Item Search

NameAudit NamePluginCategory
1.2.3 Set 'seconds' for 'ssh timeout' for 60 seconds or lessCIS Cisco IOS XR 7.x v1.0.1 L1Cisco

IDENTIFICATION AND AUTHENTICATION

1.3.6 Apply Security Context to Your Pods and ContainersCIS Kubernetes 1.7.0 Benchmark v1.1.0 L2Unix
1.6.6 Apply Security Context to Your Pods and ContainersCIS Kubernetes 1.7.0 Benchmark v1.1.0 L2Unix
2.1.4 (L2) Ensure Safe Attachments policy is enabledCIS Microsoft 365 Foundations v5.0.0 L2 E5microsoft_azure

SYSTEM AND INFORMATION INTEGRITY

2.3.7.10 Ensure 'Interactive logon: Smart card removal behavior' is set to 'Lock Workstation' or 'Force Logoff' (STIG DC & MS only)CIS Microsoft Windows Server 2022 STIG v2.0.0 STIG DCWindows

ACCESS CONTROL

2.3.7.10 Ensure 'Interactive logon: Smart card removal behavior' is set to 'Lock Workstation' or 'Force Logoff' (STIG DC & MS only)CIS Microsoft Windows Server 2019 STIG v3.0.0 STIG DCWindows

ACCESS CONTROL

2.3.7.10 Ensure 'Interactive logon: Smart card removal behavior' is set to 'Lock Workstation' or 'Force Logoff' (STIG only)CIS Microsoft Windows Server 2016 STIG v3.0.0 STIG DCWindows

ACCESS CONTROL

2.3.7.10 Ensure 'Interactive logon: Smart card removal behavior' is set to 'Lock Workstation' or 'Force Logoff' (STIG only)CIS Microsoft Windows Server 2016 STIG v3.0.0 STIG MSWindows

ACCESS CONTROL

2.7 Ensure 'passwordFormat' is not set to clear - DefaultCIS IIS 10 v1.2.1 Level 1Windows

IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

3.6 Implement DNSSEC 'INCLUDE'CIS ISC BIND 9.0/9.5 v2.0.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION

4.6.3 Apply Security Context to Pods and ContainersCIS Google Kubernetes Engine (GKE) Autopilot v1.1.0 L2GCP

CONFIGURATION MANAGEMENT

4.6.3 Apply Security Context to Pods and ContainersCIS Google Kubernetes Engine (GKE) v1.7.0 L2GCP

CONFIGURATION MANAGEMENT

5.6.3 Apply Security Context to Your Pods and ContainersCIS Kubernetes v1.11.1 L2 Master NodeUnix

CONFIGURATION MANAGEMENT

5.7.3 Apply Security Context to Your Pods and ContainersCIS Red Hat OpenShift Container Platform v1.8.0 L2 OpenShiftOpenShift

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

5.28 (L1) Ensure 'Web Management Service (WMSvc)' is set to 'Disabled' or 'Not Installed'CIS Microsoft Windows 11 Stand-alone v4.0.0 L1 BLWindows

CONFIGURATION MANAGEMENT

5.29 (L1) Ensure 'Web Management Service (WMSvc)' is set to 'Disabled' or 'Not Installed'CIS Microsoft Windows 11 Enterprise v4.0.0 L1Windows

CONFIGURATION MANAGEMENT

5.29 Ensure 'Web Management Service (WMSvc)' is set to 'Disabled' or 'Not Installed'CIS Windows 7 Workstation Level 1 v3.2.0Windows

CONFIGURATION MANAGEMENT

5.35 Ensure 'World Wide Web Publishing Service (W3SVC)' is set to 'Disabled' or 'Not Installed'CIS Microsoft Windows 8.1 v2.4.1 L1Windows

CONFIGURATION MANAGEMENT

7.6 Ensure TLS 1.1 is enabledCIS IIS 7 L1 v1.8.0Windows

SYSTEM AND COMMUNICATIONS PROTECTION

20.13 (L1) Ensure 'Web browser is supported and secured'CIS Microsoft Windows 10 EMS Gateway v3.0.0 L1Windows

CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

IIST-SI-000203 - A private IIS 10.0 website must only accept Secure Socket Layer (SSL) connections.DISA IIS 10.0 Site v2r11Windows

ACCESS CONTROL

IIST-SI-000224 - The IIS 10.0 website document directory must be in a separate partition from the IIS 10.0 websites system files.DISA IIS 10.0 Site v2r11Windows

SYSTEM AND COMMUNICATIONS PROTECTION

IIST-SI-000227 - The IIS 10.0 websites Maximum Query String limit must be configured.DISA IIS 10.0 Site v2r11Windows

SYSTEM AND COMMUNICATIONS PROTECTION

IIST-SI-000228 - Non-ASCII characters in URLs must be prohibited by any IIS 10.0 website.DISA IIS 10.0 Site v2r11Windows

SYSTEM AND COMMUNICATIONS PROTECTION

IIST-SI-000239 - The IIS 10.0 websites must use ports, protocols, and services according to Ports, Protocols, and Services Management (PPSM) guidelines.DISA IIS 10.0 Site v2r11Windows

