Item Search

NameAudit NamePluginCategory
1.1.5 Ensure 'Password Policy' is enabledCIS Cisco ASA 9.x Firewall L1 v1.1.0Cisco

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

1.2 Ensure Snowflake SCIM integration is configured to automatically provision and deprovision users and groups (i.e. roles)CIS Snowflake Foundations v1.0.0 L2Snowflake

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

1.2.2 Ensure 'Permitted IP Addresses' is set for all management profiles where SSH, HTTPS, or SNMP is enabled - HTTPSCIS Palo Alto Firewall 9 v1.1.0 L1Palo_Alto

ACCESS CONTROL, CONFIGURATION MANAGEMENT

1.2.2 Ensure 'Permitted IP Addresses' is set for all management profiles where SSH, HTTPS, or SNMP is enabled - SSHCIS Palo Alto Firewall 9 v1.1.0 L1Palo_Alto

ACCESS CONTROL, CONFIGURATION MANAGEMENT

1.11.1 Ensure 'snmp-server group' is set to 'v3 priv'CIS Cisco ASA 9.x Firewall L1 v1.1.0Cisco

ACCESS CONTROL, CONFIGURATION MANAGEMENT, CONTINGENCY PLANNING, PLANNING, PROGRAM MANAGEMENT, SYSTEM AND SERVICES ACQUISITION, SYSTEM AND COMMUNICATIONS PROTECTION

2.1.1 Ensure 'OSPF authentication' is enabledCIS Cisco ASA 9.x Firewall L2 v1.1.0Cisco

ACCESS CONTROL, CONFIGURATION MANAGEMENT, CONTINGENCY PLANNING, PLANNING, PROGRAM MANAGEMENT, SYSTEM AND SERVICES ACQUISITION, SYSTEM AND COMMUNICATIONS PROTECTION

2.1.2 Ensure 'EIGRP authentication' is enabledCIS Cisco ASA 9.x Firewall L2 v1.1.0Cisco

ACCESS CONTROL, CONFIGURATION MANAGEMENT, CONTINGENCY PLANNING, PLANNING, PROGRAM MANAGEMENT, SYSTEM AND SERVICES ACQUISITION, SYSTEM AND COMMUNICATIONS PROTECTION

2.1.3 Ensure 'BGP authentication' is enabledCIS Cisco ASA 9.x Firewall L2 v1.1.0Cisco

ACCESS CONTROL, CONFIGURATION MANAGEMENT, CONTINGENCY PLANNING, PLANNING, PROGRAM MANAGEMENT, SYSTEM AND SERVICES ACQUISITION, SYSTEM AND COMMUNICATIONS PROTECTION

2.2 Ensure 'noproxyarp' is enabled for untrusted interfacesCIS Cisco ASA 9.x Firewall L2 v1.1.0Cisco

ACCESS CONTROL, CONFIGURATION MANAGEMENT, CONTINGENCY PLANNING, PLANNING, PROGRAM MANAGEMENT, SYSTEM AND SERVICES ACQUISITION, SYSTEM AND COMMUNICATIONS PROTECTION

2.3 Ensure 'DNS Guard' is enabledCIS Cisco ASA 9.x Firewall L2 v1.1.0Cisco

ACCESS CONTROL, CONFIGURATION MANAGEMENT, CONTINGENCY PLANNING, PLANNING, PROGRAM MANAGEMENT, SYSTEM AND SERVICES ACQUISITION, SYSTEM AND COMMUNICATIONS PROTECTION

2.3.1.1 Ensure AirDrop Is Disabled When Not Actively Transferring FilesCIS Apple macOS 14.0 Sonoma v2.1.0 L1Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

2.3.1.1 Ensure AirDrop Is Disabled When Not Actively Transferring FilesCIS Apple macOS 15.0 Sequoia v1.1.0 L1Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

2.3.1.1 Ensure AirDrop Is Disabled When Not Actively Transferring FilesCIS Apple macOS 13.0 Ventura v3.1.0 L1Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

2.4.11 Ensure AirDrop Is Disabled When Not Actively Transferring FilesCIS Apple macOS 12.0 Monterey v4.0.0 L1Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

