Item Search

NameAudit NamePluginCategory
3.1.3.1 Ensure That Microsoft Defender for Servers Is Set to 'On'CIS Microsoft Azure Foundations v3.0.0 L2microsoft_azure

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

3.1.4.1 Ensure That Microsoft Defender for Containers Is Set To 'On'CIS Microsoft Azure Foundations v3.0.0 L2microsoft_azure

RISK ASSESSMENT

3.8.1 TE - implementation - TECIS IBM AIX 7.1 L2 v2.1.0Unix

SYSTEM AND INFORMATION INTEGRITY

5.4.2.5 Ensure root path integrityCIS Oracle Linux 9 v2.0.0 L1 WorkstationUnix

CONFIGURATION MANAGEMENT

5.4.2.5 Ensure root path integrityCIS Debian Linux 11 v2.0.0 L1 WorkstationUnix

CONFIGURATION MANAGEMENT

5.4.2.5 Ensure root path integrityCIS Ubuntu Linux 22.04 LTS v2.0.0 L1 WorkstationUnix

CONFIGURATION MANAGEMENT

5.4.2.5 Ensure root path integrityCIS Red Hat Enterprise Linux 9 v2.0.0 L1 WorkstationUnix

CONFIGURATION MANAGEMENT

5.4.2.5 Ensure root path integrityCIS Rocky Linux 9 v2.0.0 L1 ServerUnix

CONFIGURATION MANAGEMENT

5.4.2.5 Ensure root path integrityCIS Rocky Linux 9 v2.0.0 L1 WorkstationUnix

CONFIGURATION MANAGEMENT

5.4.2.5 Ensure root path integrityCIS AlmaLinux OS 9 v2.0.0 L1 ServerUnix

CONFIGURATION MANAGEMENT

5.4.2.5 Ensure root path integrityCIS Ubuntu Linux 24.04 LTS v1.0.0 L1 WorkstationUnix

CONFIGURATION MANAGEMENT

5.4.2.5 Ensure root path integrityCIS Debian Linux 11 v2.0.0 L1 ServerUnix

CONFIGURATION MANAGEMENT

6.2 Ensure that MongoDB uses a non-default portCIS MongoDB L1 Unix Audit v1.0.0Unix

CONFIGURATION MANAGEMENT

6.2 Ensure that MongoDB uses a non-default portCIS MongoDB 3.2 L1 Windows Audit v1.0.0Windows

CONFIGURATION MANAGEMENT

6.2 Ensure that MongoDB uses a non-default portCIS MongoDB 3.4 L1 Unix Audit v1.0.0Unix

CONFIGURATION MANAGEMENT

6.2 Ensure that MongoDB uses a non-default portCIS MongoDB 3.2 L1 Unix Audit v1.0.0Unix

CONFIGURATION MANAGEMENT

6.2 Ensure that MongoDB uses a non-default portCIS MongoDB 3.4 L1 Windows Audit v1.0.0Windows

CONFIGURATION MANAGEMENT

6.2.4 Ensure root PATH IntegrityCIS SUSE Linux Enterprise 12 v3.2.0 L1 WorkstationUnix

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

6.2.6 Ensure root PATH IntegrityCIS Ubuntu Linux 14.04 LTS Workstation L1 v2.1.0Unix

CONFIGURATION MANAGEMENT

6.2.6 Ensure root PATH IntegrityCIS Debian 9 Server L1 v1.0.1Unix

CONFIGURATION MANAGEMENT

6.2.6 Ensure root PATH IntegrityCIS Amazon Linux 2 STIG v1.0.0 L1Unix

CONFIGURATION MANAGEMENT

6.2.6 Ensure root PATH IntegrityCIS Ubuntu Linux 14.04 LTS Server L1 v2.1.0Unix

CONFIGURATION MANAGEMENT

6.2.7 Ensure root PATH IntegrityCIS Red Hat 6 Workstation L1 v3.0.0Unix

CONFIGURATION MANAGEMENT

6.2.7 Ensure root PATH IntegrityCIS Fedora 28 Family Linux Server L1 v2.0.0Unix

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

6.2.7 Ensure root PATH IntegrityCIS CentOS 6 Server L1 v3.0.0Unix

CONFIGURATION MANAGEMENT

6.2.7 Ensure root PATH IntegrityCIS Oracle Linux 6 Server L1 v2.0.0Unix

CONFIGURATION MANAGEMENT

