Item Search

NameAudit NamePluginCategory
1.1.3.5.5 Set 'Domain member: Digitally encrypt or sign secure channel data (always)' to 'Enabled'CIS Windows 8 L1 v1.0.0Windows

SYSTEM AND COMMUNICATIONS PROTECTION

1.1.30 Ensure that the API Server only makes use of Strong Cryptographic CiphersCIS Kubernetes 1.11 Benchmark v1.3.0 L1Unix

SYSTEM AND COMMUNICATIONS PROTECTION

1.2 Ensure that the SharePoint Central Administration Site is TLS-enabled - HTTPSCIS Microsoft SharePoint 2016 OS v1.1.0Windows

SYSTEM AND COMMUNICATIONS PROTECTION

1.2 Ensure that the SharePoint Central Administration Site is TLS-enabled - Port 443CIS Microsoft SharePoint 2016 OS v1.0.0Windows

SYSTEM AND COMMUNICATIONS PROTECTION

1.2.35 Ensure that the API Server only makes use of Strong Cryptographic CiphersCIS Kubernetes Benchmark v1.5.1 L1Unix

SYSTEM AND COMMUNICATIONS PROTECTION

1.3 Configure SSH - Check if RhostsRSAAuthentication is set to no and not commented for server.CIS Solaris 9 v1.3Unix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

1.11 Ensure system-wide crypto policy is FUTURE or FIPSCIS CentOS Linux 8 Workstation L2 v1.0.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION

1.11 Ensure system-wide crypto policy is FUTURE or FIPSCIS CentOS Linux 8 Server L2 v1.0.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION

2.1.15 Ensure that the Kubelet only makes use of Strong Cryptographic CiphersCIS Kubernetes 1.11 Benchmark v1.3.0 L1Unix

SYSTEM AND COMMUNICATIONS PROTECTION

4.2 Ensure Federal Information Processing Standard (FIPS) is enabledCIS MongoDB 3.2 L1 Windows Audit v1.0.0Windows

SYSTEM AND COMMUNICATIONS PROTECTION

4.2.13 Ensure that the Kubelet only makes use of Strong Cryptographic CiphersCIS Kubernetes Benchmark v1.5.1 L1Unix

SYSTEM AND COMMUNICATIONS PROTECTION

4.3 Ensure Windows Authentication uses Kerberos and not the NT Lan Manager (NTLM) authentication protocolCIS Microsoft SharePoint 2016 OS v1.0.0Windows

SYSTEM AND COMMUNICATIONS PROTECTION

5.2.11 Ensure only approved ciphers are usedHuawei EulerOS 2 Server L1 v1.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION

5.2.11 Ensure only approved MAC algorithms are usedCIS Red Hat 6 Server L1 v2.1.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION

5.2.11 Ensure only approved MAC algorithms are usedCIS CentOS 6 Server L1 v2.1.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION

5.2.11 Ensure only approved MAC algorithms are usedCIS Oracle Linux 6 Workstation L1 v1.1.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION

5.2.13 Ensure only strong Ciphers are usedCIS SUSE Linux Enterprise 15 Server L1 v1.0.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION

5.2.13 Ensure only strong Ciphers are usedCIS SUSE Linux Enterprise 15 Workstation L1 v1.0.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION

5.2.13 Ensure only strong Ciphers are used - approved ciphersCIS Red Hat EL7 Server L1 v3.0.1Unix

SYSTEM AND COMMUNICATIONS PROTECTION

5.2.13 Ensure only strong Ciphers are used - weak ciphersCIS Ubuntu Linux 18.04 LTS Workstation L1 v2.0.1Unix

SYSTEM AND COMMUNICATIONS PROTECTION

5.2.14 Ensure only strong Key Exchange algorithms are usedCIS Ubuntu Linux 20.04 LTS Workstation L1 v1.0.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION

5.2.14 Ensure only strong MAC algorithms are usedCIS SUSE Linux Enterprise 15 Server L1 v1.0.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION

5.2.14 Ensure only strong MAC algorithms are used - approved MACsCIS Ubuntu Linux 18.04 LTS Server L1 v2.0.1Unix

SYSTEM AND COMMUNICATIONS PROTECTION

5.2.14 Ensure only strong MAC algorithms are used - weak MACsCIS Ubuntu Linux 18.04 LTS Workstation L1 v2.0.1Unix

SYSTEM AND COMMUNICATIONS PROTECTION

5.2.15 Ensure only strong Key Exchange algorithms are usedCIS Debian 8 Server L1 v2.0.1Unix

SYSTEM AND COMMUNICATIONS PROTECTION

5.2.15 Ensure only strong Key Exchange algorithms are usedCIS Debian 8 Workstation L1 v2.0.1Unix

SYSTEM AND COMMUNICATIONS PROTECTION

5.2.15 Ensure only strong Key Exchange algorithms are used - approved algorithmsCIS Red Hat EL7 Server L1 v3.0.1Unix

SYSTEM AND COMMUNICATIONS PROTECTION

5.2.20 Ensure system-wide crypto policy is not over-riddenCIS Oracle Linux 8 Server L1 v1.0.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION

