Item Search

NameAudit NamePluginCategory
2.3.1 AuthenticationCIS Cisco IOS XR 7.x v1.0.0 L2Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

2.4.1 AuthenticationCIS Cisco IOS XR 7.x v1.0.0 L2Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

3.3.1.5 Set 'af-interface default'CIS Cisco IOS 12 L2 v4.0.0Cisco

IDENTIFICATION AND AUTHENTICATION

3.3.1.5 Set 'af-interface default'CIS Cisco IOS 15 L2 v4.1.1Cisco

CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

3.3.1.6 Set 'authentication key-chain'CIS Cisco IOS 12 L2 v4.0.0Cisco

IDENTIFICATION AND AUTHENTICATION

3.3.1.6 Set 'authentication key-chain'CIS Cisco IOS 15 L2 v4.1.1Cisco

CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

3.3.1.7 Set 'authentication mode md5'CIS Cisco IOS 12 L2 v4.0.0Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

3.3.1.7 Set 'authentication mode md5'CIS Cisco IOS 15 L2 v4.1.1Cisco

CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

4.2.4 Ensure loose authentication check is not configuredCIS Juniper OS Benchmark v2.1.0 L1Juniper

IDENTIFICATION AND AUTHENTICATION

4.10.1 Ensure ICMP Router Discovery is disabledCIS Juniper OS Benchmark v2.1.0 L1Juniper

SYSTEM AND INFORMATION INTEGRITY

17.2.5 Ensure 'Audit Other Account Management Events' is set to include 'Success' (STIG only)CIS Microsoft Windows Server 2022 STIG v2.0.0 STIG MSWindows

AUDIT AND ACCOUNTABILITY

17.2.5 Ensure 'Audit Other Account Management Events' is set to include 'Success' (STIG only)CIS Microsoft Windows Server 2022 STIG v2.0.0 STIG DCWindows

AUDIT AND ACCOUNTABILITY

17.2.5 Ensure 'Audit Other Account Management Events' is set to include 'Success' (STIG Only)CIS Microsoft Windows Server 2016 STIG v3.0.0 STIG DCWindows

AUDIT AND ACCOUNTABILITY

17.2.5 Ensure 'Audit Other Account Management Events' is set to include 'Success' (STIG Only)CIS Microsoft Windows Server 2016 STIG v3.0.0 STIG MSWindows

AUDIT AND ACCOUNTABILITY

ARST-RT-000030 - The Arista BGP router must be configured to reject inbound route advertisements for any prefixes belonging to the local autonomous system (AS).DISA STIG Arista MLS EOS 4.2x Router v2r1Arista

ACCESS CONTROL

ARST-RT-000150 - The Arista router must be configured to have all inactive interfaces disabled.DISA STIG Arista MLS EOS 4.2x Router v2r1Arista

ACCESS CONTROL

ARST-RT-000230 - The Arista router must be configured to produce audit records containing information to establish where the events occurred.DISA STIG Arista MLS EOS 4.2x Router v2r1Arista

AUDIT AND ACCOUNTABILITY

ARST-RT-000280 - The Arista router must be configured to authenticate all routing protocol messages using NIST-validated FIPS 198-1 message authentication code algorithm.DISA STIG Arista MLS EOS 4.2x Router v2r1Arista

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

ARST-RT-000300 - The PE router must be configured to enforce a Quality-of-Service (QoS) policy to limit the effects of packet flooding denial-of-service (DoS) attacks.DISA STIG Arista MLS EOS 4.2x Router v2r1Arista

SYSTEM AND COMMUNICATIONS PROTECTION

ARST-RT-000590 - The Arista multicast Designated Router (DR) must be configured to increase the shortest-path tree (SPT) threshold or set it to infinity to minimalize source-group (S, G) state within the multicast topology where Any Source Multicast (ASM) is deployed.DISA STIG Arista MLS EOS 4.2x Router v2r1Arista

SYSTEM AND COMMUNICATIONS PROTECTION

ARST-RT-000710 - The MPLS router must be configured to synchronize IGP and LDP to minimize packet loss when an IGP adjacency is established prior to LDP peers completing label exchange.DISA STIG Arista MLS EOS 4.2x Router v2r1Arista

CONFIGURATION MANAGEMENT

ARST-RT-000740 - The PE router must be configured to have each Virtual Routing and Forwarding (VRF) instance with the appropriate Route Target (RT).DISA STIG Arista MLS EOS 4.2x Router v2r1Arista

CONTINGENCY PLANNING

ARST-RT-000750 - The PE router must be configured to have each VRF with the appropriate Route Distinguisher (RD).DISA STIG Arista MLS EOS 4.2x Router v2r1Arista

CONTINGENCY PLANNING

ARST-RT-000800 - The Arista perimeter router must be configured to suppress Router Advertisements on all external IPv6-enabled interfaces.DISA STIG Arista MLS EOS 4.2x Router v2r1Arista

CONFIGURATION MANAGEMENT

ARST-RT-000830 - The perimeter router must be configured to block all packets with any IP options.DISA STIG Arista MLS EOS 4.2x Router v2r1Arista

SYSTEM AND COMMUNICATIONS PROTECTION

ARST-RT-000840 - The PE router must be configured to ignore or block all packets with any IP options.DISA STIG Arista MLS EOS 4.2x Router v2r1Arista

SYSTEM AND COMMUNICATIONS PROTECTION

BIND-9X-001000 - A BIND 9.x server implementation must be operating on a Current-Stable version as defined by ISC.DISA BIND 9.x STIG v2r3Unix

