Item Search

NameAudit NamePluginCategory
1.2 Ensure the Server Is Not a Multi-Use SystemCIS Apache HTTP Server 2.2 L1 v3.6.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION

1.2 Ensure the Server Is Not a Multi-Use SystemCIS Apache HTTP Server 2.2 L1 v3.6.0 MiddlewareUnix

SYSTEM AND COMMUNICATIONS PROTECTION

1.2 Ensure the Server Is Not a Multi-Use SystemCIS Apache HTTP Server 2.2 L2 v3.6.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION

1.3.2 Ensure filesystem integrity is regularly checkedCIS Amazon Linux 2 STIG v1.0.0 L1Unix

AUDIT AND ACCOUNTABILITY

1.4.3 Ensure boot loader does not allow removable mediaCIS Amazon Linux 2 STIG v1.0.0 L3Unix
2.2.1.2 Ensure ntp is configured - daemonCIS Amazon Linux 2 STIG v1.0.0 L1Unix

AUDIT AND ACCOUNTABILITY

2.2.1.2 Ensure ntp is configured - remote serverCIS Amazon Linux 2 STIG v1.0.0 L1Unix

AUDIT AND ACCOUNTABILITY

2.2.1.2 Ensure ntp is configured - restrict -4CIS Amazon Linux 2 STIG v1.0.0 L1Unix

AUDIT AND ACCOUNTABILITY

2.2.1.2 Ensure ntp is configured - restrict -6CIS Amazon Linux 2 STIG v1.0.0 L1Unix

AUDIT AND ACCOUNTABILITY

2.2.1.4 Ensure NTP 'maxpoll' is set - maxpoll is set.CIS Amazon Linux 2 STIG v1.0.0 L3Unix

AUDIT AND ACCOUNTABILITY

3.1.2 Ensure packet redirect sending is disabled - /etc/sysctl.conf /etc/sysctl.d/* net.ipv4.conf.all.send_redirects=0CIS Amazon Linux 2 STIG v1.0.0 L1Unix

CONFIGURATION MANAGEMENT

3.1.2 Ensure packet redirect sending is disabled - /etc/sysctl.conf /etc/sysctl.d/* net.ipv4.conf.default.send_redirects=0CIS Amazon Linux 2 STIG v1.0.0 L1Unix

CONFIGURATION MANAGEMENT

3.1.2 Ensure packet redirect sending is disabled - sysctl net.ipv4.conf.all.send_redirects=0CIS Amazon Linux 2 STIG v1.0.0 L1Unix

CONFIGURATION MANAGEMENT

3.1.2 Ensure packet redirect sending is disabled - sysctl net.ipv4.conf.default.send_redirects=0CIS Amazon Linux 2 STIG v1.0.0 L1Unix

CONFIGURATION MANAGEMENT

3.2.7 Ensure Reverse Path Filtering is enabled - /etc/sysctl.conf /etc/sysctl.d/* net.ipv4.conf.all.rp_filter = 1CIS Amazon Linux 2 STIG v1.0.0 L1Unix

CONFIGURATION MANAGEMENT

3.2.7 Ensure Reverse Path Filtering is enabled - /etc/sysctl.conf /etc/sysctl.d/* net.ipv4.conf.default.rp_filter = 1CIS Amazon Linux 2 STIG v1.0.0 L1Unix

CONFIGURATION MANAGEMENT

4.1.2.13 Ensure audit of kmod commandCIS Amazon Linux 2 STIG v1.0.0 L3Unix

AUDIT AND ACCOUNTABILITY

4.1.9 Ensure login and logout events are collectedCIS Amazon Linux 2 STIG v1.0.0 L2Unix

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

4.3.1 Deactivate Wireless InterfacesCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

CONFIGURATION MANAGEMENT

5.1.8 Ensure at/cron is restricted to authorized users - at.allow existCIS Amazon Linux 2 STIG v1.0.0 L1Unix

CONFIGURATION MANAGEMENT

5.1.8 Ensure at/cron is restricted to authorized users - at.deny does not existCIS Amazon Linux 2 STIG v1.0.0 L1Unix

CONFIGURATION MANAGEMENT

5.2 Verify SELinux security options, if applicableCIS Docker 1.11.0 v1.0.0 L2 DockerUnix

ACCESS CONTROL

5.2.23 Ensure RSA rhosts authentication is not allowedCIS Amazon Linux 2 STIG v1.0.0 L3Unix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

5.2.25 Ensure SSH setting for 'IgnoreUserKnownHosts' is enabled - IgnoreUserKnownHosts is enabled.CIS Amazon Linux 2 STIG v1.0.0 L3Unix

