Item Search

NameAudit NamePluginCategory
1.1.13 Ensure separate partition exists for /var/log/auditCIS Amazon Linux 2 STIG v1.0.0 L2Unix

AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT

1.2 Do Not Install a Multi-Use System - systemctlCIS BIND DNS v1.0.0 L1 Caching Only Name ServerUnix

CONFIGURATION MANAGEMENT

1.8.14 Ensure the screensaver idle-activation-enabled settingCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIGUnix

ACCESS CONTROL

4.1.2.14 Ensure audit of the rmdir syscall - 32 bitCIS Amazon Linux 2 STIG v1.0.0 L3Unix

AUDIT AND ACCOUNTABILITY

4.1.2.16 Ensure audit unlinkat syscall - 32 bitCIS Amazon Linux 2 STIG v1.0.0 L3Unix

AUDIT AND ACCOUNTABILITY

4.1.2.25 Ensure audit of the mount command and syscallCIS Amazon Linux 2 STIG v1.0.0 L3Unix

AUDIT AND ACCOUNTABILITY

4.1.6 Ensure events that modify user/group information are collected - /etc/groupCIS Amazon Linux 2 STIG v1.0.0 L2Unix

AUDIT AND ACCOUNTABILITY

4.1.6 Ensure events that modify user/group information are collected - /etc/passwdCIS Amazon Linux 2 STIG v1.0.0 L2Unix

AUDIT AND ACCOUNTABILITY

4.1.21 Ensure auditing of all privileged functions - setgid 32 bitCIS Amazon Linux 2 STIG v1.0.0 L3Unix

AUDIT AND ACCOUNTABILITY

4.1.21 Ensure auditing of all privileged functions - setuid 32 bitCIS Amazon Linux 2 STIG v1.0.0 L3Unix

AUDIT AND ACCOUNTABILITY

4.3 Ensure that unnecessary packages are not installed in the containerCIS Docker v1.7.0 L1 Docker - LinuxUnix

CONFIGURATION MANAGEMENT

5.4.3 Ensure password hashing algorithm is SHA-512 - system-authCIS Red Hat Enterprise Linux 7 STIG v2.0.0 L1 WorkstationUnix

IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

7.1 Ensure mod_ssl and/or mod_nss Is InstalledCIS Apache HTTP Server 2.4 L1 v2.1.0 MiddlewareUnix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

11.1 Ensure SELinux Is Enabled in Enforcing ModeCIS Apache HTTP Server 2.2 L2 v3.6.0Unix

ACCESS CONTROL

11.1 Ensure SELinux Is Enabled in Enforcing ModeCIS Apache HTTP Server 2.2 L2 v3.6.0 MiddlewareUnix

ACCESS CONTROL

11.1 Ensure SELinux Is Enabled in Enforcing Mode - configCIS Apache HTTP Server 2.4 L2 v2.1.0 MiddlewareUnix

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY, MEDIA PROTECTION

11.1 Ensure SELinux Is Enabled in Enforcing Mode - currentCIS Apache HTTP Server 2.4 L2 v2.1.0Unix

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY, MEDIA PROTECTION

11.1 Ensure SELinux Is Enabled in Enforcing Mode - currentCIS Apache HTTP Server 2.4 L2 v2.1.0 MiddlewareUnix

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY, MEDIA PROTECTION

Amazon Linux 2 is installedCIS Amazon Linux 2 v3.0.0 L1Unix
Amazon Linux 2 is installedCIS Amazon Linux 2 v3.0.0 L2Unix
Amazon Linux 2 is installedCIS Amazon Linux 2 STIG v1.0.0 L1Unix
Amazon Linux 2 is installedCIS Amazon Linux 2 STIG v1.0.0 L2Unix
check Red Hat 9.3 or greaterCIS AlmaLinux OS 9 v2.0.0 L1 ServerUnix
check Red Hat 9.3 or greaterCIS AlmaLinux OS 9 v2.0.0 L1 WorkstationUnix
check Red Hat 9.3 or greaterCIS Oracle Linux 9 v2.0.0 L1 ServerUnix
check Red Hat 9.3 or greaterCIS Oracle Linux 9 v2.0.0 L1 WorkstationUnix
check Red Hat 9.3 or greaterCIS Rocky Linux 9 v2.0.0 L1 ServerUnix
check Red Hat 9.3 or greaterCIS Rocky Linux 9 v2.0.0 L1 WorkstationUnix
MD4X-00-006600 - MongoDB must be configured in accordance with the security configuration settings based on DoD security configuration and implementation guidance, including STIGs, NSA configuration guides, CTOs, DTMs, and IAVMs.DISA STIG MongoDB Enterprise Advanced 4.x v1r4 OSUnix

