Item Search

NameAudit NamePluginCategory
1.1.3 Set nosuid option for /tmp PartitionCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

1.1.4 Set noexec option for /tmp PartitionCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

CONFIGURATION MANAGEMENT

1.1.7 Create Separate Partition for /var/logCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

AUDIT AND ACCOUNTABILITY

1.1.15 Add nosuid Option to /dev/shm PartitionCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

1.2.6 Obtain Software Package Updates with yumCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

CONFIGURATION MANAGEMENT

1.2.7 Verify Package Integrity Using RPMCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

AUDIT AND ACCOUNTABILITY

1.6.4 Enable XD/NX Support on 32-bit x86 Systems - kernel-PAECIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY

2.1.4 Remove rshCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

CONFIGURATION MANAGEMENT

2.1.6 Remove NIS ServerCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

CONFIGURATION MANAGEMENT

3.1.1 Disable Avahi ServerCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

CONFIGURATION MANAGEMENT

3.1.2 Service Only via Required Protocol - use-ipv6=no'CIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

CONFIGURATION MANAGEMENT

3.1.4 Prevent Other Programs from Using Avahi's Port - disallow-other-stacks=yesCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

CONFIGURATION MANAGEMENT

3.3 Remove X Windows - X Window SystemCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

CONFIGURATION MANAGEMENT

3.4.3.1.2 Ensure nftables is not installed with iptablesCIS CentOS Linux 8 Workstation L1 v2.0.0Unix

SECURITY ASSESSMENT AND AUTHORIZATION, CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

3.5 Remove DHCP ServerCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

CONFIGURATION MANAGEMENT

3.8 Disable NFS and RPC - rpcidmapdCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

CONFIGURATION MANAGEMENT

4.4.1.2 Disable IPv6 Redirect Acceptance - net.ipv6.conf.default.accept_redirect = 0CIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

CONFIGURATION MANAGEMENT

4.4.1.2 Ensure nftables is not in use with iptablesCIS Ubuntu Linux 20.04 LTS v3.0.0 L1 ServerUnix

SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION

4.6.4 Disable TIPCCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

CONFIGURATION MANAGEMENT

5.1.1 Configure /etc/syslog.conf - daemonCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

AUDIT AND ACCOUNTABILITY

5.1.1 Configure /etc/syslog.conf - syslogCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

AUDIT AND ACCOUNTABILITY

5.1.2 Create and Set Permissions on syslog Log Files - /var/log/kern.logCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

ACCESS CONTROL

5.1.3 Configure syslog to Send Logs to a Remote Log Host - *.* @loghost.example.comCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

AUDIT AND ACCOUNTABILITY

5.1.4 Accept Remote syslog Messages Only on Designated Log Hosts - loghostCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

AUDIT AND ACCOUNTABILITY

5.2.3 Configure /etc/rsyslog.conf - auth,user /var/log/messagesCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

AUDIT AND ACCOUNTABILITY

5.2.3 Configure /etc/rsyslog.conf - daemon /var/log/daemon.logCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

AUDIT AND ACCOUNTABILITY

5.2.4 Create and Set Permissions on rsyslog Log Files - /var/log/kern.logCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

AUDIT AND ACCOUNTABILITY

5.2.4 Create and Set Permissions on rsyslog Log Files - /var/log/messagesCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

AUDIT AND ACCOUNTABILITY

5.4 Configure logrotate - '/var/log/cron'CIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

AUDIT AND ACCOUNTABILITY

5.4 Configure logrotate - '/var/log/secure'CIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

AUDIT AND ACCOUNTABILITY

6.1.2 Enable cron DaemonCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

CONFIGURATION MANAGEMENT

6.2.2 Set LogLevel to INFOCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

AUDIT AND ACCOUNTABILITY

6.2.4 Disable SSH X11 ForwardingCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

CONFIGURATION MANAGEMENT

6.2.6 Set SSH IgnoreRhosts to YesCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

CONFIGURATION MANAGEMENT

6.2.8 Disable SSH Root LoginCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

ACCESS CONTROL

6.2.10 Do Not Allow Users to Set Environment Options - PermitUserEnvironment noCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

CONFIGURATION MANAGEMENT

6.2.11 Use Only Approved Ciphers in Counter Mode - Ciphers aes128-ctr,aes192-ctr,aes256-ctrCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

CONFIGURATION MANAGEMENT

6.2.12 Set Idle Timeout Interval for User Login - ClientAliveCountMaxCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

ACCESS CONTROL

6.2.12 Set Idle Timeout Interval for User Login - ClientAliveInterval <= 300CIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

ACCESS CONTROL

6.2.14 Set SSH Banner - Banner /etc/issueCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

CONFIGURATION MANAGEMENT

6.3.3 Use pam_deny.so to Deny Services - include system-authCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

ACCESS CONTROL

6.3.5 Limit Password Reuse - password sufficient pam_unix.o <existing options> remember=5CIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

IDENTIFICATION AND AUTHENTICATION

6.4 Restrict root Login to System ConsoleCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

ACCESS CONTROL

7.1.2 Set Password Change Minimum Number of Days - 7+CIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

IDENTIFICATION AND AUTHENTICATION

8.1.1 Set Warning Banner for Standard Login Services - /etc/issue permsCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

ACCESS CONTROL

8.1.1 Set Warning Banner for Standard Login Services - /etc/motdCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

ACCESS CONTROL

ARST-RT-000030 - The Arista BGP router must be configured to reject inbound route advertisements for any prefixes belonging to the local autonomous system (AS).DISA STIG Arista MLS EOS 4.x Router v2r2Arista

ACCESS CONTROL

ARST-RT-000200 - The out-of-band management (OOBM) Arista gateway router must be configured to not redistribute routes between the management network routing domain and the managed network routing domain.DISA STIG Arista MLS EOS 4.2x Router v2r1Arista

ACCESS CONTROL

DNS Profile - Address - DNS Server 2Tenable Cisco ACICisco_ACI

SYSTEM AND COMMUNICATIONS PROTECTION

RHEL-06-000534 - The Red Hat Enterprise Linux operating system must implement NIST FIPS-validated cryptography for the following: to provision digital signatures, to generate cryptographic hashes, and to protect data requiring data-at-rest protections in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, and standards - procDISA Red Hat Enterprise Linux 6 STIG v2r2Unix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION