Item Search

NameAudit NamePluginCategory
1.1.16 Ensure nodev option set on /dev/shm partitionCIS Amazon Linux 2 STIG v1.0.0 L1Unix

CONFIGURATION MANAGEMENT

1.1.17 Ensure nosuid option set on /dev/shm partitionCIS Amazon Linux 2 STIG v1.0.0 L1Unix

CONFIGURATION MANAGEMENT

1.1.18 Ensure noexec option set on /dev/shm partitionCIS Amazon Linux 2 STIG v1.0.0 L1Unix

CONFIGURATION MANAGEMENT

1.2 Ensure the Server Is Not a Multi-Use SystemCIS Apache HTTP Server 2.4 L1 v2.1.0 MiddlewareUnix

CONFIGURATION MANAGEMENT

1.2 Ensure the Server Is Not a Multi-Use SystemCIS Apache HTTP Server 2.4 L1 v2.1.0Unix

CONFIGURATION MANAGEMENT

1.2.4 Disable the rhnsd DaemonCIS Red Hat Enterprise Linux 5 L2 v2.2.1Unix

SYSTEM AND INFORMATION INTEGRITY

1.3.1 Ensure AIDE is installedCIS Amazon Linux 2 STIG v1.0.0 L1Unix

AUDIT AND ACCOUNTABILITY

1.5 Installing ISC BIND 9 - bind9 installationCIS BIND DNS v3.0.1 Authoritative Name ServerUnix
1.5 Installing ISC BIND 9 - bind9 installationCIS BIND DNS v3.0.1 Caching Only Name ServerUnix
1.5 Installing ISC BIND 9 - bind9 installationCIS BIND DNS v1.0.0 L1 Caching Only Name ServerUnix

CONFIGURATION MANAGEMENT

1.5 Installing ISC BIND 9 - named locationCIS BIND DNS v3.0.1 Authoritative Name ServerUnix

CONFIGURATION MANAGEMENT

1.5 Installing ISC BIND 9 - named locationCIS BIND DNS v3.0.1 Caching Only Name ServerUnix

CONFIGURATION MANAGEMENT

1.5 Installing ISC BIND 9 - named locationCIS BIND DNS v1.0.0 L1 Authoritative Name ServerUnix

CONFIGURATION MANAGEMENT

3.2.2 Ensure ICMP redirects are not accepted - /etc/sysctl.conf /etc/sysctl.d/* net.ipv4.conf.all.accept_redirects=0CIS Amazon Linux 2 STIG v1.0.0 L1Unix

CONFIGURATION MANAGEMENT

3.2.2 Ensure ICMP redirects are not accepted - /etc/sysctl.conf /etc/sysctl.d/* net.ipv4.conf.default.accept_redirects=0CIS Amazon Linux 2 STIG v1.0.0 L1Unix

CONFIGURATION MANAGEMENT

3.2.2 Ensure ICMP redirects are not accepted - /etc/sysctl.conf /etc/sysctl.d/* net.ipv6.conf.all.accept_redirects=0CIS Amazon Linux 2 STIG v1.0.0 L1Unix

CONFIGURATION MANAGEMENT

3.2.2 Ensure ICMP redirects are not accepted - /etc/sysctl.conf /etc/sysctl.d/* net.ipv6.conf.default.accept_redirects=0CIS Amazon Linux 2 STIG v1.0.0 L1Unix

CONFIGURATION MANAGEMENT

3.2.2 Ensure ICMP redirects are not accepted - sysctl net.ipv4.conf.all.accept_redirects=0CIS Amazon Linux 2 STIG v1.0.0 L1Unix

CONFIGURATION MANAGEMENT

3.2.2 Ensure ICMP redirects are not accepted - sysctl net.ipv4.conf.default.accept_redirects=0CIS Amazon Linux 2 STIG v1.0.0 L1Unix

CONFIGURATION MANAGEMENT

3.2.2 Ensure ICMP redirects are not accepted - sysctl net.ipv6.conf.all.accept_redirects=0CIS Amazon Linux 2 STIG v1.0.0 L1Unix

CONFIGURATION MANAGEMENT

3.2.2 Ensure ICMP redirects are not accepted - sysctl net.ipv6.conf.default.accept_redirects=0CIS Amazon Linux 2 STIG v1.0.0 L1Unix

