicationsCIS IIS 10 v1.2.1 Level 2Windows

IDENTIFICATION AND AUTHENTICATION

4.1.2 Ensure peer authentication is set to IPSEC SACIS Juniper OS Benchmark v2.1.0 L2Juniper

IDENTIFICATION AND AUTHENTICATION

4.2.2 Ensure IS-IS neighbor authentication is set to SHA1CIS Juniper OS Benchmark v2.1.0 L2Juniper

IDENTIFICATION AND AUTHENTICATION

4.2.3 Ensure authentication check is not suppressedCIS Juniper OS Benchmark v2.1.0 L1Juniper

IDENTIFICATION AND AUTHENTICATION

4.2.4 Ensure loose authentication check is not configuredCIS Juniper OS Benchmark v2.1.0 L1Juniper

IDENTIFICATION AND AUTHENTICATION

4.2.5 Ensure IS-IS Hello authentication check is not suppressedCIS Juniper OS Benchmark v2.1.0 L1Juniper

IDENTIFICATION AND AUTHENTICATION

4.3.1 Ensure OSPF authentication is set to MD5CIS Juniper OS Benchmark v2.1.0 L1Juniper

IDENTIFICATION AND AUTHENTICATION

4.3.2 Ensure OSPF authentication is set to IPSEC SA with SHACIS Juniper OS Benchmark v2.1.0 L2Juniper

IDENTIFICATION AND AUTHENTICATION

4.4.1 Ensure OSPFv3 authentication is set to IPSEC SA - md5CIS Juniper OS Benchmark v2.1.0 L1Juniper

IDENTIFICATION AND AUTHENTICATION

4.7.1 Ensure authentication is set to MD5CIS Juniper OS Benchmark v2.1.0 L1Juniper

IDENTIFICATION AND AUTHENTICATION

4.7.2 Ensure authentication is set to AES-CMACCIS Juniper OS Benchmark v2.1.0 L2Juniper

IDENTIFICATION AND AUTHENTICATION

5.3.3 Ensure password hashing algorithm is SHA-512CIS Fedora 19 Family Linux Server L1 v1.0.0Unix

IDENTIFICATION AND AUTHENTICATION

5.3.4 Ensure password hashing algorithm is SHA-512CIS Debian 9 Workstation L1 v1.0.1Unix

IDENTIFICATION AND AUTHENTICATION

5.3.4 Ensure password hashing algorithm is SHA-512 - password-authCIS Aliyun Linux 2 L1 v1.0.0Unix

IDENTIFICATION AND AUTHENTICATION

5.3.4 Ensure password hashing algorithm is SHA-512 - system-authCIS Aliyun Linux 2 L1 v1.0.0Unix

IDENTIFICATION AND AUTHENTICATION

5.3.4 Ensure password hashing algorithm is SHA-512 - system-authCIS Amazon Linux 2 STIG v1.0.0 L1Unix

IDENTIFICATION AND AUTHENTICATION

6.1 Setup Client-cert AuthenticationCIS Apache Tomcat 8 L2 v1.1.0Unix

IDENTIFICATION AND AUTHENTICATION

6.1.2 Ensure permissions on /etc/passwd are configuredCIS Amazon Linux 2 STIG v1.0.0 L1Unix

IDENTIFICATION AND AUTHENTICATION

6.1.3 Ensure permissions on /etc/passwd- are configuredCIS Ubuntu Linux 16.04 LTS Workstation L1 v2.0.0Unix

IDENTIFICATION AND AUTHENTICATION

6.1.3 Ensure permissions on /etc/passwd- are configuredCIS Ubuntu Linux 16.04 LTS Server L1 v2.0.0Unix

IDENTIFICATION AND AUTHENTICATION

6.1.3 Ensure permissions on /etc/shadow are configuredCIS Amazon Linux 2 STIG v1.0.0 L1Unix

IDENTIFICATION AND AUTHENTICATION

6.1.4 Ensure permissions on /etc/group are configuredCIS Amazon Linux 2 STIG v1.0.0 L1Unix

IDENTIFICATION AND AUTHENTICATION

6.1.5 Ensure permissions on /etc/gshadow are configuredCIS Amazon Linux 2 STIG v1.0.0 L1Unix

IDENTIFICATION AND AUTHENTICATION

6.1.6 Ensure permissions on /etc/passwd- are configuredCIS Amazon Linux 2 STIG v1.0.0 L1Unix

IDENTIFICATION AND AUTHENTICATION

6.1.6 Ensure permissions on /etc/shadow are configuredCIS Ubuntu Linux 16.04 LTS Server L1 v2.0.0Unix

