Item Search

NameAudit NamePluginCategory
1.1.12 Ensure separate partition exists for /var/logCIS Amazon Linux 2 STIG v1.0.0 L2Unix

AUDIT AND ACCOUNTABILITY

1.1.14 Ensure separate partition exists for /homeCIS Amazon Linux 2 STIG v1.0.0 L2Unix

CONFIGURATION MANAGEMENT

1.2.5 Ensure the version of the operating system is an active vendor supported release.CIS Amazon Linux 2 STIG v1.0.0 L3Unix

SYSTEM AND INFORMATION INTEGRITY

1.5.6 Ensure NIST FIPS-validated cryptography is configured - enabledCIS Amazon Linux 2 STIG v1.0.0 L3Unix

SYSTEM AND COMMUNICATIONS PROTECTION

1.6.1.4 Ensure SELinux policy is configured - configCIS Amazon Linux 2 STIG v1.0.0 L2Unix

ACCESS CONTROL

2.1.1 Ensure the rsh package has been removedCIS Amazon Linux 2 STIG v1.0.0 L3Unix

CONFIGURATION MANAGEMENT

2.1.2 Ensure the ypserv package has been removedCIS Amazon Linux 2 STIG v1.0.0 L3Unix

CONFIGURATION MANAGEMENT

2.2.1.4 Ensure NTP 'maxpoll' is set - maxpoll is set.CIS Amazon Linux 2 STIG v1.0.0 L3Unix

AUDIT AND ACCOUNTABILITY

2.2.2.7 Ensure unrestricted logon is not allowedCIS Amazon Linux 2 STIG v1.0.0 L3Unix

CONFIGURATION MANAGEMENT

2.2.24 Ensure default SNMP community strings don't existCIS Amazon Linux 2 STIG v1.0.0 L3Unix

IDENTIFICATION AND AUTHENTICATION

2.2.25 Ensure unrestricted mail relaying is prevented.CIS Amazon Linux 2 STIG v1.0.0 L3Unix

CONFIGURATION MANAGEMENT

2.2.27 Ensure ldap_id_use_start_tls is set for LDAP.CIS Amazon Linux 2 STIG v1.0.0 L3Unix

SYSTEM AND COMMUNICATIONS PROTECTION

3.1.3 Ensure network interfaces are not in promiscuous modeCIS Amazon Linux 2 STIG v1.0.0 L3Unix

CONFIGURATION MANAGEMENT

4.1.1.5 Ensure audit logs on seperate system are encrypted.CIS Amazon Linux 2 STIG v1.0.0 L3Unix

AUDIT AND ACCOUNTABILITY

4.1.2.1 Ensure all uses of the passwd command are audited.CIS Amazon Linux 2 STIG v1.0.0 L3Unix

AUDIT AND ACCOUNTABILITY

4.1.2.3 Ensure audit of the gpasswd commandCIS Amazon Linux 2 STIG v1.0.0 L3Unix

AUDIT AND ACCOUNTABILITY

4.1.2.6 Ensure audit all uses of the chsh command.CIS Amazon Linux 2 STIG v1.0.0 L3Unix

AUDIT AND ACCOUNTABILITY

4.1.2.8 Ensure audit of postdrop commandCIS Amazon Linux 2 STIG v1.0.0 L3Unix

AUDIT AND ACCOUNTABILITY

4.1.2.10 Ensure audit ssh-keysign command.CIS Amazon Linux 2 STIG v1.0.0 L3Unix

AUDIT AND ACCOUNTABILITY

4.1.2.16 Ensure audit unlinkat syscall - 32 bitCIS Amazon Linux 2 STIG v1.0.0 L3Unix

AUDIT AND ACCOUNTABILITY

4.1.2.18 Ensure audit of the finit_module syscall - 64 bitCIS Amazon Linux 2 STIG v1.0.0 L3Unix

AUDIT AND ACCOUNTABILITY

4.1.2.25 Ensure audit of the mount command and syscall - 32 bitCIS Amazon Linux 2 STIG v1.0.0 L3Unix

AUDIT AND ACCOUNTABILITY

4.7 Enable use of the au-remote pluginCIS Amazon Linux 2 STIG v1.0.0 L3Unix

AUDIT AND ACCOUNTABILITY

4.9 Ensure action is taken when audisp-remote buffer is fullCIS Amazon Linux 2 STIG v1.0.0 L3Unix

AUDIT AND ACCOUNTABILITY

4.10 Ensure off-loaded audit logs are labeled.CIS Amazon Linux 2 STIG v1.0.0 L3Unix

AUDIT AND ACCOUNTABILITY