CONFIGURATION MANAGEMENT

Red Hat Enterprise/CentOS 8 is installedDISA Red Hat Enterprise Linux 8 STIG v2r1Unix
Red Hat/CentOS 6 is installedDISA Red Hat Enterprise Linux 6 STIG v2r2Unix
Red Hat/CentOS 7 is installedCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIGUnix
Red Hat/CentOS 8.0 - 8.3 is installedDISA Red Hat Enterprise Linux 8 STIG v2r1Unix
Red Hat/CentOS 8.2+ is installedDISA Red Hat Enterprise Linux 8 STIG v2r1Unix
Red Hat/CentOS below 8.4 is installedDISA Red Hat Enterprise Linux 8 STIG v2r1Unix
RHEL-06-000021 - The Red Hat Enterprise Linux operating system must not contain .shosts or shosts.equiv files.DISA Red Hat Enterprise Linux 6 STIG v2r2Unix

CONFIGURATION MANAGEMENT

RHEL-06-000533 - The Red Hat Enterprise Linux operating system must have an anti-virus solution installed.DISA Red Hat Enterprise Linux 6 STIG v2r2Unix

CONFIGURATION MANAGEMENT

RHEL-07-010090 - The Red Hat Enterprise Linux operating system must have the screen package installed.DISA Red Hat Enterprise Linux 7 STIG v3r15Unix

ACCESS CONTROL

RHEL-07-010341 - The Red Hat Enterprise Linux operating system must restrict privilege elevation to authorized personnel.DISA Red Hat Enterprise Linux 7 STIG v3r15Unix

CONFIGURATION MANAGEMENT

RHEL-07-020010 - The Red Hat Enterprise Linux operating system must not have the ypserv package installed.DISA Red Hat Enterprise Linux 7 STIG v3r15Unix

CONFIGURATION MANAGEMENT

RHEL-07-020220 - The Red Hat Enterprise Linux operating system must enable the SELinux targeted policy.DISA Red Hat Enterprise Linux 7 STIG v3r15Unix

ACCESS CONTROL, SYSTEM AND INFORMATION INTEGRITY

RHEL-07-020250 - The Red Hat Enterprise Linux operating system must be a vendor supported release.DISA Red Hat Enterprise Linux 7 STIG v3r15Unix

CONFIGURATION MANAGEMENT

RHEL-07-021024 - The Red Hat Enterprise Linux operating system must mount /dev/shm with secure options.DISA Red Hat Enterprise Linux 7 STIG v3r15Unix

CONFIGURATION MANAGEMENT

RHEL-07-021300 - The Red Hat Enterprise Linux operating system must disable Kernel core dumps unless needed.DISA Red Hat Enterprise Linux 7 STIG v3r15Unix

CONFIGURATION MANAGEMENT

RHEL-07-030360 - The Red Hat Enterprise Linux operating system must audit all executions of privileged functions.DISA Red Hat Enterprise Linux 7 STIG v3r15Unix

ACCESS CONTROL

RHEL-07-032000 - The Red Hat Enterprise Linux operating system must use a virus scan program.DISA Red Hat Enterprise Linux 7 STIG v3r15Unix

CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY

RHEL-07-040201 - The Red Hat Enterprise Linux operating system must implement virtual address space randomization.DISA Red Hat Enterprise Linux 7 STIG v3r15Unix

CONFIGURATION MANAGEMENT

RHEL-07-040520 - The Red Hat Enterprise Linux operating system must enable an application firewall, if available.DISA Red Hat Enterprise Linux 7 STIG v3r15Unix

CONFIGURATION MANAGEMENT

RHEL-07-040820 - The Red Hat Enterprise Linux operating system must not have unauthorized IP tunnels configured.DISA Red Hat Enterprise Linux 7 STIG v3r15Unix

CONFIGURATION MANAGEMENT

RHEL-07-040830 - The Red Hat Enterprise Linux operating system must not forward IPv6 source-routed packets.DISA Red Hat Enterprise Linux 7 STIG v3r15Unix

CONFIGURATION MANAGEMENT