Item Search

NameAudit NamePluginCategory
1.2.1.3 Ensure repo_gpgcheck is globally activatedCIS AlmaLinux OS 9 v2.0.0 L2 ServerUnix

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

1.2.1.3 Ensure repo_gpgcheck is globally activatedCIS AlmaLinux OS 9 v2.0.0 L2 WorkstationUnix

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

1.2.1.3 Ensure repo_gpgcheck is globally activatedCIS Oracle Linux 9 v2.0.0 L2 ServerUnix

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

1.2.1.3 Ensure repo_gpgcheck is globally activatedCIS Oracle Linux 9 v2.0.0 L2 WorkstationUnix

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

1.2.1.3 Ensure repo_gpgcheck is globally activatedCIS Rocky Linux 9 v2.0.0 L2 WorkstationUnix

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

1.2.3 Ensure repo_gpgcheck is globally activatedCIS Oracle Linux 8 Workstation L2 v3.0.0Unix

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

1.2.3 Ensure repo_gpgcheck is globally activatedCIS Oracle Linux 7 v4.0.0 L2 ServerUnix

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

1.2.3 Ensure repo_gpgcheck is globally activatedCIS Red Hat Enterprise Linux 7 v4.0.0 L2 ServerUnix

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

1.3.1.8 Ensure SETroubleshoot is not installedCIS Oracle Linux 9 v2.0.0 L1 ServerUnix

CONFIGURATION MANAGEMENT

1.6.1.4 Ensure SETroubleshoot is not installedCIS SUSE Linux Enterprise Server 11 L2 v2.1.1Unix

CONFIGURATION MANAGEMENT

1.6.1.7 Ensure SETroubleshoot is not installedCIS Red Hat 6 Server L1 v3.0.0Unix

ACCESS CONTROL

1.6.2.4 Ensure SETroubleshoot is not installedCIS Distribution Independent Linux Server L2 v2.0.0Unix

ACCESS CONTROL

1.7.1.7 Ensure SETroubleshoot is not installedCIS Fedora 19 Family Linux Server L1 v1.0.0Unix

ACCESS CONTROL

1.7.2 Ensure 'TLS 1.2' is set for HTTPS accessCIS Cisco Firewall v8.x L1 v4.2.0Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

1.8.3 Ensure 'HTTP idle timeout' is less than or equal to '5' minutesCIS Cisco ASA 9.x Firewall L1 v1.1.0Cisco

ACCESS CONTROL

1.8.3 Ensure 'HTTP idle timeout' is less than or equal to '5' minutesCIS Cisco Firewall v8.x L1 v4.2.0Cisco

CONFIGURATION MANAGEMENT

1.8.6.1 Ensure 'Default File Format' is set to Enabled (Word Document (.docx))CIS Microsoft Office Word 2013 v1.1.0Windows

CONFIGURATION MANAGEMENT

1.8.6.1 Ensure 'Default File Format' is set to Enabled (Word Document (.docx))CIS Microsoft Office Word 2016 v1.1.0Windows

CONFIGURATION MANAGEMENT

1.10.11 Ensure 'logging trap severity ' is greater than or equal to '5'Tenable Cisco Firepower Best Practices AuditCisco

AUDIT AND ACCOUNTABILITY

2.3.7.6 (L1) Ensure 'Interactive logon: Prompt user to change password before expiration' is set to 'between 5 and 14 days'CIS Microsoft Windows Server 2008 Member Server Level 1 v3.3.1Windows

IDENTIFICATION AND AUTHENTICATION

2.3.7.6 (L1) Ensure 'Interactive logon: Prompt user to change password before expiration' is set to 'between 5 and 14 days'CIS Microsoft Windows Server 2008 R2 Member Server Level 1 v3.3.1Windows

IDENTIFICATION AND AUTHENTICATION

2.3.7.7 (L1) Ensure 'Interactive logon: Prompt user to change password before expiration' is set to 'between 5 and 14 days'CIS Windows Server 2012 DC L1 v3.0.0Windows

IDENTIFICATION AND AUTHENTICATION

4.3 (L1) Ensure the maximum failed login attempts is set to 5CIS VMware ESXi 7.0 v1.4.0 L1VMware

ACCESS CONTROL

4.4.3 Ensure password reuse is limitedCIS Debian 10 Workstation L1 v2.0.0Unix

IDENTIFICATION AND AUTHENTICATION

5.3.3 Ensure password reuse is limitedCIS SUSE Linux Enterprise 12 v3.2.0 L1 ServerUnix

IDENTIFICATION AND AUTHENTICATION

5.3.3 Ensure password reuse is limitedCIS SUSE Linux Enterprise 15 Server L1 v1.1.1Unix

IDENTIFICATION AND AUTHENTICATION

5.4.3 Ensure password reuse is limitedCIS Ubuntu Linux 16.04 LTS Server L1 v2.0.0Unix

ACCESS CONTROL

5.14 Ensure 'on-failure' container restart policy is set to '5' - RestartPolicyNameCIS Docker Community Edition v1.1.0 L1 DockerUnix

SYSTEM AND COMMUNICATIONS PROTECTION

5.14 Set the 'on-failure' container restart policy to 5 - RestartPolicyName=alwaysCIS Docker 1.11.0 v1.0.0 L1 DockerUnix
5.14 Set the 'on-failure' container restart policy to 5 - RestartPolicyName=alwaysCIS Docker 1.12.0 v1.0.0 L1 DockerUnix

