Item Search

NameAudit NamePluginCategory
1.1.4 Ensure nodev option set on /tmp partitionCIS Amazon Linux 2 STIG v2.0.0 L1 ServerUnix

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

1.1.7 Ensure noexec option set on /dev/shm partitionCIS Amazon Linux 2 STIG v2.0.0 L1 ServerUnix

CONFIGURATION MANAGEMENT

1.1.8 Ensure nodev option set on /dev/shm partitionCIS Amazon Linux 2 STIG v2.0.0 L1 ServerUnix

CONFIGURATION MANAGEMENT

1.1.20 Ensure removable media partitions include noexec optionCIS Amazon Linux 2 STIG v2.0.0 L1 ServerUnix

ACCESS CONTROL, MEDIA PROTECTION

1.2.2 Ensure package manager repositories are configuredCIS Amazon Linux 2 STIG v2.0.0 L1 ServerUnix

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

1.2.3 Ensure gpgcheck is globally activatedCIS Amazon Linux 2 STIG v2.0.0 L1 ServerUnix

CONFIGURATION MANAGEMENT

1.2.6.3 Ensure passcode have at least 1 number is set to enabledCIS Zoom L1 v1.0.0Zoom

CONFIGURATION MANAGEMENT

1.3.1 Ensure AIDE is installedCIS Amazon Linux 2 STIG v2.0.0 L1 ServerUnix

CONFIGURATION MANAGEMENT

1.5.4 Ensure prelink is not installedCIS Amazon Linux 2 STIG v2.0.0 L1 ServerUnix

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

1.6.1.1 Ensure SELinux is installedCIS Amazon Linux 2 STIG v2.0.0 L1 ServerUnix

ACCESS CONTROL, MEDIA PROTECTION

1.6.1.3 Ensure SELinux policy is configuredCIS Amazon Linux 2 STIG v2.0.0 L1 ServerUnix

ACCESS CONTROL, SYSTEM AND INFORMATION INTEGRITY

1.7.1 Ensure message of the day is configured properlyCIS Amazon Linux 2 STIG v2.0.0 L1 ServerUnix

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

2.1.1 Ensure xinetd is not installedCIS Amazon Linux 2 STIG v2.0.0 L1 ServerUnix

CONFIGURATION MANAGEMENT

2.2.1.1 Ensure time synchronization is in useCIS Amazon Linux 2 STIG v2.0.0 L1 ServerUnix

AUDIT AND ACCOUNTABILITY

2.2.5 Ensure DHCP Server is not installedCIS Amazon Linux 2 STIG v2.0.0 L1 ServerUnix

CONFIGURATION MANAGEMENT

2.2.7 Ensure DNS Server is not installedCIS Amazon Linux 2 STIG v2.0.0 L1 ServerUnix

CONFIGURATION MANAGEMENT

2.2.11 Ensure Samba is not installedCIS Amazon Linux 2 STIG v2.0.0 L1 ServerUnix

CONFIGURATION MANAGEMENT

2.2.12 Ensure HTTP Proxy Server is not installedCIS Amazon Linux 2 STIG v2.0.0 L1 ServerUnix

CONFIGURATION MANAGEMENT

2.2.15 Ensure telnet-server is not installedCIS Amazon Linux 2 STIG v2.0.0 L1 ServerUnix

CONFIGURATION MANAGEMENT

2.2.19 Ensure rsync is not installed or the rsyncd service is maskedCIS Amazon Linux 2 STIG v2.0.0 L1 ServerUnix

CONFIGURATION MANAGEMENT

2.3.3 Ensure talk client is not installedCIS Amazon Linux 2 STIG v2.0.0 L1 ServerUnix

CONFIGURATION MANAGEMENT

2.3.4 Ensure telnet client is not installedCIS Amazon Linux 2 STIG v2.0.0 L1 ServerUnix

CONFIGURATION MANAGEMENT

3.1.2 Ensure wireless interfaces are disabledCIS Amazon Linux 2 STIG v2.0.0 L1 ServerUnix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

3.3.4 Ensure secure ICMP redirects are not acceptedCIS Amazon Linux 2 STIG v2.0.0 L1 ServerUnix

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

3.3.6 Ensure broadcast ICMP requests are ignoredCIS Amazon Linux 2 STIG v2.0.0 L1 ServerUnix

CONFIGURATION MANAGEMENT

3.3.8 Ensure Reverse Path Filtering is enabledCIS Amazon Linux 2 STIG v2.0.0 L1 ServerUnix

CONFIGURATION MANAGEMENT

3.5.1.1 Ensure firewalld is installedCIS Amazon Linux 2 STIG v2.0.0 L1 ServerUnix

SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION

3.5.1.4 Ensure firewalld service enabled and runningCIS Amazon Linux 2 STIG v2.0.0 L1 ServerUnix

CONFIGURATION MANAGEMENT

3.5.1.6 Ensure network interfaces are assigned to appropriate zoneCIS Amazon Linux 2 STIG v2.0.0 L1 ServerUnix

SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION

3.5.2.2 Ensure firewalld is either not installed or masked with nftablesCIS Amazon Linux 2 STIG v2.0.0 L1 ServerUnix

SECURITY ASSESSMENT AND AUTHORIZATION, CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