5.2 Ensure DCUI is disabledCIS VMware ESXi 6.5 v1.0.0 Level 2VMware

SYSTEM AND INFORMATION INTEGRITY

5.2 Ensure DCUI is disabledCIS VMware ESXi 6.7 v1.3.0 Level 2VMware

CONFIGURATION MANAGEMENT

5.2.2 Ensure SSH is runningCIS Amazon Linux 2 STIG v1.0.0 L3Unix

CONFIGURATION MANAGEMENT

5.2.23 Ensure RSA rhosts authentication is not allowedCIS Amazon Linux 2 STIG v1.0.0 L3Unix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

5.2.24 Ensure Printlastlog is enabledCIS Amazon Linux 2 STIG v1.0.0 L3Unix

ACCESS CONTROL

5.2.34 Ensure remote X connections are encrypted.CIS Amazon Linux 2 STIG v1.0.0 L3Unix

CONFIGURATION MANAGEMENT

5.3.5 Ensure minimum and maximum requirements are set for password changes - maxclassrepeatCIS Amazon Linux 2 STIG v1.0.0 L3Unix

IDENTIFICATION AND AUTHENTICATION

5.3.5 Ensure minimum and maximum requirements are set for password changes - maxrepeatCIS Amazon Linux 2 STIG v1.0.0 L3Unix

IDENTIFICATION AND AUTHENTICATION

5.3.12 Ensure password prohibited reuse is at a minumum '5'CIS Amazon Linux 2 STIG v1.0.0 L3Unix

IDENTIFICATION AND AUTHENTICATION

5.4.10 Ensure default user umask is 077CIS Amazon Linux 2 STIG v1.0.0 L3Unix

ACCESS CONTROL

5.4.11 Ensure default user shell timeout is 600 seconds or lessCIS Amazon Linux 2 STIG v1.0.0 L3Unix

ACCESS CONTROL

5.7 Ensure multi-factor authentication is enable for users - moduleCIS Amazon Linux 2 STIG v1.0.0 L3Unix

IDENTIFICATION AND AUTHENTICATION

5.8 Ensure non-privileged users are prevented from executing privileged functionsCIS Amazon Linux 2 STIG v1.0.0 L3Unix

ACCESS CONTROL

6.2.22 Ensure local interactive user is a member of the group owner.CIS Amazon Linux 2 STIG v1.0.0 L3Unix

CONFIGURATION MANAGEMENT

6.2.28 Ensure upon user creation a home directory is assigned.CIS Amazon Linux 2 STIG v1.0.0 L3Unix

CONFIGURATION MANAGEMENT

6.4 Ensure system device files are labeled - device_tCIS Amazon Linux 2 STIG v1.0.0 L3Unix

ACCESS CONTROL

6.4 Zero out VMDK files prior to deletionCIS VMware ESXi 5.5 v1.2.0 Level 2VMware

CONFIGURATION MANAGEMENT

8.2.2 Ensure unnecessary CD/DVD devices are disconnectedCIS VMware ESXi 6.5 v1.0.0 Level 2VMware

SYSTEM AND INFORMATION INTEGRITY

8.4.9 Ensure Drag and Drop Version Get is disabledCIS VMware ESXi 6.7 v1.3.0 Level 2VMware

CONFIGURATION MANAGEMENT

8.4.12 Ensure Request Disk Topology is disabledCIS VMware ESXi 6.7 v1.3.0 Level 2VMware

CONFIGURATION MANAGEMENT

8.4.19 Ensure Guest Host Interaction Launch Menu is disabledCIS VMware ESXi 6.7 v1.3.0 Level 2VMware

CONFIGURATION MANAGEMENT

8.4.21 Disable Host Guest File System ServerCIS VMware ESXi 5.1 v1.0.1 Level 2VMware

CONFIGURATION MANAGEMENT

8.4.24 Disable VM Monitor ControlCIS VMware ESXi 5.1 v1.0.1 Level 2VMware

CONFIGURATION MANAGEMENT

8.5.1 Ensure VM limits are configured correctly - Num Mem SharesCIS VMware ESXi 6.7 v1.3.0 Level 2VMware

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

8.6.1 Avoid using nonpersistent disksCIS VMware ESXi 5.5 v1.2.0 Level 2VMware

AUDIT AND ACCOUNTABILITY