CONFIGURATION MANAGEMENT

4.1.2.7 Ensure audit the umount commandCIS Amazon Linux 2 STIG v1.0.0 L3Unix

AUDIT AND ACCOUNTABILITY

4.1.2.8 Ensure audit of postdrop commandCIS Amazon Linux 2 STIG v1.0.0 L3Unix

AUDIT AND ACCOUNTABILITY

4.1.2.21 Ensure audit of the chcon commandCIS Amazon Linux 2 STIG v1.0.0 L3Unix

AUDIT AND ACCOUNTABILITY

4.1.2.23 Ensure audit of the userhelper commandCIS Amazon Linux 2 STIG v1.0.0 L3Unix

AUDIT AND ACCOUNTABILITY

5.2 Verify SELinux security options, if applicableCIS Docker 1.13.0 v1.0.0 L2 DockerUnix

ACCESS CONTROL

5.2.22 Ensure only FIPS 140-2 ciphers are used for SSHCIS Amazon Linux 2 STIG v1.0.0 L3Unix

SYSTEM AND COMMUNICATIONS PROTECTION

5.2.26 Ensure only FIPS 140-2 MACs are used for SSHCIS Amazon Linux 2 STIG v1.0.0 L3Unix

SYSTEM AND COMMUNICATIONS PROTECTION

5.2.27 Ensure SSH does not permit GSSAPICIS Amazon Linux 2 STIG v1.0.0 L3Unix

CONFIGURATION MANAGEMENT

5.2.28 Ensure SSH does not permit Kerberos authenticationCIS Amazon Linux 2 STIG v1.0.0 L3Unix

IDENTIFICATION AND AUTHENTICATION

5.2.34 Ensure remote X connections are encrypted.CIS Amazon Linux 2 STIG v1.0.0 L3Unix

CONFIGURATION MANAGEMENT

5.3.12 Ensure password prohibited reuse is at a minumum '5'CIS Amazon Linux 2 STIG v1.0.0 L3Unix

IDENTIFICATION AND AUTHENTICATION

5.4.6 Ensure users must provide password for escalationCIS Amazon Linux 2 STIG v1.0.0 L3Unix

ACCESS CONTROL

6.3.4 Upgrade Password Hashing Algorithm to SHA-512CIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

IDENTIFICATION AND AUTHENTICATION

7.1 Ensure mod_ssl and/or mod_nss Is InstalledCIS Apache HTTP Server 2.2 L2 v3.6.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION

7.1 Ensure mod_ssl and/or mod_nss Is Installed - 'mod_ssl is loaded'CIS Apache HTTP Server 2.2 L1 v3.6.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION

7.1 Ensure mod_ssl and/or mod_nss Is Installed - 'mod_ssl is loaded'CIS Apache HTTP Server 2.2 L1 v3.6.0 MiddlewareUnix

SYSTEM AND COMMUNICATIONS PROTECTION

CIS_Red_Hat_EL8_Server_L1_v3.0.0.audit from CIS Red Hat Enterprise Linux 8 Benchmark v3.0.0CIS Red Hat EL8 Server L1 v3.0.0Unix
CIS_Red_Hat_EL8_Server_L2_v3.0.0.audit from CIS Red Hat Enterprise Linux 8 Benchmark v3.0.0CIS Red Hat EL8 Server L2 v3.0.0Unix
CIS_Red_Hat_EL8_Workstation_L1_v3.0.0.audit from CIS Red Hat Enterprise Linux 8 Benchmark v3.0.0CIS Red Hat EL8 Workstation L1 v3.0.0Unix
CIS_Red_Hat_EL8_Workstation_L2_v3.0.0.audit from CIS Red Hat Enterprise Linux 8 Benchmark v3.0.0CIS Red Hat EL8 Workstation L2 v3.0.0Unix
DISA_STIG_Red_Hat_Enterprise_Linux_7_v3r15.audit from DISA Red Hat Enterprise Linux 7 v3r15 STIGDISA Red Hat Enterprise Linux 7 STIG v3r15Unix
DISA_STIG_Red_Hat_Enterprise_Linux_8_v2r1.audit from DISA Red Hat Enterprise Linux 8 v2r1 STIGDISA Red Hat Enterprise Linux 8 STIG v2r1Unix
DISA_STIG_Red_Hat_Enterprise_Linux_9_v2r2.audit from DISA Red Hat Enterprise Linux 9 v2r2 STIGDISA Red Hat Enterprise Linux 9 STIG v2r2Unix
DISA_STIG_RHEL_5_v1r18.audit from DISA Red Hat Enterprise Linux 5 STIG v1r18DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix
DISA_STIG_RHEL_6_v2r2.audit from DISA Red Hat Enterprise Linux 6 v2r2 STIGDISA Red Hat Enterprise Linux 6 STIG v2r2Unix
JBOS-AS-000010 - HTTP management session traffic must be encrypted.DISA JBoss EAP 6.3 STIG v2r5Unix

ACCESS CONTROL

JBOS-AS-000225 - Google Analytics must be disabled in EAP Console.DISA JBoss EAP 6.3 STIG v2r5Unix

CONFIGURATION MANAGEMENT

RHEL-08-020090 - RHEL 8 must map the authenticated identity to the user or group account for PKI-based authentication.DISA Red Hat Enterprise Linux 8 STIG v2r1Unix

IDENTIFICATION AND AUTHENTICATION

RHEL-09-213110 - RHEL 9 must implement nonexecutable data to protect its memory from unauthorized code execution.DISA Red Hat Enterprise Linux 9 STIG v2r2Unix

SYSTEM AND INFORMATION INTEGRITY