3.5.2.10 Ensure nftables service is enabledCIS Amazon Linux 2 STIG v2.0.0 L1 ServerUnix

SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION

3.5.3.1.3 Ensure firewalld is either not installed or masked with iptablesCIS Amazon Linux 2 STIG v2.0.0 L1 ServerUnix

SECURITY ASSESSMENT AND AUTHORIZATION, CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

4.6 Ensure That IP Forwarding Is Not Enabled on InstancesCIS Google Cloud Platform Foundation v4.0.0 L1GCP

SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION

4.11.8.3 (L1) Ensure 'Prevent the use of security questions for local accounts' is set to 'Enabled'CIS Microsoft Intune for Windows 10 v4.0.0 L1Windows

CONFIGURATION MANAGEMENT

18.10.15.3 (L1) Ensure 'Prevent the use of security questions for local accounts' is set to 'Enabled'CIS Microsoft Windows 10 Enterprise v4.0.0 L1 BLWindows

CONFIGURATION MANAGEMENT

18.10.15.3 (L1) Ensure 'Prevent the use of security questions for local accounts' is set to 'Enabled'CIS Microsoft Windows 10 Enterprise v4.0.0 L1 BL NGWindows

CONFIGURATION MANAGEMENT

18.10.15.3 (L1) Ensure 'Prevent the use of security questions for local accounts' is set to 'Enabled'CIS Microsoft Windows 10 Stand-alone v4.0.0 L1Windows

CONFIGURATION MANAGEMENT

18.10.15.3 (L1) Ensure 'Prevent the use of security questions for local accounts' is set to 'Enabled'CIS Microsoft Windows 10 Stand-alone v4.0.0 L1 BLWindows

CONFIGURATION MANAGEMENT

18.10.15.3 (L1) Ensure 'Prevent the use of security questions for local accounts' is set to 'Enabled'CIS Microsoft Windows 10 Stand-alone v4.0.0 L1 BL NGWindows

CONFIGURATION MANAGEMENT

DTOO241 - Action to demote an EMail Level 1 attachment to Level 2 must be configured.DISA STIG Microsoft Outlook 2013 v1r14Windows

SYSTEM AND COMMUNICATIONS PROTECTION

ESXI5-VM-000014 - The unexposed feature keyword isolation.tools.ghi.autologon.disable must be initialized to decrease the VMs potential attack vectors.DISA VMware ESXi Version 5 Virtual Machine STIG v2r1VMware

ACCESS CONTROL

ESXI5-VM-000015 - The unexposed feature keyword isolation.bios.bbs.disable must be initialized to decrease the VMs potential attack vectors.DISA VMware ESXi Version 5 Virtual Machine STIG v2r1VMware

CONFIGURATION MANAGEMENT

ESXI5-VM-000017 - The unexposed feature keyword isolation.tools.ghi.launchmenu.change must be initialized to decrease the VMs potential attack vectors.DISA VMware ESXi Version 5 Virtual Machine STIG v2r1VMware

CONFIGURATION MANAGEMENT

ESXI5-VM-000019 - The unexposed feature keyword isolation.tools.ghi.protocolhandler.info.disable must be initialized to decrease the VMs potential attack vectors.DISA VMware ESXi Version 5 Virtual Machine STIG v2r1VMware

CONFIGURATION MANAGEMENT

ESXI5-VM-000021 - The unexposed feature keyword isolation.tools.dispTopoRequest.disable must be initialized to decrease the VMs potential attack vectors.DISA VMware ESXi Version 5 Virtual Machine STIG v2r1VMware

CONFIGURATION MANAGEMENT

ESXI5-VM-000022 - The unexposed feature keyword isolation.tools.trashFolderState.disable must be initialized to decrease the VMs potential attack vectors.DISA VMware ESXi Version 5 Virtual Machine STIG v2r1VMware

CONFIGURATION MANAGEMENT

ESXI5-VM-000023 - The unexposed feature keyword isolation.tools.ghi.trayicon.disable must be initialized to decrease the VMs potential attack vectors.DISA VMware ESXi Version 5 Virtual Machine STIG v2r1VMware

CONFIGURATION MANAGEMENT

ESXI5-VM-000024 - The unexposed feature keyword isolation.tools.unity.disable must be initialized to decrease the VMs potential attack vectors.DISA VMware ESXi Version 5 Virtual Machine STIG v2r1VMware

CONFIGURATION MANAGEMENT

RHEL-08-010163 - The krb5-server package must not be installed on RHEL 8.DISA Red Hat Enterprise Linux 8 STIG v2r7Unix

IDENTIFICATION AND AUTHENTICATION

VM : disable-unexposed-features-unity-windowcontentsVMWare vSphere 5.X Hardening GuideVMware

CONFIGURATION MANAGEMENT