Item Search

NameAudit NamePluginCategory
1.1.7 Ensure separate partition exists for /varCIS Amazon Linux 2 STIG v1.0.0 L2Unix

CONFIGURATION MANAGEMENT

1.2 Do Not Install a Multi-Use System - chkconfigCIS BIND DNS v1.0.0 L1 Caching Only Name ServerUnix

CONFIGURATION MANAGEMENT

1.2 Do Not Install a Multi-Use System - chkconfigCIS BIND DNS v1.0.0 L1 Authoritative Name ServerUnix

CONFIGURATION MANAGEMENT

1.2 Do Not Install a Multi-Use System - systemctlCIS BIND DNS v1.0.0 L1 Authoritative Name ServerUnix

CONFIGURATION MANAGEMENT

1.2.5 Disable the rhnsd DaemonCIS Red Hat 6 Workstation L2 v3.0.0Unix

CONFIGURATION MANAGEMENT

1.5.7 Ensure DNS is servers are configured - nameserver 1CIS Amazon Linux 2 STIG v1.0.0 L3Unix

SYSTEM AND COMMUNICATIONS PROTECTION

1.5.7 Ensure DNS is servers are configured - nameserver 2CIS Amazon Linux 2 STIG v1.0.0 L3Unix

SYSTEM AND COMMUNICATIONS PROTECTION

1.8.15 Ensure GNOME Lock Delay is configuredCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIGUnix

ACCESS CONTROL

2.2.2.2 Ensure GNOME Screen Lock is Enabled.CIS Amazon Linux 2 STIG v1.0.0 L3Unix

ACCESS CONTROL

2.2.2.3 Ensure GNOME Screensaver period of inactivity is configured.CIS Amazon Linux 2 STIG v1.0.0 L3Unix

ACCESS CONTROL

2.2.2.4 Ensure GNOME Idle activation is set.CIS Amazon Linux 2 STIG v1.0.0 L3Unix

ACCESS CONTROL

2.2.2.5 Ensure GNOME Lock Delay is configuredCIS Amazon Linux 2 STIG v1.0.0 L3Unix

ACCESS CONTROL

4.1.2.14 Ensure audit of the rmdir syscall - 64 bitCIS Amazon Linux 2 STIG v1.0.0 L3Unix

AUDIT AND ACCOUNTABILITY

4.1.2.15 Ensure audit of unlink syscall - 32 bitCIS Amazon Linux 2 STIG v1.0.0 L3Unix

AUDIT AND ACCOUNTABILITY

4.1.2.15 Ensure audit of unlink syscall - 64 bitCIS Amazon Linux 2 STIG v1.0.0 L3Unix

AUDIT AND ACCOUNTABILITY

4.1.2.16 Ensure audit unlinkat syscall - 64 bitCIS Amazon Linux 2 STIG v1.0.0 L3Unix

AUDIT AND ACCOUNTABILITY

4.1.2.17 Ensure audit of the create_module syscall - 32 bitCIS Amazon Linux 2 STIG v1.0.0 L3Unix

AUDIT AND ACCOUNTABILITY

4.1.2.17 Ensure audit of the create_module syscall - 64 bitCIS Amazon Linux 2 STIG v1.0.0 L3Unix

AUDIT AND ACCOUNTABILITY

4.1.2.18 Ensure audit of the finit_module syscall - 32 bitCIS Amazon Linux 2 STIG v1.0.0 L3Unix

AUDIT AND ACCOUNTABILITY

4.1.2.18 Ensure audit of the finit_module syscall - 64 bitCIS Amazon Linux 2 STIG v1.0.0 L3Unix

AUDIT AND ACCOUNTABILITY

4.1.20 Ensure the auditing processing failures are handled.CIS Amazon Linux 2 STIG v1.0.0 L3Unix

AUDIT AND ACCOUNTABILITY

4.5 Ensure system notification is sent out when voume is 75% fullCIS Amazon Linux 2 STIG v1.0.0 L3Unix

AUDIT AND ACCOUNTABILITY

5.2.24 Ensure Printlastlog is enabledCIS Amazon Linux 2 STIG v1.0.0 L3Unix

ACCESS CONTROL

5.3.6 Ensure no accounts are configured with blank or null passwords - password-authCIS Amazon Linux 2 STIG v1.0.0 L3Unix

