1.1.13 Ensure separate partition exists for /var/log/audit | CIS Amazon Linux 2 STIG v1.0.0 L2 | Unix | AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT |
1.2 Do Not Install a Multi-Use System - systemctl | CIS BIND DNS v1.0.0 L1 Caching Only Name Server | Unix | CONFIGURATION MANAGEMENT |
1.8.14 Ensure the screensaver idle-activation-enabled setting | CIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIG | Unix | ACCESS CONTROL |
4.1.2.14 Ensure audit of the rmdir syscall - 32 bit | CIS Amazon Linux 2 STIG v1.0.0 L3 | Unix | AUDIT AND ACCOUNTABILITY |
4.1.2.16 Ensure audit unlinkat syscall - 32 bit | CIS Amazon Linux 2 STIG v1.0.0 L3 | Unix | AUDIT AND ACCOUNTABILITY |
4.1.2.25 Ensure audit of the mount command and syscall | CIS Amazon Linux 2 STIG v1.0.0 L3 | Unix | AUDIT AND ACCOUNTABILITY |
4.1.6 Ensure events that modify user/group information are collected - /etc/group | CIS Amazon Linux 2 STIG v1.0.0 L2 | Unix | AUDIT AND ACCOUNTABILITY |
4.1.6 Ensure events that modify user/group information are collected - /etc/passwd | CIS Amazon Linux 2 STIG v1.0.0 L2 | Unix | AUDIT AND ACCOUNTABILITY |
4.1.21 Ensure auditing of all privileged functions - setgid 32 bit | CIS Amazon Linux 2 STIG v1.0.0 L3 | Unix | AUDIT AND ACCOUNTABILITY |
4.1.21 Ensure auditing of all privileged functions - setuid 32 bit | CIS Amazon Linux 2 STIG v1.0.0 L3 | Unix | AUDIT AND ACCOUNTABILITY |
4.3 Ensure that unnecessary packages are not installed in the container | CIS Docker v1.7.0 L1 Docker - Linux | Unix | CONFIGURATION MANAGEMENT |
5.4.3 Ensure password hashing algorithm is SHA-512 - system-auth | CIS Red Hat Enterprise Linux 7 STIG v2.0.0 L1 Workstation | Unix | IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION |
7.1 Ensure mod_ssl and/or mod_nss Is Installed | CIS Apache HTTP Server 2.4 L1 v2.1.0 Middleware | Unix | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION |
11.1 Ensure SELinux Is Enabled in Enforcing Mode | CIS Apache HTTP Server 2.2 L2 v3.6.0 | Unix | ACCESS CONTROL |
11.1 Ensure SELinux Is Enabled in Enforcing Mode | CIS Apache HTTP Server 2.2 L2 v3.6.0 Middleware | Unix | ACCESS CONTROL |
11.1 Ensure SELinux Is Enabled in Enforcing Mode - config | CIS Apache HTTP Server 2.4 L2 v2.1.0 Middleware | Unix | ACCESS CONTROL, AUDIT AND ACCOUNTABILITY, MEDIA PROTECTION |
11.1 Ensure SELinux Is Enabled in Enforcing Mode - current | CIS Apache HTTP Server 2.4 L2 v2.1.0 | Unix | ACCESS CONTROL, AUDIT AND ACCOUNTABILITY, MEDIA PROTECTION |
11.1 Ensure SELinux Is Enabled in Enforcing Mode - current | CIS Apache HTTP Server 2.4 L2 v2.1.0 Middleware | Unix | ACCESS CONTROL, AUDIT AND ACCOUNTABILITY, MEDIA PROTECTION |
Amazon Linux 2 is installed | CIS Amazon Linux 2 v3.0.0 L1 | Unix | |
Amazon Linux 2 is installed | CIS Amazon Linux 2 v3.0.0 L2 | Unix | |
Amazon Linux 2 is installed | CIS Amazon Linux 2 STIG v1.0.0 L1 | Unix | |
Amazon Linux 2 is installed | CIS Amazon Linux 2 STIG v1.0.0 L2 | Unix | |
check Red Hat 9.3 or greater | CIS AlmaLinux OS 9 v2.0.0 L1 Server | Unix | |
check Red Hat 9.3 or greater | CIS AlmaLinux OS 9 v2.0.0 L1 Workstation | Unix | |
check Red Hat 9.3 or greater | CIS Oracle Linux 9 v2.0.0 L1 Server | Unix | |
check Red Hat 9.3 or greater | CIS Oracle Linux 9 v2.0.0 L1 Workstation | Unix | |
check Red Hat 9.3 or greater | CIS Rocky Linux 9 v2.0.0 L1 Server | Unix | |
check Red Hat 9.3 or greater | CIS Rocky Linux 9 v2.0.0 L1 Workstation | Unix | |
MD4X-00-006600 - MongoDB must be configured in accordance with the security configuration settings based on DoD security configuration and implementation guidance, including STIGs, NSA configuration guides, CTOs, DTMs, and IAVMs. | DISA STIG MongoDB Enterprise Advanced 4.x v1r4 OS | Unix | CONFIGURATION MANAGEMENT |
Red Hat Enterprise/CentOS 8 is installed | DISA Red Hat Enterprise Linux 8 STIG v2r1 | Unix | |
Red Hat/CentOS 6 is installed | DISA Red Hat Enterprise Linux 6 STIG v2r2 | Unix | |
Red Hat/CentOS 7 is installed | CIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIG | Unix | |
Red Hat/CentOS 8.0 - 8.3 is installed | DISA Red Hat Enterprise Linux 8 STIG v2r1 | Unix | |
Red Hat/CentOS 8.2+ is installed | DISA Red Hat Enterprise Linux 8 STIG v2r1 | Unix | |
Red Hat/CentOS below 8.4 is installed | DISA Red Hat Enterprise Linux 8 STIG v2r1 | Unix | |
RHEL-06-000021 - The Red Hat Enterprise Linux operating system must not contain .shosts or shosts.equiv files. | DISA Red Hat Enterprise Linux 6 STIG v2r2 | Unix | CONFIGURATION MANAGEMENT |
RHEL-06-000533 - The Red Hat Enterprise Linux operating system must have an anti-virus solution installed. | DISA Red Hat Enterprise Linux 6 STIG v2r2 | Unix | CONFIGURATION MANAGEMENT |
RHEL-07-010090 - The Red Hat Enterprise Linux operating system must have the screen package installed. | DISA Red Hat Enterprise Linux 7 STIG v3r15 | Unix | ACCESS CONTROL |
RHEL-07-010341 - The Red Hat Enterprise Linux operating system must restrict privilege elevation to authorized personnel. | DISA Red Hat Enterprise Linux 7 STIG v3r15 | Unix | CONFIGURATION MANAGEMENT |
RHEL-07-020010 - The Red Hat Enterprise Linux operating system must not have the ypserv package installed. | DISA Red Hat Enterprise Linux 7 STIG v3r15 | Unix | CONFIGURATION MANAGEMENT |
RHEL-07-020220 - The Red Hat Enterprise Linux operating system must enable the SELinux targeted policy. | DISA Red Hat Enterprise Linux 7 STIG v3r15 | Unix | ACCESS CONTROL, SYSTEM AND INFORMATION INTEGRITY |
RHEL-07-020250 - The Red Hat Enterprise Linux operating system must be a vendor supported release. | DISA Red Hat Enterprise Linux 7 STIG v3r15 | Unix | CONFIGURATION MANAGEMENT |
RHEL-07-021024 - The Red Hat Enterprise Linux operating system must mount /dev/shm with secure options. | DISA Red Hat Enterprise Linux 7 STIG v3r15 | Unix | CONFIGURATION MANAGEMENT |
RHEL-07-021300 - The Red Hat Enterprise Linux operating system must disable Kernel core dumps unless needed. | DISA Red Hat Enterprise Linux 7 STIG v3r15 | Unix | CONFIGURATION MANAGEMENT |
RHEL-07-030360 - The Red Hat Enterprise Linux operating system must audit all executions of privileged functions. | DISA Red Hat Enterprise Linux 7 STIG v3r15 | Unix | ACCESS CONTROL |
RHEL-07-032000 - The Red Hat Enterprise Linux operating system must use a virus scan program. | DISA Red Hat Enterprise Linux 7 STIG v3r15 | Unix | CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY |
RHEL-07-040201 - The Red Hat Enterprise Linux operating system must implement virtual address space randomization. | DISA Red Hat Enterprise Linux 7 STIG v3r15 | Unix | CONFIGURATION MANAGEMENT |
RHEL-07-040520 - The Red Hat Enterprise Linux operating system must enable an application firewall, if available. | DISA Red Hat Enterprise Linux 7 STIG v3r15 | Unix | CONFIGURATION MANAGEMENT |
RHEL-07-040820 - The Red Hat Enterprise Linux operating system must not have unauthorized IP tunnels configured. | DISA Red Hat Enterprise Linux 7 STIG v3r15 | Unix | CONFIGURATION MANAGEMENT |
RHEL-07-040830 - The Red Hat Enterprise Linux operating system must not forward IPv6 source-routed packets. | DISA Red Hat Enterprise Linux 7 STIG v3r15 | Unix | CONFIGURATION MANAGEMENT |