6.2.7 Ensure root PATH IntegrityCIS Fedora 28 Family Linux Workstation L1 v2.0.0Unix

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

6.2.8 Ensure root path integrityCIS Oracle Linux 8 Server L1 v3.0.0Unix

CONFIGURATION MANAGEMENT

6.2.8 Ensure root PATH IntegrityCIS Amazon Linux 2023 Server L1 v1.0.0Unix

CONFIGURATION MANAGEMENT

6.2.8 Ensure root path integrityCIS CentOS Linux 7 v4.0.0 L1 WorkstationUnix

CONFIGURATION MANAGEMENT

6.2.8 Ensure root path integrityCIS Red Hat EL8 Server L1 v3.0.0Unix

CONFIGURATION MANAGEMENT

6.2.8 Ensure root path integrityCIS Red Hat EL8 Workstation L1 v3.0.0Unix

CONFIGURATION MANAGEMENT

6.2.8 Ensure root path integrityCIS Rocky Linux 8 Server L1 v2.0.0Unix

CONFIGURATION MANAGEMENT

6.2.8 Ensure root path integrityCIS Red Hat Enterprise Linux 7 v4.0.0 L1 WorkstationUnix

CONFIGURATION MANAGEMENT

6.2.8 Ensure root path integrityCIS AlmaLinux OS 8 Workstation L1 v3.0.0Unix

CONFIGURATION MANAGEMENT

6.2.8 Ensure root path integrityCIS Oracle Linux 8 Workstation L1 v3.0.0Unix

CONFIGURATION MANAGEMENT

6.2.9 Ensure root PATH IntegrityCIS Ubuntu Linux 20.04 LTS Server L1 v2.0.1Unix

CONFIGURATION MANAGEMENT

6.2.9 Ensure root PATH IntegrityCIS Debian 10 Server L1 v2.0.0Unix

CONFIGURATION MANAGEMENT

6.2.9 Ensure root PATH IntegrityCIS Debian 10 Workstation L1 v2.0.0Unix

CONFIGURATION MANAGEMENT

6.2.10 Ensure root PATH IntegrityCIS Red Hat Enterprise Linux 7 STIG v2.0.0 L1 WorkstationUnix

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

6.2.12 Ensure root PATH IntegrityCIS Ubuntu Linux 16.04 LTS Server L1 v2.0.0Unix

CONFIGURATION MANAGEMENT

9.6 Ensure root PATH Integrity - writeable dir in pathCIS Solaris 11.2 L1 v1.1.0Unix

ACCESS CONTROL

9.6 Ensure root PATH Integrity - dot in pathCIS Solaris 11.2 L1 v1.1.0Unix

CONFIGURATION MANAGEMENT

9.6 Ensure root PATH Integrity - writeable dir in pathCIS Solaris 11.1 L1 v1.0.0Unix

ACCESS CONTROL

9.8 Ensure root PATH IntegrityCIS Oracle Solaris 11.4 L1 v1.1.0Unix

CONFIGURATION MANAGEMENT

13.6 Ensure root PATH Integrity - other writable directories in patCIS Debian Linux 7 L1 v1.0.0Unix

CONFIGURATION MANAGEMENT

JUSX-IP-000014 - To protect against unauthorized data mining, the Juniper Networks SRX Series Gateway IDPS must detect code injection attacks launched against data storage objects, including, at a minimum, databases, database records, queries, and fields.DISA Juniper SRX Services Gateway IDPS v2r1Juniper

ACCESS CONTROL

MS.EXO.11.3v1 - The phishing protection solution SHOULD include an AI-based phishing detection tool comparable to EOP Mailbox Intelligence.CISA SCuBA Microsoft 365 Exchange Online v1.5.0microsoft_azure

ACCESS CONTROL, SECURITY ASSESSMENT AND AUTHORIZATION, CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY

SP13-00-000140 - SharePoint must prevent non-privileged users from circumventing malicious code protection capabilities.DISA STIG SharePoint 2013 v2r3Windows

ACCESS CONTROL

XenServer - Disallow unplug detection on the storage network interfaceTNS Citrix XenServerUnix