Item Search

NameAudit NamePluginCategory
1.1.1.6 Ensure overlay kernel module is not availableCIS AlmaLinux OS 8 v4.0.0 L2 WorkstationUnix

CONFIGURATION MANAGEMENT

1.1.1.6 Ensure overlay kernel module is not availableCIS Red Hat Enterprise Linux 10 v1.0.1 L2 ServerUnix

CONFIGURATION MANAGEMENT

1.1.1.6 Ensure overlay kernel module is not availableCIS AlmaLinux OS 10 v1.0.0 L2 WorkstationUnix

CONFIGURATION MANAGEMENT

1.1.1.6 Ensure overlay kernel module is not availableCIS Debian Linux 13 v1.0.0 L2 ServerUnix

CONFIGURATION MANAGEMENT

1.1.1.6 Ensure overlay kernel module is not availableCIS Debian Linux 13 v1.0.0 L2 WorkstationUnix

CONFIGURATION MANAGEMENT

1.1.1.7 Ensure squashfs kernel module is not availableCIS Debian Linux 12 v1.1.0 L2 ServerUnix

CONFIGURATION MANAGEMENT

1.1.1.7 Ensure squashfs kernel module is not availableCIS Red Hat Enterprise Linux 8 STIG v2.0.0 L2 ServerUnix

CONFIGURATION MANAGEMENT

1.1.1.7 Ensure squashfs kernel module is not availableCIS Ubuntu Linux 24.04 LTS v1.0.0 L2 ServerUnix

CONFIGURATION MANAGEMENT

1.6.2 Ensure 'SSH version 2' is enabledCIS Cisco Firewall v8.x L1 v4.2.0Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

1.269 OL08-00-030603CIS Oracle Linux 8 STIG v1.0.0 CAT IIUnix

AUDIT AND ACCOUNTABILITY

2.2 Traffic Control - Rate limitingCIS HPE Aruba Networking CX Switch v1.0.1 Optional Security RecommendationsArubaOS

SYSTEM AND COMMUNICATIONS PROTECTION

2.5.3 Ensure the operating system enables Linux audit logging of the USBGuard daemonCIS Red Hat Enterprise Linux 8 STIG v2.0.0 STIGUnix

AUDIT AND ACCOUNTABILITY

2.7 Ensure the default ulimit is configured appropriatelyCIS Docker Community Edition v1.1.0 L1 DockerUnix

SYSTEM AND COMMUNICATIONS PROTECTION

3.3 Ensure 'Orphaned Users' are Dropped From SQL Server DatabasesCIS SQL Server 2008 R2 DB Engine L1 v1.7.0MS_SQLDB

ACCESS CONTROL

3.5.1.1 Ensure ufw is installedCIS Ubuntu Linux 16.04 LTS Workstation L1 v2.0.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION

4.2.1.5 Ensure rsyslog is configured to send logs to a remote log hostCIS Red Hat Enterprise Linux 7 STIG v2.0.0 L1 WorkstationUnix

AUDIT AND ACCOUNTABILITY

4.2.1.5 Ensure rsyslog is configured to send logs to a remote log hostCIS Ubuntu Linux 18.04 LXD Host L1 Server v1.0.0Unix

AUDIT AND ACCOUNTABILITY

4.2.1.6 Ensure rsyslog is configured to send logs to a remote log hostCIS CentOS Linux 8 Server L1 v2.0.0Unix

AUDIT AND ACCOUNTABILITY

5.1.1.6 Ensure rsyslog is configured to send logs to a remote log hostCIS CentOS Linux 7 v4.0.0 L1 WorkstationUnix

AUDIT AND ACCOUNTABILITY

5.7 Do not map privileged ports within containersCIS Docker 1.11.0 v1.0.0 L1 DockerUnix
5.7 Do not map privileged ports within containersCIS Docker 1.12.0 v1.0.0 L1 DockerUnix

CONFIGURATION MANAGEMENT

5.15 Do not share the host's process namespaceCIS Docker 1.12.0 v1.0.0 L1 DockerUnix

SYSTEM AND COMMUNICATIONS PROTECTION

5.15 Do not share the host's process namespaceCIS Docker 1.11.0 v1.0.0 L1 DockerUnix

SYSTEM AND COMMUNICATIONS PROTECTION

6.1.2 Set SSH Protocol to 2 - Check if Protocol is set to 2 and not commented for client.CIS Solaris 10 L1 v5.2Unix

SYSTEM AND COMMUNICATIONS PROTECTION

6.1.2.6 Ensure rsyslog is configured to send logs to a remote log hostCIS Ubuntu Linux 22.04 LTS v3.0.0 L1 WorkstationUnix

AUDIT AND ACCOUNTABILITY

6.2.2.6 Ensure rsyslog is configured to send logs to a remote log hostCIS AlmaLinux OS 8 v4.0.0 L1 ServerUnix

AUDIT AND ACCOUNTABILITY

6.2.2.6 Ensure rsyslog is configured to send logs to a remote log hostCIS Red Hat Enterprise Linux 8 v4.0.0 L1 ServerUnix