2.6.1 Ensure Guest Account Is DisabledCIS Apple macOS 15.0 Sequoia Cloud-tailored v1.0.0 L1Unix

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY, IDENTIFICATION AND AUTHENTICATION

2.6.1 Ensure Guest Account Is DisabledCIS Apple macOS 13.0 Ventura Cloud-tailored v1.1.0 L1Unix

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY, IDENTIFICATION AND AUTHENTICATION

2.6.1 Ensure Guest Account Is DisabledCIS Apple macOS 14.0 Sonoma Cloud-tailored v1.1.0 L1Unix

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY, IDENTIFICATION AND AUTHENTICATION

2.12.1 Ensure Guest Account Is DisabledCIS Apple macOS 14.0 Sonoma v2.1.0 L1Unix

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY, IDENTIFICATION AND AUTHENTICATION

2.12.1 Ensure Guest Account Is DisabledCIS Apple macOS 13.0 Ventura v3.1.0 L1Unix

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY, IDENTIFICATION AND AUTHENTICATION

2.13.1 Ensure Guest Account Is DisabledCIS Apple macOS 15.0 Sequoia v1.1.0 L1Unix

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY, IDENTIFICATION AND AUTHENTICATION

6.1.3 Ensure Guest Account Is DisabledCIS Apple macOS 10.14 v2.0.0 L1Unix

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY, IDENTIFICATION AND AUTHENTICATION

6.1.3 Ensure Guest Account Is DisabledCIS Apple macOS 10.15 Catalina v3.0.0 L1Unix

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY, IDENTIFICATION AND AUTHENTICATION

6.1.3 Ensure Guest Account Is DisabledCIS Apple macOS 12.0 Monterey Cloud-tailored v1.1.0 L1Unix

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY, IDENTIFICATION AND AUTHENTICATION

6.1.3 Ensure Guest Account Is DisabledCIS Apple macOS 12.0 Monterey v4.0.0 L1Unix

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY, IDENTIFICATION AND AUTHENTICATION

6.1.3 Ensure Guest Account Is DisabledCIS Apple macOS 11.0 Big Sur v4.0.0 L1Unix

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY, IDENTIFICATION AND AUTHENTICATION

6.2.1 Ensure that 'trusted locations' are definedCIS Microsoft Azure Foundations v4.0.0 L2microsoft_azure

ACCESS CONTROL, CONFIGURATION MANAGEMENT, CONTINGENCY PLANNING, PLANNING, PROGRAM MANAGEMENT, SYSTEM AND SERVICES ACQUISITION, SYSTEM AND COMMUNICATIONS PROTECTION

6.25 Ensure that 'Subscription leaving Microsoft Entra tenant' and 'Subscription entering Microsoft Entra tenant' is set to 'Permit no one'CIS Microsoft Azure Foundations v4.0.0 L2microsoft_azure

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

10.3.1.3 Ensure 'Allow storage account key access' for Azure Storage Accounts is 'Disabled'CIS Microsoft Azure Foundations v4.0.0 L1microsoft_azure

ACCESS CONTROL, MEDIA PROTECTION

AIX7-00-001000 - AIX /etc/security/mkuser.sys.custom file must not exist unless it is needed for customizing a new user account.DISA STIG AIX 7.x v3r1Unix

ACCESS CONTROL

AIX7-00-001015 - The shipped /etc/security/mkuser.sys file on AIX must not be customized directly.DISA STIG AIX 7.x v3r1Unix

ACCESS CONTROL

AIX7-00-001016 - The regular users default primary group must be staff (or equivalent) on AIX.DISA STIG AIX 7.x v3r1Unix

ACCESS CONTROL

DB2X-00-000300 - DB2 must integrate with an organization-level authentication/access mechanism providing account management and automation for all users, groups, roles, and any other principalsDISA STIG IBM DB2 v10.5 LUW v2r1 OS LinuxUnix

ACCESS CONTROL

DB2X-00-000300 - DB2 must integrate with an organization-level authentication/access mechanism providing account management and automation for all users, groups, roles, and any other principalsDISA STIG IBM DB2 v10.5 LUW v2r1 OS WindowsWindows

