Item Search

NameAudit NamePluginCategory
3.1.6 Secure permissions for default database file pathCIS IBM DB2 9 Benchmark v3.0.1 Level 1 OS WindowsWindows

AUDIT AND ACCOUNTABILITY

3.1.6 Secure permissions for default database file pathCIS IBM DB2 9 Benchmark v3.0.1 Level 2 OS WindowsWindows

AUDIT AND ACCOUNTABILITY

3.1.8 Secure all diagnostic logsCIS IBM DB2 9 Benchmark v3.0.1 Level 2 OS LinuxUnix

AUDIT AND ACCOUNTABILITY

3.1.17 Secure permissions for the primary archive log location - LOGARCHMETH1 OS PermissionsCIS IBM DB2 v10 v1.1.0 Windows OS Level 1Windows

AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT

3.1.17 Secure permissions for the primary archive log location - LOGARCHMETH1 OS PermissionsCIS IBM DB2 v10 v1.1.0 Windows OS Level 2Windows

AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT

3.1.17 Secure permissions for the primary archive log location - LOGARCHMETH1 SettingCIS IBM DB2 v10 v1.1.0 Windows OS Level 1Windows

AUDIT AND ACCOUNTABILITY

3.1.18 Secure permissions for the secondary archive log location - LOGARCHMETH2 OS PermissionsCIS IBM DB2 v10 v1.1.0 Windows OS Level 2Windows

AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT

3.1.18 Secure permissions for the secondary archive log location - LOGARCHMETH2 OS PermissionsCIS IBM DB2 v10 v1.1.0 Windows OS Level 1Windows

AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT

3.1.18 Secure permissions for the secondary archive log location - LOGARCHMETH2 SettingCIS IBM DB2 v10 v1.1.0 Windows OS Level 2Windows

AUDIT AND ACCOUNTABILITY

3.1.19 Secure permissions for the tertiary archive log location - FAILARCHPATH SettingCIS IBM DB2 v10 v1.1.0 Windows OS Level 2Windows

AUDIT AND ACCOUNTABILITY

3.1.19 Secure permissions for the tertiary archive log location - FAILARCHPATH SettingCIS IBM DB2 v10 v1.1.0 Linux OS Level 2Unix

AUDIT AND ACCOUNTABILITY

3.1.20 Secure permissions for the log mirror location - MIRRORLOGPATH OS PermissionsCIS IBM DB2 v10 v1.1.0 Windows OS Level 2Windows

AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT

3.1.20 Secure permissions for the log mirror location - MIRRORLOGPATH OS PermissionsCIS IBM DB2 v10 v1.1.0 Windows OS Level 1Windows

AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT

3.1.20 Secure permissions for the log mirror location - MIRRORLOGPATH SettingCIS IBM DB2 v10 v1.1.0 Windows OS Level 1Windows

AUDIT AND ACCOUNTABILITY

3.2.4 Secure permissions for the primary archive log locationCIS IBM DB2 9 Benchmark v3.0.1 Level 1 OS LinuxUnix

AUDIT AND ACCOUNTABILITY

3.2.4 Secure permissions for the primary archive log location - FILE_PERMISSIONSCIS IBM DB2 9 Benchmark v3.0.1 Level 1 OS WindowsWindows

AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT

3.2.5 Secure permissions for the secondary archive log location - FILE_PERMISSIONSCIS IBM DB2 9 Benchmark v3.0.1 Level 1 OS WindowsWindows

AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT

3.2.7 Secure permissions for the log mirror locationCIS IBM DB2 9 Benchmark v3.0.1 Level 1 OS WindowsWindows

AUDIT AND ACCOUNTABILITY

3.2.7 Secure permissions for the log mirror location - FILE_PERMISSIONSCIS IBM DB2 9 Benchmark v3.0.1 Level 1 OS WindowsWindows

AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT

3.09 init.ora - 'audit_file_dest parameter settings'CIS v1.1.0 Oracle 11g OS Windows Level 1Windows

AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT

3.15 sqlnet.ora - 'log_directory_client parameter settings'CIS v1.1.0 Oracle 11g OS Windows Level 1Windows

AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT

3.16 sqlnet.ora - 'log_directory_server parameter settings'CIS v1.1.0 Oracle 11g OS Windows Level 1Windows

AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT

3.20 listener.ora - 'log_file_listener parameter settings'CIS v1.1.0 Oracle 11g OS Windows Level 1Windows

AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT

4.2.1.3 Ensure rsyslog default file permissions configured - rsyslog.conf/rsyslog.dCIS Ubuntu Linux 14.04 LTS Server L1 v2.1.0Unix

AUDIT AND ACCOUNTABILITY

4.2.1.3 Ensure rsyslog default file permissions configured - rsyslog.conf/rsyslog.dCIS Ubuntu Linux 14.04 LTS Workstation L1 v2.1.0Unix

AUDIT AND ACCOUNTABILITY

4.2.2.3 Ensure syslog-ng default file permissions configuredCIS Ubuntu Linux 14.04 LTS Workstation L1 v2.1.0Unix

AUDIT AND ACCOUNTABILITY

4.2.2.3 Ensure syslog-ng default file permissions configuredCIS Ubuntu Linux 14.04 LTS Server L1 v2.1.0Unix

AUDIT AND ACCOUNTABILITY

4.2.2.3 Ensure syslog-ng default file permissions configuredCIS Amazon Linux v2.1.0 L1Unix

AUDIT AND ACCOUNTABILITY

4.6 Ensure that a log metric filter for the Cloudwatch group assigned to the "VPC Flow Logs" is createdCIS Amazon Web Services Three-tier Web Architecture L1 1.0.0amazon_aws

AUDIT AND ACCOUNTABILITY

4.18 init.ora - 'audit_sys_operations = TRUE'CIS v1.1.0 Oracle 11g OS L2Unix

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

4.18 init.ora - 'audit_sys_operations = TRUE'CIS v1.1.0 Oracle 11g OS Windows Level 2Windows

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

5.5 Configure newsyslog for secure file permissions (/var/log/slip.log)CIS FreeBSD v1.0.5Unix

AUDIT AND ACCOUNTABILITY

6.1.1 Audit system file permissionsCIS Ubuntu Linux 14.04 LTS Workstation L2 v2.1.0Unix

AUDIT AND ACCOUNTABILITY

6.1.1 Audit system file permissionsCIS Ubuntu Linux 14.04 LTS Server L2 v2.1.0Unix

AUDIT AND ACCOUNTABILITY

7.6 Ensure directory in logging.properties is a secure location (check log directory location)CIS Apache Tomcat 7 L1 v1.1.0Unix

AUDIT AND ACCOUNTABILITY

7.6 Ensure directory in logging.properties is a secure location (check log directory location)CIS Apache Tomcat 7 L1 v1.1.0 MiddlewareUnix

AUDIT AND ACCOUNTABILITY

8.2.4 Create and Set Permissions on rsyslog Log Files - permissionsCIS Debian Linux 7 L1 v1.0.0Unix

AUDIT AND ACCOUNTABILITY

20.47 Ensure 'Permissions for the Application Event Log must prevent access by non-privileged accounts'CIS Microsoft Windows Server 2022 STIG v1.0.0 STIG MSWindows

AUDIT AND ACCOUNTABILITY

20.47 Ensure 'Permissions for the Application Event Log must prevent access by non-privileged accounts'CIS Microsoft Windows Server 2022 STIG v1.0.0 STIG DCWindows

AUDIT AND ACCOUNTABILITY

20.48 Ensure 'Permissions for the Application Event Log must prevent access by non-privileged accounts'CIS Microsoft Windows Server 2019 STIG v2.0.0 STIG DCWindows

AUDIT AND ACCOUNTABILITY

20.48 Ensure 'Permissions for the Security Event Log must prevent access by non-privileged accounts'CIS Microsoft Windows Server 2022 STIG v1.0.0 STIG MSWindows

AUDIT AND ACCOUNTABILITY

20.49 Ensure 'Permissions for the System Event Log must prevent access by non-privileged accounts'CIS Microsoft Windows Server 2022 STIG v1.0.0 STIG DCWindows

AUDIT AND ACCOUNTABILITY

20.50 Ensure 'Permissions for the System Event Log must prevent access by non-privileged accounts'CIS Microsoft Windows Server 2019 STIG v2.0.0 STIG MSWindows

AUDIT AND ACCOUNTABILITY

DG7003-ORACLE11 - A minimum of two Oracle redo log groups/files must be defined and configured to be stored on separate, archived physical disks or archived directories on a RAID device.DISA STIG Oracle 11 Installation v9r1 DatabaseOracleDB

AUDIT AND ACCOUNTABILITY

DO5037-ORACLE11 - Oracle SQLNet and listener log files should not be accessible to unauthorized users - '$ORACLE_HOME/network/log/sqlnet.log mode 640'DISA STIG Oracle 11 Installation v9r1 LinuxUnix

AUDIT AND ACCOUNTABILITY

Ensure rsyslog default file permissions configuredTenable Cisco Firepower Management Center OS Best Practices AuditUnix

AUDIT AND ACCOUNTABILITY

Ensure syslog-ng default file permissions configuredTenable Cisco Firepower Management Center OS Best Practices AuditUnix

AUDIT AND ACCOUNTABILITY

Logging Directives should be restricted to authorized users. - 'CustomLog logs/access_log combined'TNS IBM HTTP Server Best PracticeWindows

AUDIT AND ACCOUNTABILITY

Logging Directives should be restricted to authorized users. - 'ErrorLog logs/error_log'TNS IBM HTTP Server Best PracticeWindows

AUDIT AND ACCOUNTABILITY

Logs containing auditing information should be secured at the directory level.TNS IBM HTTP Server Best PracticeWindows

AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT