Item Search

NameAudit NamePluginCategory
1.1.1.2.1.82 Set 'System cryptography: Use FIPS compliant algorithms for encryption, hashing, and signing' to 'Disabled'CIS Windows 2003 MS v3.1.0Windows

SYSTEM AND COMMUNICATIONS PROTECTION

1.1.1.2.1.82 Set 'System cryptography: Use FIPS compliant algorithms for encryption, hashing, and signing' to 'Disabled'CIS Windows 2003 DC v3.1.0Windows

SYSTEM AND COMMUNICATIONS PROTECTION

1.1.2 Install and configure HP-UX Secure Shell 'RhostsRSAAuthentication=no'CIS HP-UX 11i v1.5Unix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

1.1.7.5 Disable Password to Open UI: Level I EnabledCIS MS Office 2007 v1.1.0 L1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

1.1.10.1. Encryption Type for Password Protected Office Open XML FilesCIS MS Office 2007 v1.1.0 L2Windows

SYSTEM AND COMMUNICATIONS PROTECTION

1.1.11.1 Protect Document Metadata for Rights in Office Open XML Files: Level I EnabledCIS MS Office 2007 v1.1.0 L1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

1.1.11.2 Protect Document Metadata or Password Protected Files: Level I EnabledCIS MS Office 2007 v1.1.0 L1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

1.1.30 Ensure that the API Server only makes use of Strong Cryptographic CiphersCIS Kubernetes 1.13 Benchmark v1.4.0 L1Unix

SYSTEM AND COMMUNICATIONS PROTECTION

1.2 Ensure that the SharePoint Central Administration Site is TLS-enabled - Port 443CIS Microsoft SharePoint 2016 OS v1.1.0Windows

SYSTEM AND COMMUNICATIONS PROTECTION

1.2.34 Ensure that the API Server only makes use of Strong Cryptographic CiphersCIS Kubernetes v1.20 Benchmark v1.0.0 L1 MasterUnix

SYSTEM AND COMMUNICATIONS PROTECTION

1.5.10 Require 'aes 128' as minimum for 'snmp-server user' when using SNMPv3CIS Cisco IOS 16 L2 v1.1.0Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

2.1.14 Ensure that the Kubelet only makes use of Strong Cryptographic CiphersCIS Kubernetes 1.13 Benchmark v1.4.0 L1Unix

SYSTEM AND COMMUNICATIONS PROTECTION

4.2 Ensure Federal Information Processing Standard (FIPS) is enabledCIS MongoDB 3.4 L1 Windows Audit v1.0.0Windows

SYSTEM AND COMMUNICATIONS PROTECTION

4.2 Ensure Federal Information Processing Standard (FIPS) is enabledCIS MongoDB 3.2 L1 Unix Audit v1.0.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION

4.2 Ensure Federal Information Processing Standard (FIPS) is enabledCIS MongoDB 3.4 L1 Unix Audit v1.0.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION

4.2.13 Ensure that the Kubelet only makes use of Strong Cryptographic CiphersCIS Kubernetes v1.20 Benchmark v1.0.0 L1 WorkerUnix

SYSTEM AND COMMUNICATIONS PROTECTION

4.190 - The system must implement cryptography to protect the integrity of Lightweight Directory Access Protocol (LDAP) communications.Tenable Fedora Linux Best Practices v2.0.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION

4.200 - The system must implement cryptography to protect the integrity of Lightweight Directory Access Protocol (LDAP) communications - configTenable Fedora Linux Best Practices v2.0.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION

5.2.12 Ensure only strong Ciphers are usedCIS Ubuntu Linux 20.04 LTS Server L1 v1.0.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION

5.2.12 Ensure only strong Ciphers are usedCIS Ubuntu Linux 20.04 LTS Workstation L1 v1.0.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION

5.2.13 Ensure only strong ciphers are usedCIS Debian 8 Server L1 v2.0.1Unix

SYSTEM AND COMMUNICATIONS PROTECTION

5.2.13 Ensure only strong ciphers are usedCIS Debian 8 Workstation L1 v2.0.1Unix

SYSTEM AND COMMUNICATIONS PROTECTION

5.2.14 Ensure only strong MAC algorithms are usedCIS Amazon Linux 2 v1.0.0 L1Unix

SYSTEM AND COMMUNICATIONS PROTECTION

5.2.14 Ensure only strong MAC algorithms are usedCIS Oracle Linux 7 Workstation L1 v3.0.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION

5.2.14 Ensure only strong MAC algorithms are usedCIS Oracle Linux 7 Server L1 v3.0.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION

5.2.14 Ensure only strong MAC algorithms are used - approved MACsCIS Red Hat EL7 Workstation L1 v3.0.1Unix

SYSTEM AND COMMUNICATIONS PROTECTION

5.2.14 Ensure only strong MAC algorithms are used - approved MACsCIS Red Hat EL7 Server L1 v3.0.1Unix

SYSTEM AND COMMUNICATIONS PROTECTION

6.1.8 Set SSH RhostsRSAAuthentication to no - Check if RhostsRSAAuthentication is set to no and not commented for the server.CIS Solaris 10 L1 v5.2Unix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

