Item Search

NameAudit NamePluginCategory
1.1.21 Ensure all world-writable directories are group-owned.CIS Amazon Linux 2 STIG v1.0.0 L3Unix
1.2 Do Not Install a Multi-Use System - chkconfigCIS BIND DNS v1.0.0 L1 Authoritative Name ServerUnix

CONFIGURATION MANAGEMENT

1.2 Do Not Install a Multi-Use System - systemctlCIS BIND DNS v1.0.0 L1 Caching Only Name ServerUnix

CONFIGURATION MANAGEMENT

1.2.3 Ensure gpgcheck is globally activatedCIS Amazon Linux 2 STIG v1.0.0 L1Unix

SYSTEM AND INFORMATION INTEGRITY

1.2.4 Ensure software packages have been digitally signed by a Certificate Authority (CA)CIS Amazon Linux 2 STIG v1.0.0 L3Unix

SYSTEM AND INFORMATION INTEGRITY

1.5.2 Ensure address space layout randomization (ASLR) is enabled - /etc/sysctl.conf, /etc/sysctl.d/*CIS Amazon Linux 2 STIG v1.0.0 L1Unix

SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY

1.5.2 Ensure address space layout randomization (ASLR) is enabled - sysctlCIS Amazon Linux 2 STIG v1.0.0 L1Unix

SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY

1.5.5 Ensure kernel core dumps are disabled.CIS Amazon Linux 2 STIG v1.0.0 L3Unix

CONFIGURATION MANAGEMENT

1.6.1.4 Ensure SELinux policy is configured - configCIS Amazon Linux 2 STIG v1.0.0 L2Unix

ACCESS CONTROL

1.6.1.4 Ensure SELinux policy is configured - sestatusCIS Amazon Linux 2 STIG v1.0.0 L2Unix

ACCESS CONTROL

1.10 Ensure required packages for multifactor authentication are installed - escCIS Amazon Linux 2 STIG v1.0.0 L3Unix

IDENTIFICATION AND AUTHENTICATION

1.10 Ensure required packages for multifactor authentication are installed - pam_pkcs11CIS Amazon Linux 2 STIG v1.0.0 L3Unix

IDENTIFICATION AND AUTHENTICATION

1.11 Ensure host-based intrusion detection tool is used - MFEhiplsm processCIS Amazon Linux 2 STIG v1.0.0 L3Unix

SYSTEM AND INFORMATION INTEGRITY

2.1.1 Ensure the rsh package has been removedCIS Amazon Linux 2 STIG v1.0.0 L3Unix

CONFIGURATION MANAGEMENT

2.1.2 Ensure the ypserv package has been removedCIS Amazon Linux 2 STIG v1.0.0 L3Unix

CONFIGURATION MANAGEMENT

2.1.4 Ensure TFTP daemon is configured to operate in secure mode.CIS Amazon Linux 2 STIG v1.0.0 L3Unix

CONFIGURATION MANAGEMENT

2.2.10 Ensure FTP Server is not enabledCIS Amazon Linux 2 STIG v1.0.0 L1Unix

CONFIGURATION MANAGEMENT

2.2.28 Ensure ldap_tls_reqcert is set for LDAPCIS Amazon Linux 2 STIG v1.0.0 L3Unix

SYSTEM AND COMMUNICATIONS PROTECTION

3.1.3 Ensure network interfaces are not in promiscuous modeCIS Amazon Linux 2 STIG v1.0.0 L3Unix

CONFIGURATION MANAGEMENT

3.2.5 Ensure broadcast ICMP requests are ignored - /etc/sysctl.conf /etc/sysctl.d/*CIS Amazon Linux 2 STIG v1.0.0 L1Unix

CONFIGURATION MANAGEMENT

3.2.5 Ensure broadcast ICMP requests are ignored - sysctlCIS Amazon Linux 2 STIG v1.0.0 L1Unix

CONFIGURATION MANAGEMENT

3.4.1 Ensure DCCP is disabledCIS Amazon Linux 2 STIG v1.0.0 L2Unix

CONFIGURATION MANAGEMENT

4.1.1.2 Ensure system is disabled when audit logs are full - action_mail_acctCIS Amazon Linux 2 STIG v1.0.0 L2Unix

AUDIT AND ACCOUNTABILITY

4.1.1.2 Ensure system is disabled when audit logs are full - admin_space_left_actionCIS Amazon Linux 2 STIG v1.0.0 L2Unix

