Item Search

NameAudit NamePluginCategory
1.1.3.17.9 Set 'User Account Control: Only elevate executables that are signed and validated' to 'Disabled'CIS Windows 8 L1 v1.0.0Windows

SYSTEM AND INFORMATION INTEGRITY

1.1.11 - /etc/security/login.cfg - 'pwd_algorithm = ssha256 (AIX 5.3 TL7+ only)'CIS AIX 5.3/6.1 L2 v1.1.0Unix

IDENTIFICATION AND AUTHENTICATION, SYSTEM AND INFORMATION INTEGRITY

1.2.2 Ensure GPG keys are configuredCIS Amazon Linux v2.1.0 L1Unix

SYSTEM AND INFORMATION INTEGRITY

1.2.2 Ensure GPG keys are configuredCIS Ubuntu Linux 14.04 LTS Server L1 v2.1.0Unix

SYSTEM AND INFORMATION INTEGRITY

1.2.2 Ensure GPG keys are configuredCIS Ubuntu Linux 14.04 LTS Workstation L1 v2.1.0Unix

SYSTEM AND INFORMATION INTEGRITY

1.2.3 Ensure gpgcheck is globally activatedCIS Amazon Linux v2.1.0 L1Unix

SYSTEM AND INFORMATION INTEGRITY

1.2.4 Ensure software packages have been digitally signed by a Certificate Authority (CA)CIS Amazon Linux 2 STIG v1.0.0 L3Unix

SYSTEM AND INFORMATION INTEGRITY

2.1.1 Ensure Trusted Execution Path is enabledCIS IBM AIX 7 v1.0.0 L2Unix

ACCESS CONTROL, SYSTEM AND INFORMATION INTEGRITY

2.3.31.1 Ensure 'Legacy format signatures' is set to 'Disabled'CIS Microsoft Office Enterprise v1.2.0 L1Windows

SYSTEM AND INFORMATION INTEGRITY

2.4 Do not use insecure registriesCIS Docker 1.11.0 v1.0.0 L1 DockerUnix

SYSTEM AND INFORMATION INTEGRITY

2.4 Do not use insecure registriesCIS Docker 1.12.0 v1.0.0 L1 DockerUnix

SYSTEM AND INFORMATION INTEGRITY

2.4 Do not use insecure registriesCIS Docker 1.13.0 v1.0.0 L1 DockerUnix

SYSTEM AND INFORMATION INTEGRITY

2.4 Ensure insecure registries are not usedCIS Docker Community Edition v1.1.0 L1 DockerUnix

SYSTEM AND INFORMATION INTEGRITY

2.5 Do not use insecure registriesCIS Docker 1.6 v1.0.0 L1 DockerUnix

SYSTEM AND INFORMATION INTEGRITY

2.5.6 - NFS - secure NFS - 'all entries in /etc/exports contain sec='CIS AIX 5.3/6.1 L2 v1.1.0Unix

SYSTEM AND INFORMATION INTEGRITY

2.15.1 - TE - implementation (AIX 6.1 only) - 'TE is enabled'CIS AIX 5.3/6.1 L2 v1.1.0Unix

SYSTEM AND INFORMATION INTEGRITY

2.15.1 - TE - implementation (AIX 6.1 only) - 'TEP is enabled'CIS AIX 5.3/6.1 L2 v1.1.0Unix

SYSTEM AND INFORMATION INTEGRITY

2.29.2 Ensure 'Legacy Format Signatures' is set to DisabledCIS Microsoft Office 2016 v1.1.0Windows

SYSTEM AND INFORMATION INTEGRITY

4.5 Enable Content trust for DockerCIS Docker 1.12.0 v1.0.0 L2 DockerUnix

SYSTEM AND INFORMATION INTEGRITY

4.5 Enable Content trust for DockerCIS Docker 1.11.0 v1.0.0 L2 DockerUnix

SYSTEM AND INFORMATION INTEGRITY

4.5 Enable Content trust for DockerCIS Docker 1.13.0 v1.0.0 L2 DockerUnix

SYSTEM AND INFORMATION INTEGRITY

4.5 Ensure Content trust for Docker is EnabledCIS Docker Community Edition v1.1.0 L2 DockerUnix

SYSTEM AND INFORMATION INTEGRITY

4.8.1 TE - implementationCIS IBM AIX 7.2 L2 v1.1.0Unix

SYSTEM AND INFORMATION INTEGRITY

Big Sur - Enable Authenticated RootNIST macOS Big Sur v1.4.0 - 800-53r4 HighUnix

ACCESS CONTROL, CONFIGURATION MANAGEMENT, MAINTENANCE, SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY

Big Sur - Enable Authenticated RootNIST macOS Big Sur v1.4.0 - 800-53r4 LowUnix

ACCESS CONTROL, CONFIGURATION MANAGEMENT, MAINTENANCE, SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY

Big Sur - Enable Authenticated RootNIST macOS Big Sur v1.4.0 - 800-53r5 ModerateUnix

