Item Search

NameAudit NamePluginCategory
1.2 Ensure Snowflake SCIM integration is configured to automatically provision and deprovision users and groups (i.e. roles)CIS Snowflake Foundations v1.0.0 L2Snowflake

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

1.3.3 Ensure that the --use-service-account-credentials argument is set to trueCIS Kubernetes v1.20 Benchmark v1.0.1 L1 MasterUnix

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY, IDENTIFICATION AND AUTHENTICATION

1.3.3 Ensure that the --use-service-account-credentials argument is set to trueCIS Kubernetes v1.10.0 L1 MasterUnix

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY, IDENTIFICATION AND AUTHENTICATION

1.3.3 Ensure that the --use-service-account-credentials argument is set to trueCIS Kubernetes v1.23 Benchmark v1.0.1 L1 MasterUnix

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY, IDENTIFICATION AND AUTHENTICATION

1.3.3 Ensure that the --use-service-account-credentials argument is set to trueCIS Kubernetes v1.24 Benchmark v1.0.0 L1 MasterUnix

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY, IDENTIFICATION AND AUTHENTICATION

1.15 Ensure IAM Users Receive Permissions Only Through GroupsCIS Amazon Web Services Foundations L1 3.0.0amazon_aws

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

4.1.4.1 Ensure Audit logs are owned by root and mode 0600 or less permissiveCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIGUnix

AUDIT AND ACCOUNTABILITY, SYSTEM AND INFORMATION INTEGRITY

9.1.1 Ensure guest user access is restrictedCIS Microsoft 365 Foundations E3 L1 v3.1.0microsoft_azure

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY, MEDIA PROTECTION

9.1.8 Ensure enabling of external data sharing is restrictedCIS Microsoft 365 Foundations E3 L1 v3.1.0microsoft_azure

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY, MEDIA PROTECTION

AIX7-00-002028 - AIX must verify the hash of audit tools.DISA STIG AIX 7.x v3r1Unix

AUDIT AND ACCOUNTABILITY

ARST-ND-000850 - The Arista network Arista device must be configured to send log data to a central log server for the purpose of forwarding alerts to the administrators and the ISSO.DISA STIG Arista MLS EOS 4.2x NDM v2r1Arista

AUDIT AND ACCOUNTABILITY

AS24-U1-000190 - The log information from the Apache web server must be protected from unauthorized modification or deletion.DISA STIG Apache Server 2.4 Unix Server v3r1Unix

AUDIT AND ACCOUNTABILITY

AS24-U1-000190 - The log information from the Apache web server must be protected from unauthorized modification or deletion.DISA STIG Apache Server 2.4 Unix Server v3r1 MiddlewareUnix

AUDIT AND ACCOUNTABILITY

AS24-W1-000200 - The log information from the Apache web server must be protected from unauthorized deletion and modification.DISA STIG Apache Server 2.4 Windows Server v3r1Windows

AUDIT AND ACCOUNTABILITY

AS24-W1-000200 - The log information from the Apache web server must be protected from unauthorized deletion and modification.DISA STIG Apache Server 2.4 Windows Server v2r3Windows

AUDIT AND ACCOUNTABILITY

GEN002690 - System audit logs must be group-owned by root, bin, or sys.DISA STIG Solaris 10 X86 v2r4Unix

AUDIT AND ACCOUNTABILITY

GEN002690 - System audit logs must be group-owned by root, bin, or sys.DISA STIG Solaris 10 SPARC v2r4Unix

AUDIT AND ACCOUNTABILITY

Monterey - Configure System to Audit All Failed Change of Object AttributesNIST macOS Monterey v1.0.0 - 800-171Unix

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT, MAINTENANCE

Monterey - Configure System to Audit All Failed Change of Object AttributesNIST macOS Monterey v1.0.0 - 800-53r5 ModerateUnix

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT, MAINTENANCE

Monterey - Configure System to Audit All Failed Write Actions on the SystemNIST macOS Monterey v1.0.0 - 800-53r4 HighUnix

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT, MAINTENANCE

Monterey - Configure System to Audit All Failed Write Actions on the SystemNIST macOS Monterey v1.0.0 - 800-53r4 ModerateUnix

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT, MAINTENANCE

Monterey - Configure System to Audit All Failed Write Actions on the SystemNIST macOS Monterey v1.0.0 - 800-53r5 HighUnix

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT, MAINTENANCE

Monterey - Configure System to Audit All Failed Write Actions on the SystemNIST macOS Monterey v1.0.0 - 800-53r5 LowUnix

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT, MAINTENANCE

Monterey - Configure System to Audit All Failed Write Actions on the SystemNIST macOS Monterey v1.0.0 - 800-53r5 ModerateUnix

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT, MAINTENANCE

Monterey - Configure System to Audit All Failed Write Actions on the SystemNIST macOS Monterey v1.0.0 - All ProfilesUnix

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT, MAINTENANCE

Monterey - Configure System to Audit All Failed Write Actions on the SystemNIST macOS Monterey v1.0.0 - 800-171Unix

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT, MAINTENANCE

Monterey - Configure System to Audit All Failed Write Actions on the SystemNIST macOS Monterey v1.0.0 - 800-53r4 LowUnix