SYSTEM AND COMMUNICATIONS PROTECTION

5.15 Set the 'on-failure' container restart policy to 5 - RestartPolicyName=alwaysCIS Docker 1.6 v1.0.0 L1 DockerUnix
8.1.17 Collect Kernel Module Loading and Unloading - /sbin/insmodCIS Debian Linux 7 L2 v1.0.0Unix

AUDIT AND ACCOUNTABILITY

AIX7-00-002128 - If bash is used, AIX must display logout messages.DISA STIG AIX 7.x v3r1Unix

ACCESS CONTROL

CISC-RT-000830 - The Cisco multicast Rendezvous Point (RP) switch must be configured to filter Protocol Independent Multicast (PIM) Register messages received from the Designated switch (DR) for any undesirable multicast groups and sources.DISA STIG Cisco IOS XE Switch RTR v3r1Cisco

ACCESS CONTROL

DISA_STIG_Splunk_Enterprise_7.x_for_Windows_REST_API_v3r1.audit from DISA Splunk Enterprise 7.x for Windows v3r1 STIGDISA STIG Splunk Enterprise 7.x for Windows v3r1 REST APISplunk
DISA_STIG_Splunk_Enterprise_8.x_for_Linux_OS_v2r1.audit from DISA Splunk Enterprise 8.x for Linux v2r1 STIGDISA STIG Splunk Enterprise 8.x for Linux v2r1 STIG OSUnix
DISA_STIG_Splunk_Enterprise_8.x_for_Linux_REST_API_v2r1.audit from DISA Splunk Enterprise 8.x for Linux v2r1 STIGDISA STIG Splunk Enterprise 8.x for Linux v2r1 STIG REST APISplunk
DTAVSEL-012 - The McAfee VirusScan Enterprise for Linux 1.9.x/2.0.x On-Access scanner must only be configured with exclusions that are documented and approved by the ISSO/ISSM/AO.McAfee Virus Scan Enterprise for Linux 1.9x/2.0x Local Client v1r6Unix

SYSTEM AND INFORMATION INTEGRITY

DTAVSEL-012 - The McAfee VirusScan Enterprise for Linux 1.9.x/2.0.x On-Access scanner must only be configured with exclusions which are documented and approved by the ISSO/ISSM/AO.McAfee Virus Scan Enterprise for Linux 1.9x/2.0x Managed Client v1r5Unix

SYSTEM AND INFORMATION INTEGRITY

DTAVSEL-014 - The McAfee VirusScan Enterprise for Linux 1.9.x/2.0.x On-Access scanner must be configured to Quarantine if first action fails when a virus or Trojan is detected.McAfee Virus Scan Enterprise for Linux 1.9x/2.0x Local Client v1r6Unix

SYSTEM AND INFORMATION INTEGRITY

DTAVSEL-108 - The McAfee VirusScan Enterprise for Linux 1.9.x/2.0.x On-Demand scanner must only be configured with exclusions that are documented and approved by the ISSO/ISSM/AO.McAfee Virus Scan Enterprise for Linux 1.9x/2.0x Local Client v1r6Unix

SYSTEM AND INFORMATION INTEGRITY

DTAVSEL-108 - The McAfee VirusScan Enterprise for Linux 1.9.x/2.0.x On-Demand scanner must only be configured with exclusions which are documented and approved by the ISSO/ISSM/AO.McAfee Virus Scan Enterprise for Linux 1.9x/2.0x Managed Client v1r5Unix

SYSTEM AND INFORMATION INTEGRITY

Enable IKE Version 1/2 - groupTenable Cisco Viptela SD-WAN - vEdgeCisco_Viptela

SYSTEM AND COMMUNICATIONS PROTECTION

Enable IKE Version 1/2 - rekeyTenable Cisco Viptela SD-WAN - vEdgeCisco_Viptela

ACCESS CONTROL

Ensure 'console session timeout' is less than or equal to '5' minutesTenable Cisco Firepower Best Practices AuditCisco

ACCESS CONTROL

EP11-00-004900 - The EDB Postgres Advanced Server must use NIST FIPS 140-2 or 140-3 validated cryptographic modules for all cryptographic operations including generation of cryptographic hashes and data protection - versionEDB PostgreSQL Advanced Server v11 DB Audit v2r4PostgreSQLDB

IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

GEN000000-LNX00360 - The X server must have the correct options enabled - '-s <= 15'DISA STIG for Oracle Linux 5 v2r1Unix

CONFIGURATION MANAGEMENT

VCEM-67-000005 - ESX Agent Manager must record user access in a format that enables monitoring of remote access.DISA STIG VMware vSphere 6.7 EAM Tomcat v1r4Unix

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

WBLC-01-000033 - Oracle WebLogic must enforce the organization-defined time period during which the limit of consecutive invalid access attempts by a user is counted.Oracle WebLogic Server 12c Linux v2r1Unix

CONFIGURATION MANAGEMENT

WBLC-01-000033 - Oracle WebLogic must enforce the organization-defined time period during which the limit of consecutive invalid access attempts by a user is counted.Oracle WebLogic Server 12c Windows v2r1Windows

CONFIGURATION MANAGEMENT