Item Search

NameAudit NamePluginCategory
1.1.3 Ensure separate file system for /tmpCIS Amazon Linux 2 STIG v1.0.0 L3Unix

SYSTEM AND COMMUNICATIONS PROTECTION

1.2.2 Verify Red Hat GPG Key is InstalledCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

SYSTEM AND INFORMATION INTEGRITY

1.4.2 Ensure authentication required for single user mode - emergency.serviceCIS Amazon Linux 2 STIG v1.0.0 L1Unix

CONFIGURATION MANAGEMENT

1.4.2 Ensure authentication required for single user mode - rescue.serviceCIS Amazon Linux 2 STIG v1.0.0 L1Unix

CONFIGURATION MANAGEMENT

1.4.4 Ensure UEFI requires authentication for single-user and maintenance modes - passwordCIS Amazon Linux 2 STIG v1.0.0 L3Unix

CONFIGURATION MANAGEMENT

1.4.4 Ensure UEFI requires authentication for single-user and maintenance modes - superusersCIS Amazon Linux 2 STIG v1.0.0 L3Unix

CONFIGURATION MANAGEMENT

1.7.1.1 Ensure message of the day is configured properly - banner_checkCIS Amazon Linux 2 STIG v1.0.0 L1Unix

CONFIGURATION MANAGEMENT

1.7.1.1 Ensure message of the day is configured properly - msrvCIS Amazon Linux 2 STIG v1.0.0 L1Unix

CONFIGURATION MANAGEMENT

1.8.6 Ensure GDM session lock is enabledCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIGUnix

ACCESS CONTROL

2.2.2.6 Ensure automatic logon via GUI is not allowedCIS Amazon Linux 2 STIG v1.0.0 L3Unix

CONFIGURATION MANAGEMENT

2.2.24 Ensure default SNMP community strings don't existCIS Amazon Linux 2 STIG v1.0.0 L3Unix

IDENTIFICATION AND AUTHENTICATION

2.2.29 Ensure nosuid option is set for NFSCIS Amazon Linux 2 STIG v1.0.0 L3Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

2.2.30 Ensure NFS is configured to use RPCSEC_GSS.CIS Amazon Linux 2 STIG v1.0.0 L3Unix

CONFIGURATION MANAGEMENT

2.2.31 Ensure noexec option is configured for NFS.CIS Amazon Linux 2 STIG v1.0.0 L3Unix

CONFIGURATION MANAGEMENT

2.3.4 Ensure telnet client is not installedCIS Amazon Linux 2 STIG v1.0.0 L1Unix

IDENTIFICATION AND AUTHENTICATION

3.1.1 Ensure IP forwarding is disabled - sysctl net.ipv4.ip_forward = 0CIS Amazon Linux 2 STIG v1.0.0 L1Unix

CONFIGURATION MANAGEMENT

3.1.1 Ensure IP forwarding is disabled - sysctl net.ipv6.conf.all.forwarding = 0CIS Amazon Linux 2 STIG v1.0.0 L1Unix

CONFIGURATION MANAGEMENT

3.2.10 Ensure rate limiting measures are set - sysctlCIS Amazon Linux 2 STIG v1.0.0 L3Unix

SYSTEM AND COMMUNICATIONS PROTECTION

3.7 Ensure IP tunnels are not configured.CIS Amazon Linux 2 STIG v1.0.0 L3Unix

SYSTEM AND COMMUNICATIONS PROTECTION

4.1.16 Ensure changes to system administration scope (sudoers) is collected - /etc/sudoersCIS Amazon Linux 2 STIG v1.0.0 L2Unix

AUDIT AND ACCOUNTABILITY

4.1.16 Ensure changes to system administration scope (sudoers) is collected - /etc/sudoers.dCIS Amazon Linux 2 STIG v1.0.0 L2Unix

AUDIT AND ACCOUNTABILITY

4.1.16 Ensure changes to system administration scope (sudoers) is collected - auditctl /etc/sudoersCIS Amazon Linux 2 STIG v1.0.0 L2Unix

AUDIT AND ACCOUNTABILITY

4.1.16 Ensure changes to system administration scope (sudoers) is collected - auditctl /etc/sudoers.dCIS Amazon Linux 2 STIG v1.0.0 L2Unix