ACCESS CONTROL

EP11-00-000700 - The EDB Postgres Advanced Server must integrate with an organization-level authentication/access mechanism providing account management and automation for all users, groups, roles, and any other principals.EDB PostgreSQL Advanced Server v11 Windows OS Audit v2r4Windows

ACCESS CONTROL

ESXI-80-000114 - The ESXi host must offload logs via syslog.DISA VMware vSphere 8.0 ESXi STIG v2r3VMware

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

F5BI-DM-000013 - The BIG-IP appliance must provide automated support for account management functions.DISA F5 BIG-IP Device Management STIG v2r4F5

ACCESS CONTROL, CONFIGURATION MANAGEMENT

JUSX-DM-000039 - The Juniper SRX Services Gateway must allow only the information system security manager (ISSM) (or administrators/roles appointed by the ISSM) to select which auditable events are to be generated and forwarded to the syslog and/or local logs - or administrators/roles appointed by the ISSM to select which auditable events are to be generated and forwarded to the syslog and/or local logs.DISA Juniper SRX Services Gateway NDM v3r3Juniper

ACCESS CONTROL, CONFIGURATION MANAGEMENT

JUSX-DM-000060 - For local logging, the Juniper SRX Services Gateway must generate a message to the system management console when a log processing failure occurs.DISA Juniper SRX Services Gateway NDM v3r3Juniper

ACCESS CONTROL, CONFIGURATION MANAGEMENT

JUSX-DM-000061 - In the event that communications with the events server is lost, the Juniper SRX Services Gateway must continue to queue log records locally.DISA Juniper SRX Services Gateway NDM v3r3Juniper

ACCESS CONTROL, CONFIGURATION MANAGEMENT

JUSX-DM-000097 - The Juniper SRX Services Gateway must be configured to use a centralized authentication server to authenticate privileged users for remote and nonlocal access for device management.DISA Juniper SRX Services Gateway NDM v3r3Juniper

ACCESS CONTROL, CONFIGURATION MANAGEMENT

MD3X-00-000010 - MongoDB must integrate with an organization-level authentication/access mechanism providing account management and automation for all users, groups, roles, and any other principals.DISA STIG MongoDB Enterprise Advanced 3.x v2r3 OSUnix

ACCESS CONTROL

O121-C2-001800 - The system must employ automated mechanisms for supporting Oracle user account management.DISA STIG Oracle 12c v3r4 DatabaseOracleDB

ACCESS CONTROL

SLES-15-030010 - The SUSE operating system must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/group.DISA SUSE Linux Enterprise Server 15 STIG v2r4Unix

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

SLES-15-030020 - The SUSE operating system must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/shadow.DISA SUSE Linux Enterprise Server 15 STIG v2r4Unix

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

SLES-15-030030 - The SUSE operating system must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/security/opasswd.DISA SUSE Linux Enterprise Server 15 STIG v2r4Unix

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

SPLK-CL-000020 - Splunk Enterprise must notify the system administrator (SA) and information system security officer (ISSO) when account events are received (creation, deletion, modification, or disabling) - creation, deletion, modification, or disabling.DISA STIG Splunk Enterprise 8.x for Linux v2r2 STIG REST APISplunk

ACCESS CONTROL

SPLK-CL-000235 - Splunk Enterprise must notify analysts of applicable events for Tier 2 CSSP and JRSS only.DISA STIG Splunk Enterprise 7.x for Windows v3r1 REST APISplunk

ACCESS CONTROL

SQL6-D0-003700 - SQL Server must integrate with an organization-level authentication/access mechanism providing account management and automation for all users, groups, roles, and any other principals.DISA STIG SQL Server 2016 Instance DB Audit v3r4MS_SQLDB

ACCESS CONTROL

SQL6-D0-003800 - SQL Server must be configured to utilize the most-secure authentication method available.DISA STIG SQL Server 2016 Instance OS Audit v3r4Windows

ACCESS CONTROL

VCSA-80-000123 - The vCenter Server must provide an immediate real-time alert to the system administrator (SA) and information system security officer (ISSO), at a minimum, on every Single Sign-On (SSO) account action.DISA VMware vSphere 8.0 vCenter STIG v2r2VMware

ACCESS CONTROL