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT, MAINTENANCE

Monterey - Configure System to Audit All Failed Write Actions on the SystemNIST macOS Monterey v1.0.0 - CNSSI 1253Unix

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT, MAINTENANCE

RHEL-07-910055 - The Red Hat Enterprise Linux operating system must protect audit information from unauthorized read, modification, or deletion.DISA Red Hat Enterprise Linux 7 STIG v3r15Unix

AUDIT AND ACCOUNTABILITY, SYSTEM AND INFORMATION INTEGRITY

RHEL-09-653080 - RHEL 9 audit logs must be group-owned by root or by a restricted logging group to prevent unauthorized read access.DISA Red Hat Enterprise Linux 9 STIG v2r2Unix

AUDIT AND ACCOUNTABILITY, SYSTEM AND INFORMATION INTEGRITY

RHEL-09-653085 - RHEL 9 audit log directory must be owned by root to prevent unauthorized read access.DISA Red Hat Enterprise Linux 9 STIG v2r2Unix

AUDIT AND ACCOUNTABILITY, SYSTEM AND INFORMATION INTEGRITY

RHEL-09-653090 - RHEL 9 audit logs file must have mode 0600 or less permissive to prevent unauthorized access to the audit log.DISA Red Hat Enterprise Linux 9 STIG v2r2Unix

AUDIT AND ACCOUNTABILITY, SYSTEM AND INFORMATION INTEGRITY

RHEL-09-654270 - RHEL 9 audit system must protect logon UIDs from unauthorized change.DISA Red Hat Enterprise Linux 9 STIG v2r2Unix

AUDIT AND ACCOUNTABILITY

SOL-11.1-010440 - The operating system must protect audit information from unauthorized access.DISA STIG Solaris 11 SPARC v3r1Unix

AUDIT AND ACCOUNTABILITY

SOL-11.1-010440 - The operating system must protect audit information from unauthorized access.DISA STIG Solaris 11 X86 v3r1Unix

AUDIT AND ACCOUNTABILITY

UBTU-16-020180 - Audit tools must have a mode of 0755 or less permissive - audispdDISA STIG Ubuntu 16.04 LTS v2r3Unix

AUDIT AND ACCOUNTABILITY

UBTU-16-020180 - Audit tools must have a mode of 0755 or less permissive - auditdDISA STIG Ubuntu 16.04 LTS v2r3Unix

AUDIT AND ACCOUNTABILITY

UBTU-16-020180 - Audit tools must have a mode of 0755 or less permissive - augenrulesDISA STIG Ubuntu 16.04 LTS v2r3Unix

AUDIT AND ACCOUNTABILITY

UBTU-16-020180 - Audit tools must have a mode of 0755 or less permissive - autraceDISA STIG Ubuntu 16.04 LTS v2r3Unix

AUDIT AND ACCOUNTABILITY

UBTU-16-020190 - Audit tools must be owned by root - aureportDISA STIG Ubuntu 16.04 LTS v2r3Unix

AUDIT AND ACCOUNTABILITY

UBTU-18-010305 - The Ubuntu operating system must be configured so that audit log files cannot be read or write-accessible by unauthorized users.DISA STIG Ubuntu 18.04 LTS v2r15Unix

AUDIT AND ACCOUNTABILITY

UBTU-18-010306 - The Ubuntu operating system must permit only authorized accounts ownership of the audit log files.DISA STIG Ubuntu 18.04 LTS v2r15Unix

AUDIT AND ACCOUNTABILITY

UBTU-18-010307 - The Ubuntu operating system must permit only authorized groups to own the audit log files.DISA STIG Ubuntu 18.04 LTS v2r15Unix

AUDIT AND ACCOUNTABILITY

VCEM-67-000027 - Rsyslog must be configured to monitor and ship ESX Agent Manager log files - firstbootDISA STIG VMware vSphere 6.7 EAM Tomcat v1r4Unix

AUDIT AND ACCOUNTABILITY

VCEM-67-000027 - Rsyslog must be configured to monitor and ship ESX Agent Manager log files - stdoutDISA STIG VMware vSphere 6.7 EAM Tomcat v1r4Unix

AUDIT AND ACCOUNTABILITY

VCLD-67-000014 - Rsyslog must be configured to monitor VAMI logs.DISA STIG VMware vSphere 6.7 VAMI-lighttpd v1r3Unix

AUDIT AND ACCOUNTABILITY

WN12-AU-000213 - Event Viewer must be protected from unauthorized modification and deletion.DISA Windows Server 2012 and 2012 R2 DC STIG v3r7Windows

AUDIT AND ACCOUNTABILITY

WN12-AU-000213 - Event Viewer must be protected from unauthorized modification and deletion.DISA Windows Server 2012 and 2012 R2 MS STIG v3r7Windows

AUDIT AND ACCOUNTABILITY

WN16-AU-000060 - Event Viewer must be protected from unauthorized modification and deletion.DISA Windows Server 2016 STIG v2r9Windows

AUDIT AND ACCOUNTABILITY

WN19-AU-000060 - Windows Server 2019 Event Viewer must be protected from unauthorized modification and deletion.DISA Windows Server 2019 STIG v3r2Windows

AUDIT AND ACCOUNTABILITY