IDENTIFICATION AND AUTHENTICATION

6.1.7 Ensure permissions on /etc/shadow- are configuredCIS Amazon Linux 2 STIG v1.0.0 L1Unix

IDENTIFICATION AND AUTHENTICATION

6.1.8 Ensure permissions on /etc/group- are configuredCIS Amazon Linux 2 STIG v1.0.0 L1Unix

IDENTIFICATION AND AUTHENTICATION

6.1.8 Ensure permissions on /etc/gshadow are configuredCIS Ubuntu Linux 16.04 LTS Server L1 v2.0.0Unix

IDENTIFICATION AND AUTHENTICATION

6.1.9 Ensure permissions on /etc/gshadow- are configuredCIS Amazon Linux 2 STIG v1.0.0 L1Unix

IDENTIFICATION AND AUTHENTICATION

6.1.9 Ensure permissions on /etc/gshadow- are configuredCIS Fedora 19 Family Linux Server L1 v1.0.0Unix

IDENTIFICATION AND AUTHENTICATION

6.2.1 Ensure accounts in /etc/passwd use shadowed passwordsCIS CentOS 6 Workstation L1 v3.0.0Unix

IDENTIFICATION AND AUTHENTICATION

6.2.2 Ensure /etc/shadow password fields are not emptyCIS CentOS 6 Server L1 v3.0.0Unix

IDENTIFICATION AND AUTHENTICATION

6.2.2 Ensure /etc/shadow password fields are not emptyCIS Oracle Linux 6 Server L1 v2.0.0Unix

IDENTIFICATION AND AUTHENTICATION

6.2.9 Ensure no users have .rhosts filesCIS Debian Family Server L1 v1.0.0Unix

IDENTIFICATION AND AUTHENTICATION

6.2.9 Ensure no users have .rhosts filesCIS Debian Family Workstation L1 v1.0.0Unix

IDENTIFICATION AND AUTHENTICATION

6.2.10 Ensure no users have .rhosts filesCIS Ubuntu Linux 16.04 LTS Workstation L1 v2.0.0Unix

IDENTIFICATION AND AUTHENTICATION

6.2.10 Ensure no users have .rhosts filesCIS Ubuntu Linux 16.04 LTS Server L1 v2.0.0Unix

IDENTIFICATION AND AUTHENTICATION

6.2.12 Ensure no users have .netrc filesCIS Aliyun Linux 2 L1 v1.0.0Unix

IDENTIFICATION AND AUTHENTICATION

6.2.12 Ensure no users have .netrc filesCIS Amazon Linux 2 STIG v1.0.0 L1Unix

IDENTIFICATION AND AUTHENTICATION

6.2.12 Ensure no users have .rhosts filesCIS Fedora 19 Family Linux Workstation L1 v1.0.0Unix

IDENTIFICATION AND AUTHENTICATION

6.2.14 Ensure no users have .rhosts filesCIS Amazon Linux 2 STIG v1.0.0 L1Unix

IDENTIFICATION AND AUTHENTICATION

7.1 Ensure appropriate key file permissions are setCIS MongoDB 6 L1 OS Windows v1.1.0Windows

IDENTIFICATION AND AUTHENTICATION

7.1 Ensure appropriate key file permissions are setCIS MongoDB 7 L1 OS Windows v1.0.0Windows

IDENTIFICATION AND AUTHENTICATION

7.1 Ensure appropriate key file permissions are setCIS MongoDB 5 L1 OS Windows v1.2.0Windows

IDENTIFICATION AND AUTHENTICATION

7.1 Ensure appropriate key file permissions are set - keyFileCIS MongoDB 5 L1 OS Linux v1.2.0Unix

IDENTIFICATION AND AUTHENTICATION

7.1 Ensure appropriate key file permissions are set - keyFileCIS MongoDB 6 L1 OS Linux v1.1.0Unix

IDENTIFICATION AND AUTHENTICATION

7.1 Ensure appropriate key file permissions are set - PEMKeyFileCIS MongoDB 5 L1 OS Linux v1.2.0Unix

IDENTIFICATION AND AUTHENTICATION

8.5 Ensure each Zone has a Valid Digital SignatureCIS BIND DNS v1.0.0 L2 Authoritative Name ServerUnix

IDENTIFICATION AND AUTHENTICATION

18.8.4.2 Ensure 'Remote host allows delegation of non-exportable credentials' is set to 'Enabled'CIS Microsoft Windows 8.1 v2.4.1 L1Windows

IDENTIFICATION AND AUTHENTICATION