ACCESS CONTROL, CONFIGURATION MANAGEMENT, MAINTENANCE, SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY

Big Sur - Enable Authenticated RootNIST macOS Big Sur v1.4.0 - 800-53r5 HighUnix

ACCESS CONTROL, CONFIGURATION MANAGEMENT, MAINTENANCE, SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY

Big Sur - Enable Authenticated RootNIST macOS Big Sur v1.4.0 - 800-171Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT, MAINTENANCE, SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY

Big Sur - Enable Authenticated RootNIST macOS Big Sur v1.4.0 - 800-53r4 ModerateUnix

ACCESS CONTROL, CONFIGURATION MANAGEMENT, MAINTENANCE, SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY

Big Sur - Enable Authenticated RootNIST macOS Big Sur v1.4.0 - All ProfilesUnix

ACCESS CONTROL, CONFIGURATION MANAGEMENT, MAINTENANCE, SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY

Big Sur - Enable Authenticated RootNIST macOS Big Sur v1.4.0 - CNSSI 1253Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT, MAINTENANCE, SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY

Big Sur - Enable Authenticated RootNIST macOS Big Sur v1.4.0 - 800-53r5 LowUnix

ACCESS CONTROL, CONFIGURATION MANAGEMENT, MAINTENANCE, SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY

Ensure GPG keys are configured - apt-key listTenable Cisco Firepower Management Center OS Best Practices AuditUnix

SYSTEM AND INFORMATION INTEGRITY

Ensure GPG keys are configured - yumTenable Cisco Firepower Management Center OS Best Practices AuditUnix

SYSTEM AND INFORMATION INTEGRITY

FireEye - Boot image must be signedTNS FireEyeFireEye

SYSTEM AND INFORMATION INTEGRITY

IBM i : Verify Object on Restore (QVFYOBJRST) - '3'IBM iSeries Security Reference v5r4AS/400

SYSTEM AND INFORMATION INTEGRITY

IBM i : Verify Object on Restore (QVFYOBJRST) - '3'IBM System i Security Reference for V7R3AS/400

SYSTEM AND INFORMATION INTEGRITY

IBM i : Verify Object on Restore (QVFYOBJRST) - '3'IBM System i Security Reference for V7R1 and V6R1AS/400

SYSTEM AND INFORMATION INTEGRITY

IBM i : Verify Object on Restore (QVFYOBJRST) - '3'IBM System i Security Reference for V7R2AS/400

SYSTEM AND INFORMATION INTEGRITY

Monterey - Enable Authenticated RootNIST macOS Monterey v1.0.0 - 800-53r4 LowUnix

ACCESS CONTROL, CONFIGURATION MANAGEMENT, MAINTENANCE, SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY

Monterey - Enable Authenticated RootNIST macOS Monterey v1.0.0 - All ProfilesUnix

ACCESS CONTROL, CONFIGURATION MANAGEMENT, MAINTENANCE, SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY

Monterey - Enable Authenticated RootNIST macOS Monterey v1.0.0 - 800-171Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT, MAINTENANCE, SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY

Monterey - Enable Authenticated RootNIST macOS Monterey v1.0.0 - 800-53r4 HighUnix

ACCESS CONTROL, CONFIGURATION MANAGEMENT, MAINTENANCE, SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY

Monterey - Enable Authenticated RootNIST macOS Monterey v1.0.0 - 800-53r4 ModerateUnix

ACCESS CONTROL, CONFIGURATION MANAGEMENT, MAINTENANCE, SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY

Monterey - Enable Authenticated RootNIST macOS Monterey v1.0.0 - 800-53r5 HighUnix

ACCESS CONTROL, CONFIGURATION MANAGEMENT, MAINTENANCE, SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY

Monterey - Enable Authenticated RootNIST macOS Monterey v1.0.0 - 800-53r5 LowUnix

ACCESS CONTROL, CONFIGURATION MANAGEMENT, MAINTENANCE, SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY

Monterey - Enable Authenticated RootNIST macOS Monterey v1.0.0 - CNSSI 1253Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT, MAINTENANCE, SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY

SQL2-00-015355 - Software, applications, and configuration files that are part of, or related to, the SQL Server 2012 installation must be audited.DISA STIG SQL Server 2012 Database OS Audit v1r20Windows

SYSTEM AND INFORMATION INTEGRITY

System settings: Use Certificate Rules on Windows Executables for Software Restriction PoliciesMSCT Windows Server 2012 R2 DC v1.0.0Windows

SYSTEM AND INFORMATION INTEGRITY

System settings: Use Certificate Rules on Windows Executables for Software Restriction PoliciesMSCT Windows Server 2012 R2 MS v1.0.0Windows

SYSTEM AND INFORMATION INTEGRITY