CONFIGURATION MANAGEMENT

CISC-RT-000480 - The Cisco BGP router must be configured to use a unique key for each autonomous system (AS) that it peers with.DISA STIG Cisco IOS XE Router RTR v3r2Cisco

ACCESS CONTROL

CISC-RT-000480 - The Cisco BGP router must be configured to use a unique key for each autonomous system (AS) that it peers with.DISA STIG Cisco IOS Router RTR v3r2Cisco

ACCESS CONTROL

CISC-RT-000500 - The Cisco BGP switch must be configured to reject inbound route advertisements for any prefixes belonging to the local autonomous system (AS).DISA STIG Cisco NX-OS Switch RTR v3r2Cisco

ACCESS CONTROL

CISC-RT-000510 - The Cisco BGP switch must be configured to reject inbound route advertisements from a customer edge (CE) switch for prefixes that are not allocated to that customer.DISA STIG Cisco NX-OS Switch RTR v3r2Cisco

ACCESS CONTROL

CISC-RT-000530 - The Cisco BGP switch must be configured to reject outbound route advertisements for any prefixes belonging to the IP core.DISA STIG Cisco NX-OS Switch RTR v3r2Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

CISC-RT-000560 - The Cisco BGP router must be configured to use the maximum prefixes feature to protect against route table flooding and prefix de-aggregation attacks.DISA STIG Cisco IOS Router RTR v3r2Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

CISC-RT-000560 - The Cisco BGP router must be configured to use the maximum prefixes feature to protect against route table flooding and prefix de-aggregation attacks.DISA STIG Cisco IOS XE Router RTR v3r2Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

CISC-RT-000570 - The Cisco BGP switch must be configured to limit the prefix size on any inbound route advertisement to /24, or the least significant prefixes issued to the customer.DISA STIG Cisco NX-OS Switch RTR v3r2Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

CISC-RT-000580 - The Cisco BGP router must be configured to use its loopback address as the source address for iBGP peering sessions.DISA STIG Cisco IOS Router RTR v3r2Cisco

CONTINGENCY PLANNING

CISC-RT-000580 - The Cisco BGP router must be configured to use its loopback address as the source address for iBGP peering sessions.DISA STIG Cisco IOS XE Router RTR v3r2Cisco

CONTINGENCY PLANNING

CISC-RT-000580 - The Cisco BGP switch must be configured to use its loopback address as the source address for iBGP peering sessions.DISA STIG Cisco NX-OS Switch RTR v3r2Cisco

CONTINGENCY PLANNING

CISC-RT-000600 - The Cisco MPLS router must be configured to synchronize IGP and LDP to minimize packet loss when an IGP adjacency is established prior to LDP peers completing label exchange.DISA STIG Cisco IOS Router RTR v3r2Cisco

CONFIGURATION MANAGEMENT

CISC-RT-000600 - The Cisco MPLS router must be configured to synchronize Interior Gateway Protocol (IGP) and LDP to minimize packet loss when an IGP adjacency is established prior to LDP peers completing label exchange.DISA STIG Cisco IOS XE Router RTR v3r2Cisco

CONFIGURATION MANAGEMENT

CISC-RT-000650 - The Cisco PE router must be configured to have each VRF with the appropriate Route Distinguisher (RD).DISA STIG Cisco IOS XE Router RTR v3r2Cisco

CONTINGENCY PLANNING

JUEX-NM-000320 - The Juniper EX switch must be configured to require that when a password is changed, the characters are changed in at least eight of the positions within the password.DISA Juniper EX Series Network Device Management v2r2Juniper

IDENTIFICATION AND AUTHENTICATION

JUSX-AG-000037 - The Juniper SRX Services Gateway Firewall must generate audit records when unsuccessful attempts to access security zones occur.DISA Juniper SRX Services Gateway ALG v3r2Juniper

AUDIT AND ACCOUNTABILITY

JUSX-DM-000001 - The Juniper SRX Services Gateway must limit the number of concurrent sessions to a maximum of 10 or less for remote access using SSH.DISA Juniper SRX Services Gateway NDM v3r2Juniper

ACCESS CONTROL

JUSX-DM-000007 - The Juniper SRX Services Gateway must automatically terminate a network administrator session after organization-defined conditions or trigger events requiring session disconnect.DISA Juniper SRX Services Gateway NDM v3r2Juniper

AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT

JUSX-DM-000029 - The Juniper SRX Services Gateway must generate a log event when privileged commands are executed.DISA Juniper SRX Services Gateway NDM v3r2Juniper

ACCESS CONTROL

JUSX-DM-000095 - The Juniper SRX Services Gateway must be configured to use an authentication server to centrally manage authentication and logon settings for remote and nonlocal access.DISA Juniper SRX Services Gateway NDM v3r2Juniper

CONFIGURATION MANAGEMENT

JUSX-DM-000124 - The Juniper SRX Services Gateway must implement replay-resistant authentication mechanisms for network access to privileged accounts.DISA Juniper SRX Services Gateway NDM v3r2Juniper

IDENTIFICATION AND AUTHENTICATION

WN16-DC-000190 - The Active Directory Infrastructure object must be configured with proper audit settings.DISA Windows Server 2016 STIG v2r9Windows

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

WN19-DC-000190 - Windows Server 2019 Active Directory Infrastructure object must be configured with proper audit settings.DISA Microsoft Windows Server 2019 STIG v3r3Windows

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY