Item Search

NameAudit NamePluginCategory
1.1.4.1 exec accountingCIS Cisco IOS XR 7.x v1.0.0 L1Cisco

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

1.1.4.3 network accountingCIS Cisco IOS XR 7.x v1.0.0 L1Cisco

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

1.1.4.4 system accountingCIS Cisco IOS XR 7.x v1.0.0 L1Cisco

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

1.6.1 Ensure 'SSH source restriction' is set to an authorized IP addressCIS Cisco ASA 9.x Firewall L1 v1.1.0Cisco

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY

1.11 Do not create access keys during initial setup for IAM users with a console passwordCIS Amazon Web Services Foundations v4.0.1 L1amazon_aws

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

2.2 Ensure Basic Registry and Quick Start security Registry are RemovedCIS IBM WebSphere Liberty v1.0.0 L1Unix

ACCESS CONTROL, MEDIA PROTECTION

2.2.5 Ensure that A Multi-factor Authentication Policy Exists for All UsersCIS Microsoft Azure Foundations v3.0.0 L2microsoft_azure

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

2.2.6 Ensure Multi-factor Authentication is Required for Risky Sign-insCIS Microsoft Azure Foundations v3.0.0 L2microsoft_azure

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

2.7 Ensure that a unique Certificate Authority is used for etcdCIS Kubernetes v1.20 Benchmark v1.0.1 L2 MasterUnix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

2.7 Ensure that a unique Certificate Authority is used for etcdCIS Kubernetes v1.10.0 L2 MasterUnix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

2.7 Ensure that a unique Certificate Authority is used for etcdCIS Kubernetes v1.23 Benchmark v1.0.1 L2 MasterUnix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

2.7 Ensure that a unique Certificate Authority is used for etcdCIS Kubernetes v1.24 Benchmark v1.0.0 L2 MasterUnix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

2.11 Ensure That 'Notify all admins when other admins reset their password?' is set to 'Yes'CIS Microsoft Azure Foundations v3.0.0 L1microsoft_azure

ACCESS CONTROL

2.14 Ensure That 'Users Can Register Applications' Is Set to 'No'CIS Microsoft Azure Foundations v3.0.0 L1microsoft_azure

ACCESS CONTROL, CONFIGURATION MANAGEMENT

3.3.1 Ensure that the Expiration Date is set for all Keys in RBAC Key VaultsCIS Microsoft Azure Foundations v3.0.0 L1microsoft_azure

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY, SYSTEM AND INFORMATION INTEGRITY

3.3.2 Ensure that the Expiration Date is set for all Keys in Non-RBAC Key Vaults.CIS Microsoft Azure Foundations v3.0.0 L1microsoft_azure

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY, SYSTEM AND INFORMATION INTEGRITY

3.3.3 Ensure that the Expiration Date is set for all Secrets in RBAC Key VaultsCIS Microsoft Azure Foundations v3.0.0 L1microsoft_azure

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY, SYSTEM AND INFORMATION INTEGRITY

3.3.4 Ensure that the Expiration Date is set for all Secrets in Non-RBAC Key VaultsCIS Microsoft Azure Foundations v3.0.0 L1microsoft_azure

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY, SYSTEM AND INFORMATION INTEGRITY

3.3.8 Ensure Automatic Key Rotation is Enabled Within Azure Key Vault for the Supported ServicesCIS Microsoft Azure Foundations v3.0.0 L2microsoft_azure

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY, SYSTEM AND INFORMATION INTEGRITY

4.4 Ensure that Storage Account Access Keys are Periodically RegeneratedCIS Microsoft Azure Foundations v3.0.0 L1microsoft_azure

ACCESS CONTROL, CONFIGURATION MANAGEMENT, MAINTENANCE

5.3.1 Ensure 'Privileged Identity Management' is used to manage rolesCIS Microsoft 365 Foundations E5 L2 v3.1.0microsoft_azure

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

6.2.15 Ensure all groups in /etc/passwd exist in /etc/groupCIS Debian 8 Server L1 v2.0.2Unix

ACCESS CONTROL

6.2.15 Ensure all groups in /etc/passwd exist in /etc/groupCIS Debian 8 Workstation L1 v2.0.2Unix

ACCESS CONTROL

9.2 Check for Duplicate User NamesCIS Oracle Solaris 11.4 L1 v1.1.0Unix

ACCESS CONTROL

9.13 Check Groups in passwdCIS Oracle Solaris 11.4 L1 v1.1.0Unix

ACCESS CONTROL

AIX7-00-001016 - The regular users default primary group must be staff (or equivalent) on AIX.DISA STIG AIX 7.x v3r1Unix

ACCESS CONTROL

CD12-00-000500 - PostgreSQL must integrate with an organization-level authentication/access mechanism providing account management and automation for all users, groups, roles, and any other principals.DISA STIG Crunchy Data PostgreSQL OS v3r1Unix

ACCESS CONTROL

CNTR-K8-000220 - The Kubernetes Controller Manager must create unique service accounts for each work payload.DISA STIG Kubernetes v2r2Unix

ACCESS CONTROL

CNTR-R2-000030 RKE2 must use a centralized user management solution to support account management functions.DISA Rancher Government Solutions RKE2 STIG v2r2Unix

ACCESS CONTROL

DB2X-00-000300 - DB2 must integrate with an organization-level authentication/access mechanism providing account management and automation for all users, groups, roles, and any other principalsDISA STIG IBM DB2 v10.5 LUW v2r1 OS WindowsWindows

ACCESS CONTROL

DB2X-00-000300 - DB2 must integrate with an organization-level authentication/access mechanism providing account management and automation for all users, groups, roles, and any other principalsDISA STIG IBM DB2 v10.5 LUW v2r1 OS LinuxUnix

ACCESS CONTROL

DB2X-00-000300 - DB2 must integrate with an organization-level authentication/access mechanism providing account management and automation for all users, groups, roles, and any other principals - ldap enabledDISA STIG IBM DB2 v10.5 LUW v2r1 DatabaseIBM_DB2DB

ACCESS CONTROL

EPAS-00-000700 - The EDB Postgres Advanced Server must integrate with an organization-level authentication/access mechanism providing account management and automation for all users, groups, roles, and any other principals.EnterpriseDB PostgreSQL Advanced Server OS Linux v2r1Unix

ACCESS CONTROL

MADB-10-000200 - MariaDB must integrate with an organization-level authentication/access mechanism providing account management and automation for all users, groups, roles, and any other principals.DISA MariaDB Enterprise 10.x v2r2 DBMySQLDB

ACCESS CONTROL

MD3X-00-000010 - MongoDB must integrate with an organization-level authentication/access mechanism providing account management and automation for all users, groups, roles, and any other principals.DISA STIG MongoDB Enterprise Advanced 3.x v2r3 OSUnix

ACCESS CONTROL

MD4X-00-001600 - MongoDB must integrate with an organization-level authentication/access mechanism providing account management and automation for all users, groups, roles, and any other principals.DISA STIG MongoDB Enterprise Advanced 4.x v1r4 OSUnix

ACCESS CONTROL

MD7X-00-000200 MongoDB must integrate with an organization-level authentication/access mechanism providing account management and automation for all users, groups, roles, and any other principals.DISA MongoDB Enterprise Advanced 7.x STIG v1r1Unix

ACCESS CONTROL

MYS8-00-000100 - MySQL Database Server 8.0 must integrate with an organization-level authentication/access mechanism providing account management and automation for all users, groups, roles, and any other principals.DISA Oracle MySQL 8.0 v2r2 DBMySQLDB

ACCESS CONTROL

O112-C2-001800 - The system must employ automated mechanisms for supporting Oracle user account management.DISA STIG Oracle 11.2g v2r5 DatabaseOracleDB

ACCESS CONTROL

O121-C2-001800 - The system must employ automated mechanisms for supporting Oracle user account management.DISA STIG Oracle 12c v3r2 DatabaseOracleDB

ACCESS CONTROL

OL6-00-000524 - The system must provide automated support for account management functions.DISA STIG Oracle Linux 6 v2r7Unix

ACCESS CONTROL

PGS9-00-000500 - PostgreSQL must integrate with an organization-level authentication/access mechanism providing account management and automation for all users, groups, roles, and any other principals.DISA STIG PostgreSQL 9.x on RHEL OS v2r5Unix

ACCESS CONTROL

PPS9-00-000700 - The EDB Postgres Advanced Server must integrate with an organization-level authentication/access mechanism providing account management and automation for all users, groups, roles, and any other principals.EDB PostgreSQL Advanced Server OS Linux Audit v2r3Unix

ACCESS CONTROL

SPLK-CL-000020 - Splunk Enterprise must notify the system administrator (SA) and information system security officer (ISSO) when account events are received (creation, deletion, modification, or disabling) - creation, deletion, modification, or disabling.DISA STIG Splunk Enterprise 8.x for Linux v2r1 STIG REST APISplunk

ACCESS CONTROL

SPLK-CL-000200 - Splunk Enterprise must notify the system administrator (SA) and information system security officer (ISSO) when account events are received (creation, deletion, modification, disabling) - creation, deletion, modification, disabling.DISA STIG Splunk Enterprise 7.x for Windows v3r1 REST APISplunk

ACCESS CONTROL

SPLK-CL-000235 - Splunk Enterprise must notify analysts of applicable events for Tier 2 CSSP and JRSS only.DISA STIG Splunk Enterprise 7.x for Windows v3r1 REST APISplunk

ACCESS CONTROL

SQL4-00-030300 - SQL Server authentication and identity management must be integrated with an organization-level authentication/access mechanism providing account management and automation for all users, groups, roles, and any other principals.DISA STIG SQL Server 2014 Instance DB Audit v2r4MS_SQLDB

ACCESS CONTROL

SQL6-D0-000100 - SQL Server databases must integrate with an organization-level authentication/access mechanism providing account management and automation for all users, groups, roles, and any other principals.DISA STIG SQL Server 2016 Database Audit v3r2MS_SQLDB

ACCESS CONTROL

SQL6-D0-003700 - SQL Server must integrate with an organization-level authentication/access mechanism providing account management and automation for all users, groups, roles, and any other principals.DISA STIG SQL Server 2016 Instance DB Audit v3r2MS_SQLDB

ACCESS CONTROL

SQL6-D0-003800 - SQL Server must be configured to utilize the most-secure authentication method available.DISA STIG SQL Server 2016 Instance OS Audit v3r2Windows

ACCESS CONTROL