5.2.23 Ensure RSA rhosts authentication is not allowedCIS Amazon Linux 2 STIG v1.0.0 L3Unix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

5.4.1.1 Ensure password hashing algorithm is SHA-512CIS SUSE Linux Enterprise 15 Workstation L1 v1.0.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION

5.4.1.1 Ensure password hashing algorithm is SHA-512CIS SUSE Linux Enterprise 15 Server L1 v1.0.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION

6.1.8 Set SSH RhostsRSAAuthentication to no - Check if RhostsRSAAuthentication is set to no and not commented for the server.CIS Solaris 10 v5.2Unix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

6.2 Ensure HTTPS binding: TCP 32844 is usedCIS Microsoft SharePoint 2016 OS v1.0.0Windows

SYSTEM AND COMMUNICATIONS PROTECTION

6.3 Ensure scheme is set accuratelyCIS Apache Tomcat 8 L1 v1.1.0 MiddlewareUnix

SYSTEM AND COMMUNICATIONS PROTECTION

6.3 Ensure scheme is set accuratelyCIS Apache Tomcat 9 L1 v1.0.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION

6.3 Ensure scheme is set accuratelyCIS Apache Tomcat 9 L1 v1.0.0 MiddlewareUnix

SYSTEM AND COMMUNICATIONS PROTECTION

6.5 Ensure SSL Protocol is set to TLS for Secure Connectors - verify sslProtocol is set to TLSCIS Apache Tomcat 9 L1 v1.0.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION

6.7 Ensure FIPS 140-2 OpenSSL Cryptography Is Used - fips_enabledCIS PostgreSQL 10 OS v1.0.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION

6.8 Ensure FIPS 140-2 OpenSSL Cryptography Is Used - openssl versionCIS PostgreSQL 9.5 OS v1.0.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION

6.10.2.2 Ensure Web-Management is Set to use HTTPSCIS Juniper OS Benchmark v2.0.0 L1Juniper

SYSTEM AND COMMUNICATIONS PROTECTION

6.10.2.3 Ensure Web-Management is Set to use PKI Certificate for HTTPSCIS Juniper OS Benchmark v2.0.0 L2Juniper

SYSTEM AND COMMUNICATIONS PROTECTION

7.3 Ensure SSLv3 is disabledCIS IIS 7 L1 v1.8.0Windows

SYSTEM AND COMMUNICATIONS PROTECTION

7.4 Ensure data exchanged between containers are encrypted on different nodes on the overlay networkCIS Docker Community Edition v1.1.0 L1 DockerUnix

SYSTEM AND COMMUNICATIONS PROTECTION

7.4 Ensure Weak SSL Protocols Are Disabled - 'SSLv2 or SSLv3'CIS Apache HTTP Server 2.4 L1 v1.5.0 MiddlewareUnix

SYSTEM AND COMMUNICATIONS PROTECTION

7.7 Ensure SSL Compression is not EnabledCIS Apache HTTP Server 2.4 L1 v1.5.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION

7.7 Ensure SSL Compression is not EnabledCIS Apache HTTP Server 2.4 L1 v1.5.0 MiddlewareUnix

SYSTEM AND COMMUNICATIONS PROTECTION

10.11 Force SSL for all applicationsCIS Apache Tomcat 9 L2 v1.0.0 MiddlewareUnix

SYSTEM AND COMMUNICATIONS PROTECTION

18.8.4.1 Ensure 'Encryption Oracle Remediation' is set to 'Enabled: Force Updated Clients'CIS Microsoft Windows Server 2016 MS L1 v1.2.0Windows

SYSTEM AND COMMUNICATIONS PROTECTION

Fortigate - SNMP v3 is not enabledTNS Fortigate FortiOS Best Practices v2.0.0FortiGate

CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

PCI 2.2.4 Configure system security parameters to prevent misuse - Configure SSH (/etc/ssh/sshd_config RhostsRSAAuthentication)PCI DSS 2.0/3.0 - Solaris 10Unix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION