Item Search

NameAudit NamePluginCategory
1.1.1.6 Ensure squashfs kernel module is not availableCIS AlmaLinux OS 9 v2.0.0 L2 WorkstationUnix

CONFIGURATION MANAGEMENT

1.1.1.6 Ensure squashfs kernel module is not availableCIS Rocky Linux 9 v2.0.0 L2 WorkstationUnix

CONFIGURATION MANAGEMENT

1.1.1.6 Ensure squashfs kernel module is not availableCIS Red Hat Enterprise Linux 9 v2.0.0 L2 ServerUnix

CONFIGURATION MANAGEMENT

1.1.1.6 Ensure squashfs kernel module is not availableCIS Oracle Linux 9 v2.0.0 L2 ServerUnix

CONFIGURATION MANAGEMENT

1.1.1.6 Ensure squashfs kernel module is not availableCIS Oracle Linux 9 v2.0.0 L2 WorkstationUnix

CONFIGURATION MANAGEMENT

1.1.1.6 Ensure squashfs kernel module is not availableCIS Rocky Linux 9 v2.0.0 L2 ServerUnix

CONFIGURATION MANAGEMENT

1.1.1.7 Ensure squashfs kernel module is not availableCIS Ubuntu Linux 24.04 LTS v1.0.0 L2 ServerUnix

CONFIGURATION MANAGEMENT

1.1.1.7 Ensure squashfs kernel module is not availableCIS Red Hat Enterprise Linux 8 STIG v2.0.0 L2 ServerUnix

CONFIGURATION MANAGEMENT

1.1.1.7 Ensure squashfs kernel module is not availableCIS Debian Linux 12 v1.1.0 L2 WorkstationUnix

CONFIGURATION MANAGEMENT

1.1.1.7 Ensure squashfs kernel module is not availableCIS Ubuntu Linux 24.04 LTS v1.0.0 L2 WorkstationUnix

CONFIGURATION MANAGEMENT

1.1.1.7 Ensure squashfs kernel module is not availableCIS Red Hat Enterprise Linux 8 STIG v2.0.0 L2 WorkstationUnix

CONFIGURATION MANAGEMENT

1.2 Ensure Installation of Binary PackagesCIS PostgreSQL 9.5 OS v1.1.0Unix

CONFIGURATION MANAGEMENT

1.2.1 Ensure package manager repositories are properly configuredCIS NGINX Benchmark v2.1.0 L1 WebserverUnix

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

1.2.1 Ensure package manager repositories are properly configuredCIS NGINX Benchmark v2.1.0 L1 ProxyUnix

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

1.2.1 Ensure package manager repositories are properly configuredCIS NGINX Benchmark v2.1.0 L1 LoadbalancerUnix

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

3.4.2.1 Ensure nftables is installedCIS CentOS Linux 8 Workstation L1 v2.0.0Unix

SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION

3.4.2.1 Ensure nftables is installedCIS CentOS Linux 8 Server L1 v2.0.0Unix

SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION

3.4.2.1 Ensure nftables is installedCIS Fedora 28 Family Linux Server L1 v2.0.0Unix

SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION

3.4.3.1.2 Ensure nftables is not installed with iptablesCIS CentOS Linux 8 Server L1 v2.0.0Unix

SECURITY ASSESSMENT AND AUTHORIZATION, CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

3.4.3.1.2 Ensure nftables is not installed with iptablesCIS Fedora 28 Family Linux Workstation L1 v2.0.0Unix

SECURITY ASSESSMENT AND AUTHORIZATION, CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

3.4.3.1.2 Ensure nftables is not installed with iptablesCIS Debian 10 Workstation L1 v2.0.0Unix

SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION

3.4.3.1.2 Ensure nftables is not installed with iptablesCIS Debian 10 Server L1 v2.0.0Unix

SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION

3.5.1.1 Ensure ufw is installedCIS Ubuntu Linux 16.04 LTS Server L1 v2.0.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION

3.5.1.3 Ensure nftables either not installed or masked with firewalld - stoppedCIS Red Hat Enterprise Linux 7 STIG v2.0.0 L1 ServerUnix

SECURITY ASSESSMENT AND AUTHORIZATION, CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

3.5.1.3 Ensure nftables either not installed or masked with firewalld - stoppedCIS Red Hat Enterprise Linux 7 STIG v2.0.0 L1 WorkstationUnix

SECURITY ASSESSMENT AND AUTHORIZATION, CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

3.5.1.3 Ensure nftables is not installed or stopped and maskedCIS Fedora 19 Family Linux Server L1 v1.0.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION

3.5.1.3 Ensure nftables is not installed or stopped and maskedCIS Fedora 19 Family Linux Workstation L1 v1.0.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION

3.5.2.1 Ensure nftables is installedCIS Amazon Linux 2 STIG v2.0.0 L1 ServerUnix

SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION

3.5.2.1 Ensure nftables is installedCIS Amazon Linux 2 STIG v2.0.0 L1 WorkstationUnix

SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION

3.5.3.1.2 Ensure nftables is not installed with iptablesCIS Amazon Linux 2 STIG v2.0.0 L1 WorkstationUnix

SECURITY ASSESSMENT AND AUTHORIZATION, CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

4.2.1.4 Ensure rsyslog is configured to send logs to a remote log hostCIS Debian 8 Workstation L1 v2.0.2Unix

AUDIT AND ACCOUNTABILITY

4.2.1.6 Ensure rsyslog is configured to send logs to a remote log hostCIS Debian Family Workstation L1 v1.0.0Unix

AUDIT AND ACCOUNTABILITY

4.2.2 Ensure nftables is not in use with ufwCIS Ubuntu Linux 20.04 LTS v3.0.0 L1 ServerUnix

SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION

4.2.2 Ensure nftables is not in use with ufwCIS Ubuntu Linux 20.04 LTS v3.0.0 L1 WorkstationUnix

SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION

4.4.1.2 Ensure nftables is not in use with iptablesCIS Ubuntu Linux 20.04 LTS v3.0.0 L1 ServerUnix

SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION

4.4.1.2 Ensure nftables is not in use with iptablesCIS Ubuntu Linux 24.04 LTS v1.0.0 L1 WorkstationUnix

SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION

4.4.1.2 Ensure nftables is not in use with iptablesCIS Debian Linux 12 v1.1.0 L1 ServerUnix

SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION

4.4.1.2 Ensure nftables is not in use with iptablesCIS Ubuntu Linux 24.04 LTS v1.0.0 L1 ServerUnix

SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION

4.4.1.2 Ensure nftables is not in use with iptablesCIS Ubuntu Linux 20.04 LTS v3.0.0 L1 WorkstationUnix

SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION

6.2.3.6 Ensure rsyslog is configured to send logs to a remote log hostCIS Ubuntu Linux 20.04 LTS v3.0.0 L1 WorkstationUnix

AUDIT AND ACCOUNTABILITY

6.2.3.6 Ensure rsyslog is configured to send logs to a remote log hostCIS Ubuntu Linux 20.04 LTS v3.0.0 L1 ServerUnix

AUDIT AND ACCOUNTABILITY

8.3.1 Ensure unnecessary or superfluous functions inside VMs are disabledCIS VMware ESXi 6.5 v1.0.0 Level 1VMware

SYSTEM AND INFORMATION INTEGRITY

CIS_Docker_1.6_v1.0.0_L2_Docker.audit Level 2CIS Docker 1.6 v1.0.0 L2 DockerUnix
DNS Profile - Address - DNS Server 2Tenable Cisco ACICisco_ACI

SYSTEM AND COMMUNICATIONS PROTECTION

DTAVSEL-003 - The McAfee VirusScan Enterprise for Linux 1.9.x/2.0.x must be configured to enable On-Access scanning.McAfee Virus Scan Enterprise for Linux 1.9x/2.0x Local Client v1r6Unix

SYSTEM AND INFORMATION INTEGRITY

DTAVSEL-113 - The McAfee VirusScan Enterprise for Linux 1.9.x/2.0.x On-Demand scanner must be configured to include all local drives and their sub-directories.McAfee Virus Scan Enterprise for Linux 1.9x/2.0x Local Client v1r6Unix

SYSTEM AND INFORMATION INTEGRITY

PHTN-30-000046 - The Photon operating system must initiate auditing as part of the boot process.DISA STIG VMware vSphere 7.0 Photon OS v1r4Unix

AUDIT AND ACCOUNTABILITY

RHEL-06-000534 - The Red Hat Enterprise Linux operating system must implement NIST FIPS-validated cryptography for the following: to provision digital signatures, to generate cryptographic hashes, and to protect data requiring data-at-rest protections in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, and standards - grubDISA Red Hat Enterprise Linux 6 STIG v2r2Unix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

RHEL-06-000534 - The Red Hat Enterprise Linux operating system must implement NIST FIPS-validated cryptography for the following: to provision digital signatures, to generate cryptographic hashes, and to protect data requiring data-at-rest protections in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, and standards - procDISA Red Hat Enterprise Linux 6 STIG v2r2Unix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

RHEL-08-030603 - RHEL 8 must enable Linux audit logging for the USBGuard daemon.DISA Red Hat Enterprise Linux 8 STIG v2r4Unix

AUDIT AND ACCOUNTABILITY