1.7.10 Ensure XDMCP is not enabled | CIS CentOS Linux 7 v4.0.0 L1 Server | Unix | CONFIGURATION MANAGEMENT |
1.7.10 Ensure XDMCP is not enabled | CIS Red Hat Enterprise Linux 7 v4.0.0 L1 Server | Unix | CONFIGURATION MANAGEMENT |
1.7.10 Ensure XDMCP is not enabled | CIS CentOS Linux 7 v4.0.0 L1 Workstation | Unix | CONFIGURATION MANAGEMENT |
1.8.10 Ensure XDCMP is not enabled | CIS Ubuntu Linux 18.04 LTS v2.2.0 L1 Workstation | Unix | CONFIGURATION MANAGEMENT |
1.8.10 Ensure XDMCP is not enabled | CIS Oracle Linux 8 Workstation L1 v3.0.0 | Unix | CONFIGURATION MANAGEMENT |
1.8.10 Ensure XDMCP is not enabled | CIS Red Hat EL8 Server L1 v3.0.0 | Unix | CONFIGURATION MANAGEMENT |
1.8.10 Ensure XDMCP is not enabled | CIS Red Hat EL8 Workstation L1 v3.0.0 | Unix | CONFIGURATION MANAGEMENT |
1.8.10 Ensure XDMCP is not enabled | CIS SUSE Linux Enterprise 15 v2.0.0 L1 Server | Unix | CONFIGURATION MANAGEMENT |
1.8.10 Ensure XDMCP is not enabled | CIS Rocky Linux 8 Server L1 v2.0.0 | Unix | CONFIGURATION MANAGEMENT |
1.8.10 Ensure XDMCP is not enabled | CIS Oracle Linux 8 Server L1 v3.0.0 | Unix | CONFIGURATION MANAGEMENT |
2.2.2 Ensure time set is within appropriate limits | CIS Apple OSX 10.10 Yosemite L1 v1.2.0 | Unix | |
2.5.4 Ensure the NGINX reverse proxy does not enable information disclosure | CIS NGINX Benchmark v2.1.0 L1 Proxy | Unix | SYSTEM AND SERVICES ACQUISITION |
4.3 Ensure excessive function privileges are revoked | CIS PostgreSQL 10 OS v1.0.0 | Unix | ACCESS CONTROL |
4.4 Ensure excessive function privileges are revoked | CIS PostgreSQL 9.5 DB v1.1.0 | PostgreSQLDB | ACCESS CONTROL |
5.3.3 Ensure password reuse is limited | CIS Distribution Independent Linux Workstation L1 v2.0.0 | Unix | ACCESS CONTROL |
5.3.3 Ensure password reuse is limited | CIS Ubuntu Linux 18.04 LXD Host L1 Workstation v1.0.0 | Unix | ACCESS CONTROL |
5.3.3 Ensure password reuse is limited | CIS SUSE Linux Enterprise Workstation 11 L1 v2.1.1 | Unix | IDENTIFICATION AND AUTHENTICATION |
5.3.3 Ensure password reuse is limited | CIS Debian 9 Server L1 v1.0.1 | Unix | ACCESS CONTROL |
5.3.3 Ensure password reuse is limited | CIS Ubuntu Linux 18.04 LXD Container L1 v1.0.0 | Unix | ACCESS CONTROL |
5.3.3 Ensure password reuse is limited | CIS Debian 8 Workstation L1 v2.0.2 | Unix | CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION |
5.3.3 Ensure password reuse is limited | CIS Debian 9 Workstation L1 v1.0.1 | Unix | ACCESS CONTROL |
5.3.3 Ensure password reuse is limited | CIS Distribution Independent Linux Server L1 v2.0.0 | Unix | ACCESS CONTROL |
5.3.3 Ensure password reuse is limited | CIS SUSE Linux Enterprise Server 11 L1 v2.1.1 | Unix | IDENTIFICATION AND AUTHENTICATION |
5.3.3 Ensure password reuse is limited - password-auth | CIS Amazon Linux 2 STIG v1.0.0 L1 | Unix | IDENTIFICATION AND AUTHENTICATION |
5.4.4 Ensure password reuse is limited | CIS Red Hat Enterprise Linux 7 STIG v2.0.0 L1 Server | Unix | IDENTIFICATION AND AUTHENTICATION |
5.4.4 Ensure password reuse is limited | CIS Red Hat Enterprise Linux 7 STIG v2.0.0 L1 Workstation | Unix | IDENTIFICATION AND AUTHENTICATION |
6.1.1 Audit system file permissions | CIS Distribution Independent Linux Server L2 v2.0.0 | Unix | ACCESS CONTROL |
6.12 Ensure all HTTP Header Logging options are enabled - User-Agent | CIS Palo Alto Firewall 9 v1.1.0 L1 | Palo_Alto | AUDIT AND ACCOUNTABILITY, SYSTEM AND COMMUNICATIONS PROTECTION |
7.5 Firewall Consideration | CIS Apple macOS 10.12 L2 v1.2.0 | Unix | CONFIGURATION MANAGEMENT |
7.5 Firewall Consideration | CIS Apple OSX 10.9 L2 v1.3.0 | Unix | |
7.7 App Store Automatically download apps purchased on other Macs Considerations | CIS Apple OSX 10.9 L2 v1.3.0 | Unix | |