6.2.11 Use Only Approved Ciphers in Counter Mode 'Ciphers aes128-ctr,aes192-ctr,aes256-ctr'CIS Red Hat Enterprise Linux 5 L1 v2.2Unix

SYSTEM AND COMMUNICATIONS PROTECTION

6.5 Ensure SSL Protocol is set to TLS for Secure Connectors - verify sslProtocol is set to TLSCIS Apache Tomcat 9 L1 v1.0.0 MiddlewareUnix

SYSTEM AND COMMUNICATIONS PROTECTION

7.1 Ensure mod_ssl and/or mod_nss Is InstalledCIS Apache HTTP Server 2.4 L1 v1.5.0 MiddlewareUnix

SYSTEM AND COMMUNICATIONS PROTECTION

7.1 Ensure mod_ssl and/or mod_nss Is Installed - 'mod_ssl is loaded'CIS Apache HTTP Server 2.4 L1 v1.5.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION

7.1 Ensure mod_ssl and/or mod_nss Is Installed - 'mod_ssl is loaded'CIS Apache HTTP Server 2.4 L2 v1.5.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION

7.4 Ensure that all Docker swarm overlay networks are encryptedCIS Docker v1.2.0 L1 Docker Engine EnterpriseUnix

SYSTEM AND COMMUNICATIONS PROTECTION

7.4 Ensure that all Docker swarm overlay networks are encryptedCIS Docker v1.2.0 L1 Docker LinuxUnix

SYSTEM AND COMMUNICATIONS PROTECTION

7.4 Ensure Weak SSL Protocols Are Disabled - 'SSLv2 or SSLv3'CIS Apache HTTP Server 2.4 L1 v1.5.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION

Brocade : 'FIPS Mode is enabled'TNS Brocade FabricOS Best PracticesBrocade

SYSTEM AND COMMUNICATIONS PROTECTION

Choose drive encryption method and cipher strength (Windows 10 [Version 1511] and later) - EncryptionMethodWithXtsFdvMSCT Windows 10 v1703 v1.0.0Windows

SYSTEM AND COMMUNICATIONS PROTECTION

Choose drive encryption method and cipher strength (Windows 10 [Version 1511] and later) - EncryptionMethodWithXtsOsMSCT Windows 10 v1709 v1.0.0Windows

SYSTEM AND COMMUNICATIONS PROTECTION

Choose drive encryption method and cipher strength (Windows 10 [Version 1511] and later) - EncryptionMethodWithXtsOsMSCT Windows 10 1803 v1.0.0Windows

SYSTEM AND COMMUNICATIONS PROTECTION

Choose drive encryption method and cipher strength (Windows 10 [Version 1511] and later) - EncryptionMethodWithXtsOsMSCT Windows 10 v1511 v1.0.0Windows

SYSTEM AND COMMUNICATIONS PROTECTION

Choose drive encryption method and cipher strength (Windows 10 [Version 1511] and later) - EncryptionMethodWithXtsOsMSCT Windows 10 1809 v1.0.0Windows

SYSTEM AND COMMUNICATIONS PROTECTION

Choose drive encryption method and cipher strength (Windows 10 [Version 1511] and later) - EncryptionMethodWithXtsOsMSCT Windows 10 v1703 v1.0.0Windows

SYSTEM AND COMMUNICATIONS PROTECTION

Choose drive encryption method and cipher strength (Windows 10 [Version 1511] and later) - EncryptionMethodWithXtsRdvMSCT Windows 10 1607 v1.0.0Windows

SYSTEM AND COMMUNICATIONS PROTECTION

Choose drive encryption method and cipher strength (Windows 10 [Version 1511] and later) - EncryptionMethodWithXtsRdvMSCT Windows 10 v1703 v1.0.0Windows

SYSTEM AND COMMUNICATIONS PROTECTION

Choose drive encryption method and cipher strength (Windows 10 [Version 1511] and later) - EncryptionMethodWithXtsRdvMSCT Windows 10 v1709 v1.0.0Windows

SYSTEM AND COMMUNICATIONS PROTECTION

Choose drive encryption method and cipher strength (Windows 10 [Version 1511] and later) - EncryptionMethodWithXtsRdvMSCT Windows 10 1803 v1.0.0Windows

SYSTEM AND COMMUNICATIONS PROTECTION

Fortigate - SNMP v3 auth-priv is not enabledTNS Fortigate FortiOS Best Practices v2.0.0FortiGate

CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

Fortigate - SNMP v3 auth-priv is not enabledTNS Fortigate FortiOS Best PracticesFortiGate

CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

Fortigate - SNMP v3 is not enabledTNS Fortigate FortiOS Best PracticesFortiGate

CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION