Item Search

NameAudit NamePluginCategory
1.1.1.2 Ensure mounting of squashfs filesystems is disabled - lsmodCIS Red Hat Enterprise Linux 7 STIG v2.0.0 L2 WorkstationUnix

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

1.1.1.2 Ensure mounting of squashfs filesystems is disabled - lsmodCIS Fedora 19 Family Linux Server L2 v1.0.0Unix

CONFIGURATION MANAGEMENT

1.1.1.6 Ensure mounting of squashfs filesystems is disabled - lsmodCIS Debian Family Server L2 v1.0.0Unix

CONFIGURATION MANAGEMENT

1.1.1.6 Ensure mounting of squashfs filesystems is disabled - lsmodCIS Debian Family Workstation L2 v1.0.0Unix

CONFIGURATION MANAGEMENT

1.1.1.6 Ensure mounting of squashfs filesystems is disabled - modprobeCIS Debian Family Server L2 v1.0.0Unix

CONFIGURATION MANAGEMENT

1.4.5 Ensure version 7.2 or newer booted with a BIOS have a unique name for the grub superusers accountCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIGUnix

ACCESS CONTROL

1.4.6 Ensure version 7.2 or newer booted with UEFI have a unique name for the grub superusers accountCIS Amazon Linux 2 STIG v2.0.0 STIGUnix

SYSTEM AND INFORMATION INTEGRITY

1.4.6 Ensure version 7.2 or newer booted with UEFI have a unique name for the grub superusers account - UEFI must have a unique name for the grub superusers account when booting into single-user mode and maintenance.CIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIGUnix

ACCESS CONTROL

1.6.2 Ensure system wide crypto policy disables sha1 hash and signature supportCIS Oracle Linux 8 Server L1 v3.0.0Unix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

1.6.2 Ensure system wide crypto policy disables sha1 hash and signature supportCIS Red Hat EL8 Workstation L1 v3.0.0Unix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

1.6.3 Ensure system wide crypto policy disables sha1 hash and signature supportCIS Rocky Linux 9 v2.0.0 L1 ServerUnix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

2.1 Secure DB2 Runtime LibraryCIS IBM DB2 v10 v1.1.0 Windows OS Level 2Windows
2.1 Secure DB2 Runtime LibraryCIS IBM DB2 v10 v1.1.0 Linux OS Level 1Unix
2.1 Secure DB2 Runtime LibraryCIS IBM DB2 v10 v1.1.0 Windows OS Level 1Windows
2.1 Secure DB2 Runtime LibraryCIS IBM DB2 v10 v1.1.0 Linux OS Level 2Unix
2.6 Ensure aufs storage driver is not usedCIS Docker v1.8.0 L1 OS LinuxUnix

SYSTEM AND SERVICES ACQUISITION

2.7 Do not use the aufs storage driverCIS Docker 1.6 v1.0.0 L1 DockerUnix

CONFIGURATION MANAGEMENT

4.4 Defend against Denial of Service AttacksCIS ISC BIND 9.0/9.5 v2.0.0Unix
5.9 (L1) Ensure 'Internet Connection Sharing (ICS) (SharedAccess)' is set to 'Disabled'CIS Microsoft Windows 10 Stand-alone v4.0.0 L1 BL NGWindows

CONFIGURATION MANAGEMENT

5.9 (L1) Ensure 'Internet Connection Sharing (ICS) (SharedAccess)' is set to 'Disabled'CIS Microsoft Windows 10 Stand-alone v4.0.0 L1Windows

CONFIGURATION MANAGEMENT

5.9 (L1) Ensure 'Internet Connection Sharing (ICS) (SharedAccess)' is set to 'Disabled'CIS Microsoft Windows 10 Stand-alone v4.0.0 L1 NGWindows

CONFIGURATION MANAGEMENT

5.9 (L1) Ensure 'Internet Connection Sharing (ICS) (SharedAccess)' is set to 'Disabled'CIS Microsoft Windows 10 Stand-alone v4.0.0 L1 BLWindows

CONFIGURATION MANAGEMENT

5.20 Do not share the host's UTS namespaceCIS Docker 1.11.0 v1.0.0 L1 DockerUnix

SYSTEM AND COMMUNICATIONS PROTECTION

5.20 Do not share the host's UTS namespaceCIS Docker 1.12.0 v1.0.0 L1 DockerUnix

SYSTEM AND COMMUNICATIONS PROTECTION

7.1 Ensure that the MaxZoneParts setting for Web Part limits is set to 100.CIS Microsoft SharePoint 2016 OS v1.1.0Windows

CONFIGURATION MANAGEMENT

9.6 Secure the permission of the IBMLDAPSecurity.ini fileCIS IBM DB2 v10 v1.1.0 Linux OS Level 1Unix
9.6 Secure the permission of the IBMLDAPSecurity.ini fileCIS IBM DB2 v10 v1.1.0 Windows OS Level 1Windows
9.6 Secure the permission of the IBMLDAPSecurity.ini fileCIS IBM DB2 v10 v1.1.0 Windows OS Level 2Windows
9.6 Secure the permission of the IBMLDAPSecurity.ini fileCIS IBM DB2 v10 v1.1.0 Linux OS Level 2Unix
ALMA-09-054690 - AlmaLinux OS 9 must periodically flush audit records to disk to prevent the loss of audit records.DISA CloudLinux AlmaLinux OS 9 STIG v1r2Unix

AUDIT AND ACCOUNTABILITY

APPL-14-001150 The macOS system must disable password authentication for SSH.DISA Apple macOS 14 (Sonoma) STIG v2r3Unix

IDENTIFICATION AND AUTHENTICATION, MAINTENANCE

APPL-15-001150 - The macOS system must disable password authentication for SSH.DISA Apple macOS 15 (Sequoia) STIG v1r3Unix

IDENTIFICATION AND AUTHENTICATION, MAINTENANCE

ESXI-70-000084 - The ESXi host must enable audit logging.DISA STIG VMware vSphere 7.0 ESXi OS v1r4Unix

CONFIGURATION MANAGEMENT

Excel 2 worksheetsMSCT Office 365 ProPlus 1908 v1.0.0Windows

SYSTEM AND INFORMATION INTEGRITY

Excel 2 worksheetsMSCT Microsoft 365 Apps for Enterprise 2112 v1.0.0Windows

SYSTEM AND INFORMATION INTEGRITY

Excel 2 worksheetsMSCT M365 Apps for enterprise 2412 v1.0.0Windows

SYSTEM AND INFORMATION INTEGRITY

FFOX-00-000013 - Firefox must be configured to disable the installation of extensions.DISA STIG Mozilla Firefox Windows v6r6Windows

CONFIGURATION MANAGEMENT

FFOX-00-000023 - Firefox fingerprinting protection must be enabled.DISA STIG Mozilla Firefox Windows v6r6Windows

CONFIGURATION MANAGEMENT

FFOX-00-000024 - Firefox cryptomining protection must be enabled.DISA STIG Mozilla Firefox Windows v6r6Windows

CONFIGURATION MANAGEMENT

FFOX-00-000027 - Firefox deprecated ciphers must be disabled.DISA STIG Mozilla Firefox Windows v6r6Windows

CONFIGURATION MANAGEMENT

FFOX-00-000028 - Firefox must not recommend extensions as the user is using the browser.DISA STIG Mozilla Firefox MacOS v6r6Unix

CONFIGURATION MANAGEMENT

FFOX-00-000028 - Firefox must not recommend extensions as the user is using the browser.DISA STIG Mozilla Firefox Windows v6r6Windows

CONFIGURATION MANAGEMENT

FFOX-00-000033 - Firefox must be configured so that DNS over HTTPS is disabled.DISA STIG Mozilla Firefox Windows v6r6Windows

CONFIGURATION MANAGEMENT

MADB-10-004400 - MariaDB must use NIST FIPS 140-2 validated cryptographic modules for cryptographic operations.DISA MariaDB Enterprise 10.x v2r3 OS LinuxUnix

IDENTIFICATION AND AUTHENTICATION

RHEL-07-020670 - The Red Hat Enterprise Linux operating system must be configured so that all files and directories contained in local interactive user home directories are group-owned by a group of which the home directory owner is a member.DISA Red Hat Enterprise Linux 7 STIG v3r15Unix

CONFIGURATION MANAGEMENT

RHEL-07-030340 - The Red Hat Enterprise Linux operating system must immediately notify the System Administrator (SA) and Information System Security Officer (ISSO) (at a minimum) via email when the threshold for the repository maximum audit record storage capacity is reached.DISA Red Hat Enterprise Linux 7 STIG v3r15Unix

AUDIT AND ACCOUNTABILITY

RHEL-07-030350 - The Red Hat Enterprise Linux operating system must immediately notify the System Administrator (SA) and Information System Security Officer (ISSO) (at a minimum) when the threshold for the repository maximum audit record storage capacity is reached.DISA Red Hat Enterprise Linux 7 STIG v3r15Unix

AUDIT AND ACCOUNTABILITY

VCST-67-000019 - The Security Token Service must limit the number of allowed connections.DISA STIG VMware vSphere 6.7 STS Tomcat v1r3Unix

SYSTEM AND COMMUNICATIONS PROTECTION

WINER-000012 - The maximum number of error reports to archive on a system must be configured to 100 or greater.DISA Windows Vista STIG v6r41Windows

SYSTEM AND INFORMATION INTEGRITY

WN10-CC-000206 - Windows Update must not obtain updates from other PCs on the internet.DISA Microsoft Windows 10 STIG v3r4Windows

CONFIGURATION MANAGEMENT