CONFIGURATION MANAGEMENT

IIST-SV-000110 - The IIS 10.0 web server must produce log records that contain sufficient information to establish the outcome (success or failure) of IIS 10.0 web server events.DISA IIS 10.0 Server v3r3Windows

AUDIT AND ACCOUNTABILITY

IIST-SV-000135 - The IIS 10.0 web server must accept only system-generated session identifiers.DISA IIS 10.0 Server v3r3Windows

CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

IIST-SV-000135 - The IIS 10.0 web server must accept only system-generated session identifiers.DISA IIS 10.0 Server v2r10Windows

SYSTEM AND COMMUNICATIONS PROTECTION

IIST-SV-000137 - The production IIS 10.0 web server must utilize SHA2 encryption for the Machine Key.DISA IIS 10.0 Server v3r3Windows

SYSTEM AND COMMUNICATIONS PROTECTION

IIST-SV-000137 - The production IIS 10.0 web server must utilize SHA2 encryption for the Machine Key.DISA IIS 10.0 Server v2r10Windows

SYSTEM AND COMMUNICATIONS PROTECTION

IIST-SV-000142 - The IIS 10.0 web server must restrict inbound connections from non-secure zones.DISA IIS 10.0 Server v3r3Windows

ACCESS CONTROL

IIST-SV-000158 - Unspecified file extensions on a production IIS 10.0 web server must be removed.DISA IIS 10.0 Server v3r3Windows

CONFIGURATION MANAGEMENT

IIST-SV-000159 - The IIS 10.0 web server must have a global authorization rule configured to restrict access.DISA IIS 10.0 Server v2r10Windows

CONFIGURATION MANAGEMENT

IIST-SV-000159 - The IIS 10.0 web server must have a global authorization rule configured to restrict access.DISA IIS 10.0 Server v3r3Windows

CONFIGURATION MANAGEMENT

IISW-SI-000203 - A private IIS 8.5 website must only accept Secure Socket Layer connections.DISA IIS 8.5 Site v2r9Windows

ACCESS CONTROL

IISW-SI-000204 - A public IIS 8.5 website must only accept Secure Socket Layer connections when authentication is required.DISA IIS 8.5 Site v2r9Windows

ACCESS CONTROL

IISW-SI-000217 - The IIS 8.5 website must have Web Distributed Authoring and Versioning (WebDAV) disabled.DISA IIS 8.5 Site v2r9Windows

CONFIGURATION MANAGEMENT

IISW-SI-000224 - The IIS 8.5 website document directory must be in a separate partition from the IIS 8.5 websites system files.DISA IIS 8.5 Site v2r9Windows

SYSTEM AND COMMUNICATIONS PROTECTION

IISW-SI-000226 - The IIS 8.5 website must be configured to limit the size of web requests.DISA IIS 8.5 Site v2r9Windows

SYSTEM AND COMMUNICATIONS PROTECTION

IISW-SI-000228 - Non-ASCII characters in URLs must be prohibited by any IIS 8.5 website.DISA IIS 8.5 Site v2r9Windows

SYSTEM AND COMMUNICATIONS PROTECTION

IISW-SI-000234 - Debugging and trace information used to diagnose the IIS 8.5 website must be disabled.DISA IIS 8.5 Site v2r9Windows

SYSTEM AND INFORMATION INTEGRITY

IISW-SI-000239 - The IIS 8.5 websites must utilize ports, protocols, and services according to PPSM guidelines.DISA IIS 8.5 Site v2r9Windows

CONFIGURATION MANAGEMENT

IISW-SV-000102 - The enhanced logging for the IIS 8.5 web server must be enabled and capture all user and web server events.DISA IIS 8.5 Server v2r7Windows

AUDIT AND ACCOUNTABILITY

IISW-SV-000110 - The IIS 8.5 web server must produce log records that contain sufficient information to establish the outcome (success or failure) of IIS 8.5 web server events.DISA IIS 8.5 Server v2r7Windows

AUDIT AND ACCOUNTABILITY

IISW-SV-000111 - The IIS 8.5 web server must produce log records containing sufficient information to establish the identity of any user/subject or process associated with an event.DISA IIS 8.5 Server v2r7Windows

AUDIT AND ACCOUNTABILITY

IISW-SV-000119 - The IIS 8.5 web server must not be both a website server and a proxy server.DISA IIS 8.5 Server v2r7Windows

CONFIGURATION MANAGEMENT

IISW-SV-000135 - The IIS 8.5 web server must limit the amount of time a cookie persists.DISA IIS 8.5 Server v2r7Windows

SYSTEM AND COMMUNICATIONS PROTECTION

IISW-SV-000152 - IIS 8.5 web server session IDs must be sent to the client using TLS.DISA IIS 8.5 Server v2r7Windows

SYSTEM AND COMMUNICATIONS PROTECTION

IISW-SV-000158 - Unspecified file extensions on a production IIS 8.5 web server must be removed.DISA IIS 8.5 Server v2r7Windows

CONFIGURATION MANAGEMENT

IISW-SV-000159 - The IIS 8.5 web server must have a global authorization rule configured to restrict access.DISA IIS 8.5 Server v2r7Windows

CONFIGURATION MANAGEMENT