Item Search

NameAudit NamePluginCategory
1.1 Ensure packages are obtained from authorized repositoriesCIS PostgreSQL 9.5 OS v1.1.0Unix

CONFIGURATION MANAGEMENT

2.3.3 - AirWatch - Mark Company Mail DomainAirWatch - CIS Apple iOS 9 v1.0.0 L2MDM

ACCESS CONTROL

2.3.3 - MobileIron - Mark Company Mail DomainMobileIron - CIS Apple iOS 9 v1.0.0 L2MDM

ACCESS CONTROL

3.1 Ensure the Apache Web Server Runs As a Non-Root User - 'httpd services are running as apache user'CIS Apache HTTP Server 2.4 L1 v2.1.0Unix

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

3.1.7 Secure permissions for all diagnostic logsCIS IBM DB2 v10 v1.1.0 Linux OS Level 1Unix
3.1.7 Secure permissions for all diagnostic logsCIS IBM DB2 v10 v1.1.0 Windows OS Level 1Windows
3.1.7 Secure permissions for all diagnostic logsCIS IBM DB2 v10 v1.1.0 Linux OS Level 2Unix
3.1.19 Secure permissions for the tertiary archive log location - FAILARCHPATH OS PermissionCIS IBM DB2 v10 v1.1.0 Linux OS Level 1Unix
3.1.19 Secure permissions for the tertiary archive log location - FAILARCHPATH SettingCIS IBM DB2 v10 v1.1.0 Linux OS Level 1Unix

AUDIT AND ACCOUNTABILITY

3.1.20 Secure permissions for the log mirror location - MIRROLOGPATH OS PermissionCIS IBM DB2 v10 v1.1.0 Linux OS Level 1Unix
3.1.20 Secure permissions for the log mirror location - MIRRORLOGPATH SettingCIS IBM DB2 v10 v1.1.0 Windows OS Level 2Windows

AUDIT AND ACCOUNTABILITY

3.8 Ensure the Lock File Is Secured - 'LockFile directory'CIS Apache HTTP Server 2.2 L1 v3.6.0Unix

ACCESS CONTROL

3.8 Ensure the Lock File Is Secured - 'LockFile directory'CIS Apache HTTP Server 2.2 L1 v3.6.0 MiddlewareUnix

ACCESS CONTROL

3.8 Ensure the Lock File Is Secured - 'LockFile directory'CIS Apache HTTP Server 2.2 L2 v3.6.0Unix

ACCESS CONTROL

3.8 Ensure the Lock File Is Secured - 'LockFile permissions'CIS Apache HTTP Server 2.2 L2 v3.6.0Unix

ACCESS CONTROL

4.3 Review Users, Groups, and Roles - Groups listCIS IBM DB2 v10 v1.1.0 Linux OS Level 1Unix

ACCESS CONTROL

4.3 Review Users, Groups, and Roles - Users listCIS IBM DB2 v10 v1.1.0 Linux OS Level 1Unix

ACCESS CONTROL

4.3 Review Users, Groups, and Roles - Users listCIS IBM DB2 v10 v1.1.0 Windows OS Level 1Windows

ACCESS CONTROL

4.3 Review Users, Groups, and Roles - Users listCIS IBM DB2 v10 v1.1.0 Linux OS Level 2Unix

ACCESS CONTROL

5.28 Use PIDs cgroup limitCIS Docker 1.12.0 v1.0.0 L1 DockerUnix

SYSTEM AND COMMUNICATIONS PROTECTION

5.28 Use PIDs cgroup limitCIS Docker 1.13.0 v1.0.0 L1 DockerUnix

SYSTEM AND COMMUNICATIONS PROTECTION

6.2 Ensure 'CLR Assembly Permission Set' is set to 'SAFE_ACCESS' for All CLR AssembliesCIS SQL Server 2008 R2 DB Engine L1 v1.7.0MS_SQLDB

CONFIGURATION MANAGEMENT

18.10.16.1 (L1) Ensure 'Download Mode' is NOT set to 'Enabled: Internet'CIS Microsoft Windows 10 Enterprise v3.0.0 L1 + NGWindows

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

18.10.16.1 (L1) Ensure 'Download Mode' is NOT set to 'Enabled: Internet'CIS Microsoft Windows 11 Stand-alone v3.0.0 L1 + BLWindows

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

18.10.16.1 (L1) Ensure 'Download Mode' is NOT set to 'Enabled: Internet'CIS Microsoft Windows 10 Stand-alone v3.0.0 L1 BLWindows

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

18.10.16.1 (L1) Ensure 'Download Mode' is NOT set to 'Enabled: Internet'CIS Microsoft Windows 10 Stand-alone v3.0.0 L1 BL NGWindows

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

18.10.16.1 (L1) Ensure 'Download Mode' is NOT set to 'Enabled: Internet'CIS Microsoft Windows 10 Enterprise v3.0.0 L1 + BLWindows

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

18.10.16.1 Ensure 'Download Mode' is set to 'Enabled' (STIG only)CIS Microsoft Windows Server 2019 STIG v2.0.0 STIG MSWindows

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

18.10.16.1 Ensure 'Download Mode' is set to 'Enabled' (STIG only)CIS Microsoft Windows Server 2022 STIG v1.0.0 STIG MSWindows

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

22.1 (L1) Ensure 'DO Download Mode' is NOT set to 'HTTP blended with Internet Peering'CIS Microsoft Intune for Windows 11 v3.0.1 L1Windows

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

22.1 (L1) Ensure 'DO Download Mode' is NOT set to 'HTTP blended with Internet Peering'CIS Microsoft Intune for Windows 10 v3.0.1 L1Windows

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

Buffer overflow protection should be configured 'LimitRequestBody'TNS IBM HTTP Server Best PracticeUnix

SYSTEM AND INFORMATION INTEGRITY

Buffer overflow protection should be configured 'LimitRequestFields'TNS IBM HTTP Server Best PracticeUnix

SYSTEM AND INFORMATION INTEGRITY

Buffer overflow protection should be configured 'LimitRequestline'TNS IBM HTTP Server Best PracticeUnix

SYSTEM AND INFORMATION INTEGRITY

Buffer overflow protection should be configured 'LimitRequestline'TNS IBM HTTP Server Best PracticeWindows

SYSTEM AND COMMUNICATIONS PROTECTION

DKER-EE-001950 - Linux Kernel capabilities must be restricted within containers as defined in the System Security Plan (SSP) for Docker Enterprise.DISA STIG Docker Enterprise 2.x Linux/Unix v2r2Unix

CONFIGURATION MANAGEMENT

JUEX-L2-000150 - The Juniper EX switch must be configured to enable Storm Control on all host-facing access interfaces.DISA Juniper EX Series Layer 2 Switch v2r2Juniper

CONFIGURATION MANAGEMENT

OL6-00-000009 - The Red Hat Network Service (rhnsd) service must not be running, unless it is being used to query the Oracle Unbreakable Linux Network for updates and information - CHKCONFIGDISA STIG Oracle Linux 6 v2r7Unix

CONFIGURATION MANAGEMENT

OL6-00-000009 - The Red Hat Network Service (rhnsd) service must not be running, unless it is being used to query the Oracle Unbreakable Linux Network for updates and information - PROCESS_CHECKDISA STIG Oracle Linux 6 v2r7Unix

CONFIGURATION MANAGEMENT

OL07-00-010482 - Oracle Linux operating systems version 7.2 or newer with a Basic Input/Output System (BIOS) must require authentication upon booting into single-user and maintenance modes - BIOS must require authentication upon booting into single-user and maintenance modes.DISA Oracle Linux 7 STIG v3r1Unix

ACCESS CONTROL

RHEL-07-010160 - The Red Hat Enterprise Linux operating system must be configured so that when passwords are changed a minimum of eight of the total number of characters must be changed.DISA Red Hat Enterprise Linux 7 STIG v3r15Unix

IDENTIFICATION AND AUTHENTICATION

RHEL-07-010180 - The Red Hat Enterprise Linux operating system must be configured so that when passwords are changed the number of repeating consecutive characters must not be more than three characters.DISA Red Hat Enterprise Linux 7 STIG v3r15Unix

IDENTIFICATION AND AUTHENTICATION

RHEL-07-010320 - The Red Hat Enterprise Linux operating system must be configured to lock accounts for a minimum of 15 minutes after three unsuccessful logon attempts within a 15-minute timeframe.DISA Red Hat Enterprise Linux 7 STIG v3r15Unix

ACCESS CONTROL

RHEL-07-010430 - The Red Hat Enterprise Linux operating system must be configured so that the delay between logon prompts following a failed console logon attempt is at least four seconds.DISA Red Hat Enterprise Linux 7 STIG v3r15Unix

CONFIGURATION MANAGEMENT

RHEL-07-010482 - Red Hat Enterprise Linux operating systems version 7.2 or newer with a Basic Input/Output System (BIOS) must require authentication upon booting into single-user and maintenance modes.DISA Red Hat Enterprise Linux 7 STIG v3r15Unix

ACCESS CONTROL

RHEL-07-020300 - The Red Hat Enterprise Linux operating system must be configured so that all Group Identifiers (GIDs) referenced in the /etc/passwd file are defined in the /etc/group file.DISA Red Hat Enterprise Linux 7 STIG v3r15Unix

IDENTIFICATION AND AUTHENTICATION

RHEL-07-020690 - The Red Hat Enterprise Linux operating system must be configured so that all local initialization files for interactive users are owned by the home directory user or root.DISA Red Hat Enterprise Linux 7 STIG v3r15Unix

CONFIGURATION MANAGEMENT

RHEL-07-021010 - The Red Hat Enterprise Linux operating system must prevent files with the setuid and setgid bit set from being executed on file systems that are used with removable media.DISA Red Hat Enterprise Linux 7 STIG v3r15Unix

CONFIGURATION MANAGEMENT

RHEL-07-040170 - The Red Hat Enterprise Linux operating system must display the Standard Mandatory DoD Notice and Consent Banner immediately prior to, or as part of, remote access logon prompts.DISA Red Hat Enterprise Linux 7 STIG v3r15Unix

ACCESS CONTROL

SQL2-00-022400 - SQL Server must ensure, if Database Availability Groups are being used and there is a server failure, that none of the potential failover servers would suffer from resource exhaustion.DISA STIG SQL Server 2012 DB Instance Security v1r20MS_SQLDB

SYSTEM AND COMMUNICATIONS PROTECTION