Item Search

NameAudit NamePluginCategory
1.1 Ensure packages are obtained from authorized repositoriesCIS PostgreSQL 9.5 OS v1.1.0Unix

CONFIGURATION MANAGEMENT

2.3.3 - MobileIron - Mark Company Mail DomainMobileIron - CIS Apple iOS 9 v1.0.0 L2MDM

ACCESS CONTROL

3.1.7 Secure permissions for all diagnostic logsCIS IBM DB2 v10 v1.1.0 Linux OS Level 1Unix
3.1.7 Secure permissions for all diagnostic logsCIS IBM DB2 v10 v1.1.0 Windows OS Level 1Windows
3.1.7 Secure permissions for all diagnostic logsCIS IBM DB2 v10 v1.1.0 Linux OS Level 2Unix
3.1.19 Secure permissions for the tertiary archive log location - FAILARCHPATH OS PermissionCIS IBM DB2 v10 v1.1.0 Linux OS Level 1Unix
3.1.19 Secure permissions for the tertiary archive log location - FAILARCHPATH OS PermissionCIS IBM DB2 v10 v1.1.0 Linux OS Level 2Unix
3.1.19 Secure permissions for the tertiary archive log location - FAILARCHPATH SettingCIS IBM DB2 v10 v1.1.0 Linux OS Level 1Unix

AUDIT AND ACCOUNTABILITY

3.1.19 Secure permissions for the tertiary archive log location - FAILARCHPATH SettingCIS IBM DB2 v10 v1.1.0 Linux OS Level 2Unix

AUDIT AND ACCOUNTABILITY

3.1.19 Secure permissions for the tertiary archive log location - FAILARCHPATH SettingCIS IBM DB2 v10 v1.1.0 Windows OS Level 1Windows

AUDIT AND ACCOUNTABILITY

3.1.19 Secure permissions for the tertiary archive log location - FAILARCHPATH SettingCIS IBM DB2 v10 v1.1.0 Windows OS Level 2Windows

AUDIT AND ACCOUNTABILITY

3.1.20 Secure permissions for the log mirror location - MIRROLOGPATH OS PermissionCIS IBM DB2 v10 v1.1.0 Linux OS Level 1Unix
3.1.20 Secure permissions for the log mirror location - MIRROLOGPATH OS PermissionCIS IBM DB2 v10 v1.1.0 Linux OS Level 2Unix
3.1.20 Secure permissions for the log mirror location - MIRRORLOGPATH OS PermissionsCIS IBM DB2 v10 v1.1.0 Windows OS Level 1Windows

AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT

3.1.20 Secure permissions for the log mirror location - MIRRORLOGPATH OS PermissionsCIS IBM DB2 v10 v1.1.0 Windows OS Level 2Windows

AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT

3.1.20 Secure permissions for the log mirror location - MIRRORLOGPATH SettingCIS IBM DB2 v10 v1.1.0 Windows OS Level 2Windows

AUDIT AND ACCOUNTABILITY

3.1.20 Secure permissions for the log mirror location - MIRRORLOGPATH SettingCIS IBM DB2 v10 v1.1.0 Linux OS Level 1Unix

AUDIT AND ACCOUNTABILITY

3.1.20 Secure permissions for the log mirror location - MIRRORLOGPATH SettingCIS IBM DB2 v10 v1.1.0 Windows OS Level 1Windows

AUDIT AND ACCOUNTABILITY

3.1.20 Secure permissions for the log mirror location - MIRRORLOGPATH SettingCIS IBM DB2 v10 v1.1.0 Linux OS Level 2Unix

AUDIT AND ACCOUNTABILITY

3.8 Ensure the Lock File Is Secured - 'LockFile directory'CIS Apache HTTP Server 2.2 L1 v3.6.0Unix

ACCESS CONTROL

3.8 Ensure the Lock File Is Secured - 'LockFile directory'CIS Apache HTTP Server 2.2 L1 v3.6.0 MiddlewareUnix

ACCESS CONTROL

3.8 Ensure the Lock File Is Secured - 'LockFile directory'CIS Apache HTTP Server 2.2 L2 v3.6.0Unix

ACCESS CONTROL

3.8 Ensure the Lock File Is Secured - 'LockFile permissions'CIS Apache HTTP Server 2.2 L2 v3.6.0Unix

ACCESS CONTROL

4.3 Review Users, Groups, and Roles - Groups listCIS IBM DB2 v10 v1.1.0 Linux OS Level 1Unix

ACCESS CONTROL

4.3 Review Users, Groups, and Roles - Groups listCIS IBM DB2 v10 v1.1.0 Windows OS Level 2Windows

ACCESS CONTROL

4.3 Review Users, Groups, and Roles - Groups listCIS IBM DB2 v10 v1.1.0 Windows OS Level 1Windows

ACCESS CONTROL

4.3 Review Users, Groups, and Roles - Users listCIS IBM DB2 v10 v1.1.0 Linux OS Level 1Unix

ACCESS CONTROL

4.3 Review Users, Groups, and Roles - Users listCIS IBM DB2 v10 v1.1.0 Windows OS Level 1Windows

ACCESS CONTROL

4.3 Review Users, Groups, and Roles - Users listCIS IBM DB2 v10 v1.1.0 Linux OS Level 2Unix

ACCESS CONTROL

4.3 Review Users, Groups, and Roles - Users listCIS IBM DB2 v10 v1.1.0 Windows OS Level 2Windows

ACCESS CONTROL

5.28 Ensure PIDs cgroup limit is usedCIS Docker Community Edition v1.1.0 L1 DockerUnix

SYSTEM AND COMMUNICATIONS PROTECTION

5.28 Use PIDs cgroup limitCIS Docker 1.13.0 v1.0.0 L1 DockerUnix

SYSTEM AND COMMUNICATIONS PROTECTION

6.2 Ensure 'CLR Assembly Permission Set' is set to 'SAFE_ACCESS' for All CLR AssembliesCIS SQL Server 2008 R2 DB Engine L1 v1.7.0MS_SQLDB

CONFIGURATION MANAGEMENT

18.10.16.1 (L1) Ensure 'Download Mode' is NOT set to 'Enabled: Internet'CIS Microsoft Windows 10 Stand-alone v3.0.0 L1 BL NGWindows

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

18.10.16.1 (L1) Ensure 'Download Mode' is NOT set to 'Enabled: Internet'CIS Microsoft Windows 10 Enterprise v3.0.0 L1 + BLWindows

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

18.10.16.1 Ensure 'Download Mode' is set to 'Enabled' (STIG only)CIS Microsoft Windows Server 2019 STIG v3.0.0 STIG MSWindows

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

18.10.16.1 Ensure 'Download Mode' is set to 'Enabled' (STIG only)CIS Microsoft Windows Server 2019 STIG v3.0.0 STIG DCWindows

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

18.10.16.1 Ensure 'Download Mode' is set to 'Enabled' (STIG only)CIS Microsoft Windows Server 2022 STIG v2.0.0 STIG DCWindows

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

22.1 (L1) Ensure 'DO Download Mode' is NOT set to 'HTTP blended with Internet Peering'CIS Microsoft Intune for Windows 11 v3.0.1 L1Windows

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

22.1 (L1) Ensure 'DO Download Mode' is NOT set to 'HTTP blended with Internet Peering'CIS Microsoft Intune for Windows 10 v3.0.1 L1Windows

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

100. OpenStack Compute - Policy.json - 'compute_extension:admin_actions:migrate'TNS OpenStack Nova/Compute Security GuideUnix

ACCESS CONTROL

JUEX-L2-000150 - The Juniper EX switch must be configured to enable Storm Control on all host-facing access interfaces.DISA Juniper EX Series Layer 2 Switch v2r2Juniper

CONFIGURATION MANAGEMENT

OL6-00-000009 - The Red Hat Network Service (rhnsd) service must not be running, unless it is being used to query the Oracle Unbreakable Linux Network for updates and information - PROCESS_CHECKDISA STIG Oracle Linux 6 v2r7Unix

CONFIGURATION MANAGEMENT

RHEL-07-010160 - The Red Hat Enterprise Linux operating system must be configured so that when passwords are changed a minimum of eight of the total number of characters must be changed.DISA Red Hat Enterprise Linux 7 STIG v3r15Unix

IDENTIFICATION AND AUTHENTICATION

RHEL-07-010180 - The Red Hat Enterprise Linux operating system must be configured so that when passwords are changed the number of repeating consecutive characters must not be more than three characters.DISA Red Hat Enterprise Linux 7 STIG v3r15Unix

IDENTIFICATION AND AUTHENTICATION

RHEL-07-010320 - The Red Hat Enterprise Linux operating system must be configured to lock accounts for a minimum of 15 minutes after three unsuccessful logon attempts within a 15-minute timeframe.DISA Red Hat Enterprise Linux 7 STIG v3r15Unix

ACCESS CONTROL

RHEL-07-010430 - The Red Hat Enterprise Linux operating system must be configured so that the delay between logon prompts following a failed console logon attempt is at least four seconds.DISA Red Hat Enterprise Linux 7 STIG v3r15Unix

CONFIGURATION MANAGEMENT

RHEL-07-020300 - The Red Hat Enterprise Linux operating system must be configured so that all Group Identifiers (GIDs) referenced in the /etc/passwd file are defined in the /etc/group file.DISA Red Hat Enterprise Linux 7 STIG v3r15Unix

IDENTIFICATION AND AUTHENTICATION

RHEL-07-021010 - The Red Hat Enterprise Linux operating system must prevent files with the setuid and setgid bit set from being executed on file systems that are used with removable media.DISA Red Hat Enterprise Linux 7 STIG v3r15Unix

CONFIGURATION MANAGEMENT

SQL2-00-022400 - SQL Server must ensure, if Database Availability Groups are being used and there is a server failure, that none of the potential failover servers would suffer from resource exhaustion.DISA STIG SQL Server 2012 DB Instance Security v1r20MS_SQLDB

SYSTEM AND COMMUNICATIONS PROTECTION