AUDIT AND ACCOUNTABILITY

6.2.2.7 Ensure rsyslog is configured to send logs to a remote log hostCIS Red Hat Enterprise Linux 8 STIG v2.0.0 L1 WorkstationUnix

AUDIT AND ACCOUNTABILITY

6.2.3.6 Ensure rsyslog is configured to send logs to a remote log hostCIS AlmaLinux OS 10 v1.0.0 L1 WorkstationUnix

AUDIT AND ACCOUNTABILITY

6.2.3.6 Ensure rsyslog is configured to send logs to a remote log hostCIS Oracle Linux 10 v1.0.0 L1 WorkstationUnix

AUDIT AND ACCOUNTABILITY

6.2.3.6 Ensure rsyslog is configured to send logs to a remote log hostCIS Red Hat Enterprise Linux 10 v1.0.1 L1 ServerUnix

AUDIT AND ACCOUNTABILITY

6.2.3.6 Ensure rsyslog is configured to send logs to a remote log hostCIS Rocky Linux 9 v2.0.0 L1 ServerUnix

AUDIT AND ACCOUNTABILITY

6.3 Ensure 'log_error_verbosity' is Set to '2'CIS Oracle MySQL Community Server 8.0 v1.2.0 L2 MySQL RDBMS MySQLDBMySQLDB

AUDIT AND ACCOUNTABILITY

6.3 Ensure 'log_warnings' is Set to '2'CIS MySQL 5.6 Community Database L2 v2.0.0MySQLDB

AUDIT AND ACCOUNTABILITY

ALMA-09-046550 - AlmaLinux OS 9 must enable Linux audit logging for the USBGuard daemon.DISA Cloud Linux AlmaLinux OS 9 STIG v1r5Unix

AUDIT AND ACCOUNTABILITY

AZLX-23-001010 - Amazon Linux 2023 must require reauthentication when using the "sudo" command.DISA Amazon Linux 2023 STIG v1r2Unix

IDENTIFICATION AND AUTHENTICATION

AZLX-23-001035 - Amazon Linux 2023 audispd-plugins package must be installed.DISA Amazon Linux 2023 STIG v1r2Unix

AUDIT AND ACCOUNTABILITY

AZLX-23-002070 - Amazon Linux 2023 must encrypt the transfer of audit records off-loaded onto a different system or media from the system being audited via rsyslog.DISA Amazon Linux 2023 STIG v1r2Unix

AUDIT AND ACCOUNTABILITY

AZLX-23-002555 - Amazon Linux 2023 debug-shell systemd service must be disabled.DISA Amazon Linux 2023 STIG v1r2Unix

ACCESS CONTROL

DTAVSEL-113 - The McAfee VirusScan Enterprise for Linux 1.9.x/2.0.x On-Demand scanner must be configured to include all local drives and their sub-directories.McAfee Virus Scan Enterprise for Linux 1.9x/2.0x Local Client v1r6Unix

SYSTEM AND INFORMATION INTEGRITY

Enable IKE Version 1/2 - cipher-suiteTenable Cisco Viptela SD-WAN - vEdgeCisco_Viptela

SYSTEM AND COMMUNICATIONS PROTECTION

Ensure mounting of squashfs filesystems is disabled - lsmodTenable Cisco Firepower Management Center OS Best Practices AuditUnix

CONFIGURATION MANAGEMENT

Ensure SSH Protocol is set to 2Tenable Cisco Firepower Management Center OS Best Practices AuditUnix

CONFIGURATION MANAGEMENT

Excel 2 macrosheets and add-in filesMicrosoft 365 Apps for Enterprise 2306 v1.0.0Windows

SYSTEM AND INFORMATION INTEGRITY

OL09-00-000499 - OL 9 must ensure cryptographic verification of vendor software packages.DISA Oracle Linux 9 STIG v1r4Unix

CONFIGURATION MANAGEMENT

PHTN-30-000046 - The Photon operating system must initiate auditing as part of the boot process.DISA STIG VMware vSphere 7.0 Photon OS v1r4Unix

AUDIT AND ACCOUNTABILITY

Remove file extensions blocked as Level 2MSCT Office 365 ProPlus 1908 v1.0.0Windows

SYSTEM AND COMMUNICATIONS PROTECTION

RHEL-07-040160 - The Red Hat Enterprise Linux operating system must be configured so that all network connections associated with a communication session are terminated at the end of the session or after 15 minutes of inactivity from the user at a command prompt, except to fulfill documented and validated mission requirements.DISA Red Hat Enterprise Linux 7 STIG v3r15Unix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

RHEL-07-040500 - The Red Hat Enterprise Linux operating system must, for networked systems, synchronize clocks with a server that is synchronized to one of the redundant United States Naval Observatory (USNO) time servers, a time server designated for the appropriate DoD network (NIPRNet/SIPRNet), and/or the Global Positioning System (GPS).DISA Red Hat Enterprise Linux 7 STIG v3r15Unix

AUDIT AND ACCOUNTABILITY

SonicWALL - Flood Protection - Layer 2 - WAN machinesTNS SonicWALL v5.9SonicWALL

SYSTEM AND COMMUNICATIONS PROTECTION