BIND-9X-000001 - A BIND 9.x server implementation must be running in a chroot(ed) directory structure. | DISA BIND 9.x STIG v2r3 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
BIND-9X-001002 - The platform on which the name server software is hosted must only run processes and services needed to support the BIND 9.x implementation. | DISA BIND 9.x STIG v2r3 | Unix | CONFIGURATION MANAGEMENT |
BIND-9X-001055 - A BIND 9.x server implementation must prohibit recursion on authoritative name servers. | DISA BIND 9.x STIG v2r3 | Unix | CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION |
BIND-9X-001610 - A BIND 9.x server NSEC3 must be used for all internal DNS zones. | DISA BIND 9.x STIG v2r3 | Unix | CONFIGURATION MANAGEMENT |
Configure IPsec Tunnel Parameters - perfect-forward-secrecy | Tenable Cisco Viptela SD-WAN - vEdge | Cisco_Viptela | ACCESS CONTROL |
DTAVSEL-016 - The McAfee VirusScan Enterprise for Linux 1.9.x/2.0.x On-Access scanner must be configured to Move infected files to the quarantine directory if first action fails when programs and jokes are found. | McAfee Virus Scan Enterprise for Linux 1.9x/2.0x Managed Client v1r5 | Unix | SYSTEM AND INFORMATION INTEGRITY |
DTAVSEL-111 - The McAfee VirusScan Enterprise for Linux 1.9.x/2.0.x On-Demand scanner must be configured to Move infected files to the quarantine directory if first action fails when programs and jokes are found. | McAfee Virus Scan Enterprise for Linux 1.9x/2.0x Local Client v1r6 | Unix | SYSTEM AND INFORMATION INTEGRITY |
ESXI-67-000032 - The ESXi host must prohibit the reuse of passwords within five iterations. | DISA STIG VMware vSphere 6.7 ESXi v1r3 | VMware | IDENTIFICATION AND AUTHENTICATION |
GEN002320 - Audio devices must have mode 0660 or less permissive - '/dev/snd/*' | DISA STIG for Oracle Linux 5 v2r1 | Unix | ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION |
GEN002320 - Audio devices must have mode 0660 or less permissive - /dev/audio* | DISA STIG Solaris 10 X86 v2r4 | Unix | ACCESS CONTROL |
GEN002320 - Audio devices must have mode 0660 or less permissive - /dev/sound/* | DISA STIG Solaris 10 SPARC v2r4 | Unix | ACCESS CONTROL |
GEN002340 - Audio devices must be owned by root - '/dev/audio*' | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
GEN002340 - Audio devices must be owned by root - /dev/sound/* | DISA STIG Solaris 10 X86 v2r4 | Unix | CONFIGURATION MANAGEMENT |
GEN002340 - Audio devices must be owned by root - /dev/sound/* | DISA STIG Solaris 10 SPARC v2r4 | Unix | CONFIGURATION MANAGEMENT |
GEN002340 - Audio devices must be owned by root. | DISA STIG AIX 5.3 v1r2 | Unix | ACCESS CONTROL |
MD3X-00-000380 - MongoDB must use NIST FIPS 140-2-validated cryptographic modules for cryptographic operations. | DISA STIG MongoDB Enterprise Advanced 3.x v2r3 OS | Unix | IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION |
OH12-1X-000025 - OHS must have a SSL log format defined to allow generated information to be used by external applications or entities to monitor and control remote access in accordance with the categorization of data hosted by the web server. | DISA STIG Oracle HTTP Server 12.1.3 v2r2 | Unix | ACCESS CONTROL |
OH12-1X-000064 - OHS, behind a load balancer or proxy server, must have the SSL log format set correctly to produce log records containing the client IP information as the source and destination and not the load balancer or proxy IP information with each event. | DISA STIG Oracle HTTP Server 12.1.3 v2r2 | Unix | AUDIT AND ACCOUNTABILITY |
OH12-1X-000070 - OHS must have a SSL log format defined to produce log records containing sufficient information to establish the identity of any user/subject or process associated with an event. | DISA STIG Oracle HTTP Server 12.1.3 v2r2 | Unix | AUDIT AND ACCOUNTABILITY |