AUDIT AND ACCOUNTABILITY

4.4 Ensure audit system is set to single when the disk is full.CIS Amazon Linux 2 STIG v1.0.0 L3Unix

AUDIT AND ACCOUNTABILITY

4.6 Ensure audit system action is defined for sending errorsCIS Amazon Linux 2 STIG v1.0.0 L3Unix

AUDIT AND ACCOUNTABILITY

4.7 Enable use of the au-remote pluginCIS Amazon Linux 2 STIG v1.0.0 L3Unix

AUDIT AND ACCOUNTABILITY

4.8 Ensure off-load of audit logs - directionCIS Amazon Linux 2 STIG v1.0.0 L3Unix

AUDIT AND ACCOUNTABILITY

4.8 Enure off-load of audit logs - pathCIS Amazon Linux 2 STIG v1.0.0 L3Unix

AUDIT AND ACCOUNTABILITY

4.9 Ensure action is taken when audisp-remote buffer is fullCIS Amazon Linux 2 STIG v1.0.0 L3Unix

AUDIT AND ACCOUNTABILITY

4.10 Ensure off-loaded audit logs are labeled.CIS Amazon Linux 2 STIG v1.0.0 L3Unix

AUDIT AND ACCOUNTABILITY

5.2.4 Ensure permissions on SSH private host key files are configuredCIS Amazon Linux 2 STIG v1.0.0 L1Unix

CONFIGURATION MANAGEMENT

5.2.5 Ensure permissions on SSH public host key files are configuredCIS Amazon Linux 2 STIG v1.0.0 L1Unix

CONFIGURATION MANAGEMENT

5.2.6 Ensure SSH Protocol is set to 2CIS Amazon Linux 2 STIG v1.0.0 L1Unix

SYSTEM AND COMMUNICATIONS PROTECTION

5.3.8 Ensure date and time of last successful logon - showfailedCIS Amazon Linux 2 STIG v1.0.0 L3Unix

ACCESS CONTROL

5.3.8 Ensure date and time of last successful logon - silentCIS Amazon Linux 2 STIG v1.0.0 L3Unix

ACCESS CONTROL

5.3.11 Ensure system-auth is used when changing passwordsCIS Amazon Linux 2 STIG v1.0.0 L3Unix

IDENTIFICATION AND AUTHENTICATION

5.4.1.10 Ensure delay between logon prompts on failureCIS Amazon Linux 2 STIG v1.0.0 L3Unix

ACCESS CONTROL

5.4.1.11 Ensure inactive password lock is 0 daysCIS Amazon Linux 2 STIG v1.0.0 L3Unix

ACCESS CONTROL

5.4.8 Ensure Default user umask is 077CIS Amazon Linux 2 STIG v1.0.0 L3Unix

ACCESS CONTROL

5.5.1.7 Ensure password expiration is 60 Day maximum for new usersCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIGUnix

IDENTIFICATION AND AUTHENTICATION

5.5.1.8 Ensure password expiration is 60 Day maximum for existing passwordsCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIGUnix

IDENTIFICATION AND AUTHENTICATION

5.5.6 Ensure user and group account administration utilities are configured to store only encrypted representations of passwordsCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIGUnix

IDENTIFICATION AND AUTHENTICATION

5.9 Ensure number of concurrent sessions is limitedCIS Amazon Linux 2 STIG v1.0.0 L3Unix

ACCESS CONTROL

6.2.21 Ensure that all files and directories contained in local interactive user home directories are owned by the userCIS Amazon Linux 2 STIG v1.0.0 L3Unix

CONFIGURATION MANAGEMENT

6.2.23 Ensure local interactive users' dot files for are owned by the user or root.CIS Amazon Linux 2 STIG v1.0.0 L3Unix

CONFIGURATION MANAGEMENT

6.2.29 Ensure users' files and directories within the home directory permissions are 750 or more restrictiveCIS Amazon Linux 2 STIG v1.0.0 L3Unix

CONFIGURATION MANAGEMENT

6.4 Ensure system device files are labeled - device_tCIS Amazon Linux 2 STIG v1.0.0 L3Unix

ACCESS CONTROL

6.4 Ensure system device files are labeled - unlabeled_tCIS Amazon Linux 2 STIG v1.0.0 L3Unix

ACCESS CONTROL

RHEL-07-020029 - The Red Hat Enterprise Linux operating system must use a file integrity tool to verify correct operation of all security functions.DISA Red Hat Enterprise Linux 7 STIG v3r15Unix

SYSTEM AND INFORMATION INTEGRITY

RHEL-07-020260 - The Red Hat Enterprise Linux operating system security patches and updates must be installed and up to date.DISA Red Hat Enterprise Linux 7 STIG v3r15Unix

CONFIGURATION MANAGEMENT