AUDIT AND ACCOUNTABILITY

4.1.1.2 Ensure system is disabled when audit logs are full - space_left_actionCIS Amazon Linux 2 STIG v1.0.0 L2Unix

AUDIT AND ACCOUNTABILITY

4.1.22 Ensure auditd service is activeCIS Amazon Linux 2 STIG v1.0.0 L3Unix

AUDIT AND ACCOUNTABILITY

4.3 Ensure that unnecessary packages are not installed in the containerCIS Docker v1.7.0 L1 Docker - LinuxUnix

CONFIGURATION MANAGEMENT

5.2.3 Ensure permissions on /etc/ssh/sshd_config are configuredCIS Amazon Linux 2 STIG v1.0.0 L1Unix

CONFIGURATION MANAGEMENT

5.2.32 Ensure no '.shosts' files exist on the system.CIS Amazon Linux 2 STIG v1.0.0 L3Unix
5.2.33 Ensure no 'shosts.equiv' files exist on the system.CIS Amazon Linux 2 STIG v1.0.0 L3Unix
5.4.1.6 Ensure encrypted respresentation of passwords is set.CIS Amazon Linux 2 STIG v1.0.0 L3Unix

SYSTEM AND COMMUNICATIONS PROTECTION

5.4.1.7 Ensure account administration utilities are configured to store only encrypted representations of passwords.CIS Amazon Linux 2 STIG v1.0.0 L3Unix

SYSTEM AND COMMUNICATIONS PROTECTION

5.4.1.8 Ensure password expiration is 60 Day maximum for new usersCIS Amazon Linux 2 STIG v1.0.0 L3Unix

IDENTIFICATION AND AUTHENTICATION

5.4.1.9 Ensure password expiration is 60 Day maximum for exisiting passwordsCIS Amazon Linux 2 STIG v1.0.0 L3Unix

IDENTIFICATION AND AUTHENTICATION

5.5.1.2 Ensure minimum days between password changes is configured - /etc/shadowCIS Red Hat Enterprise Linux 7 STIG v2.0.0 L1 WorkstationUnix

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

5.5.1.2 Ensure minimum days between password changes is configured - login.defsCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIGUnix

IDENTIFICATION AND AUTHENTICATION

5.5.1.7 Ensure password expiration is 60 Day maximum for new usersCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIGUnix

IDENTIFICATION AND AUTHENTICATION

5.5.1.8 Ensure password expiration is 60 Day maximum for existing passwordsCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIGUnix

IDENTIFICATION AND AUTHENTICATION

5.5.2 Ensure system accounts are secured - non-login shellCIS CentOS 6 Server L1 v3.0.0Unix

ACCESS CONTROL

5.5.2 Ensure system accounts are secured - non-login shellCIS Oracle Linux 6 Workstation L1 v2.0.0Unix

ACCESS CONTROL

5.5.2 Ensure system accounts are secured - non-login shellCIS Oracle Linux 6 Server L1 v2.0.0Unix

ACCESS CONTROL

5.5.2 Ensure system accounts are secured - non-login shellCIS Red Hat 6 Server L1 v3.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

5.5.2 Ensure system accounts are secured - unlocked non-rootCIS Red Hat 6 Workstation L1 v3.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

5.5.6 Ensure user and group account administration utilities are configured to store only encrypted representations of passwordsCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIGUnix

IDENTIFICATION AND AUTHENTICATION

6.1.10 Ensure no world writable files existCIS Amazon Linux 2 STIG v1.0.0 L1Unix

CONFIGURATION MANAGEMENT

6.1.11 Ensure no unowned files or directories existCIS Amazon Linux 2 STIG v1.0.0 L1Unix

CONFIGURATION MANAGEMENT

6.1.12 Ensure no ungrouped files or directories existCIS Amazon Linux 2 STIG v1.0.0 L1Unix

CONFIGURATION MANAGEMENT

JBOS-AS-000010 - HTTP management session traffic must be encrypted.DISA JBoss EAP 6.3 STIG v2r5Unix

ACCESS CONTROL

MD4X-00-006600 - MongoDB must be configured in accordance with the security configuration settings based on DoD security configuration and implementation guidance, including STIGs, NSA configuration guides, CTOs, DTMs, and IAVMs.DISA STIG MongoDB Enterprise Advanced 4.x v1r4 OSUnix

CONFIGURATION MANAGEMENT

RHEL-06-000010 - The Red Hat Enterprise Linux operating system must be a vendor-supported release.DISA Red Hat Enterprise Linux 6 STIG v2r2Unix

CONFIGURATION MANAGEMENT