CONFIGURATION MANAGEMENT

5.2.29 Ensrue SSH performs checks of home directory configuration files.CIS Amazon Linux 2 STIG v1.0.0 L3Unix

CONFIGURATION MANAGEMENT

5.3.10 Ensure certificate status checking for PKI authentication.CIS Amazon Linux 2 STIG v1.0.0 L3Unix

SYSTEM AND COMMUNICATIONS PROTECTION

5.4.9 Ensure there are no unnecessary accountsCIS Amazon Linux 2 STIG v1.0.0 L3Unix

ACCESS CONTROL

5.4.11 Ensure default user shell timeout is 600 seconds or lessCIS Amazon Linux 2 STIG v1.0.0 L3Unix

ACCESS CONTROL

5.5.1.2 Ensure minimum days between password changes is configured - /etc/login.defsCIS Red Hat Enterprise Linux 7 STIG v2.0.0 L1 WorkstationUnix

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

5.5.1.2 Ensure minimum days between password changes is configured - /etc/login.defsCIS Red Hat Enterprise Linux 7 STIG v2.0.0 L1 ServerUnix

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

5.5.1.2 Ensure minimum days between password changes is configured - /etc/shadowCIS Red Hat Enterprise Linux 7 STIG v2.0.0 L1 WorkstationUnix

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

5.5.1.2 Ensure minimum days between password changes is configured - /etc/shadowCIS Red Hat Enterprise Linux 7 STIG v2.0.0 L1 ServerUnix

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

5.5.1.2 Ensure minimum days between password changes is configured - login.defsCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIGUnix

IDENTIFICATION AND AUTHENTICATION

5.5.1.2 Ensure minimum days between password changes is configured - password shadowCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIGUnix

IDENTIFICATION AND AUTHENTICATION

6.2.8 Ensure users' home directories permissions are 750 or more restrictiveCIS Amazon Linux 2 STIG v1.0.0 L1Unix

ACCESS CONTROL

6.2.10 Ensure users' dot files are not group or world writableCIS Amazon Linux 2 STIG v1.0.0 L1Unix

ACCESS CONTROL

6.2.20 Ensure all local interactive user home directories are group-ownedCIS Amazon Linux 2 STIG v1.0.0 L3Unix

CONFIGURATION MANAGEMENT

6.7 Ensure FIPS 140-2 OpenSSL Cryptography Is Used - fips_enabledCIS PostgreSQL 10 OS v1.0.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION

6.7 Ensure FIPS 140-2 OpenSSL Cryptography Is Used - fips_enabledCIS PostgreSQL 11 OS v1.0.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION

6.7 Ensure FIPS 140-2 OpenSSL Cryptography Is Used - fips_enabledCIS PostgreSQL 9.5 OS v1.1.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION

6.7 Ensure FIPS 140-2 OpenSSL Cryptography Is Used - openssl versionCIS PostgreSQL 9.5 OS v1.1.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION

6.7 Ensure FIPS 140-2 OpenSSL Cryptography Is Used - openssl versionCIS PostgreSQL 9.6 OS v1.0.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION

CIS_Red_Hat_EL5_v2.2.1_L1.audit from Red Hat Enterprise Linux 5 BenchmarkCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix
CIS_Red_Hat_EL5_v2.2.1_L2.audit from Red Hat Enterprise Linux 5 BenchmarkCIS Red Hat Enterprise Linux 5 L2 v2.2.1Unix
DKER-EE-001940 - SELinux security options must be set on Red Hat or CentOS systems for Docker Enterprise.DISA STIG Docker Enterprise 2.x Linux/Unix v2r2Unix

CONFIGURATION MANAGEMENT

JBOS-AS-000655 - JBoss must be configured to use an approved cryptographic algorithm in conjunction with TLS.DISA JBoss EAP 6.3 STIG v2r5Unix

SYSTEM AND COMMUNICATIONS PROTECTION

Red Hat Enterprise Linux 6 Workstation is installedCIS Red Hat 6 Workstation L1 v3.0.0Unix
Red Hat Enterprise Linux 6 Workstation is installedCIS Red Hat 6 Workstation L2 v3.0.0Unix
Red Hat Enterprise/CentOS Linux 7 is installedDISA Red Hat Enterprise Linux 7 STIG v3r15Unix
RHEL-09-214010 - RHEL 9 must ensure cryptographic verification of vendor software packages.DISA Red Hat Enterprise Linux 9 STIG v2r2Unix

CONFIGURATION MANAGEMENT