IDENTIFICATION AND AUTHENTICATION

5.3.6 Ensure no accounts are configured with blank or null passwords - system-authCIS Amazon Linux 2 STIG v1.0.0 L3Unix

IDENTIFICATION AND AUTHENTICATION

5.4.11 Ensure password prohibited reuse is at a minimum 5CIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIGUnix

IDENTIFICATION AND AUTHENTICATION

5.5.2 Ensure system accounts are secured - non-login shellCIS Red Hat 6 Workstation L1 v3.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

5.5.2 Ensure system accounts are secured - non-login shellCIS CentOS 6 Workstation L1 v3.0.0Unix

ACCESS CONTROL

5.5.2 Ensure system accounts are secured - unlocked non-rootCIS Red Hat 6 Server L1 v3.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

5.5.2 Ensure system accounts are secured - unlocked non-rootCIS CentOS 6 Server L1 v3.0.0Unix

ACCESS CONTROL

5.5.2 Ensure system accounts are secured - unlocked non-rootCIS CentOS 6 Workstation L1 v3.0.0Unix

ACCESS CONTROL

5.5.2 Ensure system accounts are secured - unlocked non-rootCIS Oracle Linux 6 Server L1 v2.0.0Unix

ACCESS CONTROL

5.5.2 Ensure system accounts are secured - unlocked non-rootCIS Oracle Linux 6 Workstation L1 v2.0.0Unix

ACCESS CONTROL

11.1 Ensure SELinux Is Enabled in Enforcing Mode - configCIS Apache HTTP Server 2.4 L2 v2.1.0Unix

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY, MEDIA PROTECTION

check Red Hat 9.3 or greaterCIS Red Hat Enterprise Linux 9 v2.0.0 L1 ServerUnix
check Red Hat 9.3 or greaterCIS Red Hat Enterprise Linux 9 v2.0.0 L1 WorkstationUnix
check Red Hat 9.3 or greaterCIS Rocky Linux 9 v2.0.0 L1 ServerUnix
check Red Hat 9.3 or greaterCIS Rocky Linux 9 v2.0.0 L1 WorkstationUnix
check Red Hat 9.3 or greaterCIS Oracle Linux 9 v2.0.0 L1 ServerUnix
MD7X-00-012500 MongoDB must be configured in accordance with the security configuration settings based on DOD security configuration and implementation guidance, including STIGs, NSA configuration guides, CTOs, DTMs, and IAVMs.DISA MongoDB Enterprise Advanced 7.x STIG v1r1Unix

CONFIGURATION MANAGEMENT

Red Hat 8.4+ is installedDISA Red Hat Enterprise Linux 8 STIG v2r1Unix
Red Hat 8.7+ is installedDISA Red Hat Enterprise Linux 8 STIG v2r1Unix
Red Hat/CentOS 7 is installedDISA Red Hat Enterprise Linux 7 STIG v3r15Unix
Red Hat/CentOS 7 is installedCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIGUnix
Red Hat/CentOS 8.2+ is installedDISA Red Hat Enterprise Linux 8 STIG v2r1Unix
RHEL-07-020019 - The Red Hat Enterprise Linux operating system must implement the Endpoint Security for Linux Threat Prevention tool.DISA Red Hat Enterprise Linux 7 STIG v3r15Unix

CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY

RHEL-07-020270 - The Red Hat Enterprise Linux operating system must not have unnecessary accounts.DISA Red Hat Enterprise Linux 7 STIG v3r15Unix

CONFIGURATION MANAGEMENT

RHEL-07-021100 - The Red Hat Enterprise Linux operating system must have cron logging implemented.DISA Red Hat Enterprise Linux 7 STIG v3r15Unix

CONFIGURATION MANAGEMENT

RHEL-07-040540 - The Red Hat Enterprise Linux operating system must not contain .shosts files.DISA Red Hat Enterprise Linux 7 STIG v3r15Unix

CONFIGURATION MANAGEMENT

RHEL-07-040550 - The Red Hat Enterprise Linux operating system must not contain shosts.equiv files.DISA Red Hat Enterprise Linux 7 STIG v3r15Unix

CONFIGURATION MANAGEMENT