Item Search

NameAudit NamePluginCategory
1.1.13 Ensure separate partition exists for /var/log/auditCIS Amazon Linux 2 STIG v1.0.0 L2Unix

AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT

1.2 Do Not Install a Multi-Use System - chkconfigCIS BIND DNS v1.0.0 L1 Authoritative Name ServerUnix

CONFIGURATION MANAGEMENT

1.2 Do Not Install a Multi-Use System - chkconfigCIS BIND DNS v1.0.0 L1 Caching Only Name ServerUnix

CONFIGURATION MANAGEMENT

1.2 Do Not Install a Multi-Use System - systemctlCIS BIND DNS v1.0.0 L1 Authoritative Name ServerUnix

CONFIGURATION MANAGEMENT

1.2 Do Not Install a Multi-Use System - systemctlCIS BIND DNS v1.0.0 L1 Caching Only Name ServerUnix

CONFIGURATION MANAGEMENT

1.8.14 Ensure the screensaver idle-activation-enabled settingCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIGUnix

ACCESS CONTROL

1.8.15 Ensure GNOME Lock Delay is configuredCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIGUnix

ACCESS CONTROL

4.1.2.14 Ensure audit of the rmdir syscall - 32 bitCIS Amazon Linux 2 STIG v1.0.0 L3Unix

AUDIT AND ACCOUNTABILITY

4.1.2.16 Ensure audit unlinkat syscall - 32 bitCIS Amazon Linux 2 STIG v1.0.0 L3Unix

AUDIT AND ACCOUNTABILITY

4.1.2.25 Ensure audit of the mount command and syscallCIS Amazon Linux 2 STIG v1.0.0 L3Unix

AUDIT AND ACCOUNTABILITY

4.1.6 Ensure events that modify user/group information are collected - /etc/groupCIS Amazon Linux 2 STIG v1.0.0 L2Unix

AUDIT AND ACCOUNTABILITY

4.1.6 Ensure events that modify user/group information are collected - /etc/gshadowCIS Amazon Linux 2 STIG v1.0.0 L2Unix

AUDIT AND ACCOUNTABILITY

4.1.6 Ensure events that modify user/group information are collected - /etc/passwdCIS Amazon Linux 2 STIG v1.0.0 L2Unix

AUDIT AND ACCOUNTABILITY

4.1.6 Ensure events that modify user/group information are collected - auditctl /etc/groupCIS Amazon Linux 2 STIG v1.0.0 L2Unix

AUDIT AND ACCOUNTABILITY

4.1.6 Ensure events that modify user/group information are collected - auditctl /etc/gshadowCIS Amazon Linux 2 STIG v1.0.0 L2Unix

AUDIT AND ACCOUNTABILITY

4.1.21 Ensure auditing of all privileged functions - setgid 64 bitCIS Amazon Linux 2 STIG v1.0.0 L3Unix

AUDIT AND ACCOUNTABILITY

4.3 Ensure that unnecessary packages are not installed in the containerCIS Docker v1.7.0 L1 Docker - LinuxUnix

CONFIGURATION MANAGEMENT

5.3.7 Ensure lockout for unsuccessful root logon attempts - system-auth defaultCIS Amazon Linux 2 STIG v1.0.0 L3Unix

ACCESS CONTROL

5.4.3 Ensure password hashing algorithm is SHA-512 - system-authCIS Red Hat Enterprise Linux 7 STIG v2.0.0 L1 WorkstationUnix

IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

5.5.2 Ensure system accounts are secured - non-login shellCIS Red Hat 6 Workstation L1 v3.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

5.5.2 Ensure system accounts are secured - non-login shellCIS CentOS 6 Workstation L1 v3.0.0Unix

ACCESS CONTROL

5.5.2 Ensure system accounts are secured - non-login shellCIS CentOS 6 Server L1 v3.0.0Unix

ACCESS CONTROL

5.5.2 Ensure system accounts are secured - non-login shellCIS Oracle Linux 6 Workstation L1 v2.0.0Unix

ACCESS CONTROL

5.5.2 Ensure system accounts are secured - non-login shellCIS Red Hat 6 Server L1 v3.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

5.5.2 Ensure system accounts are secured - non-login shellCIS Oracle Linux 6 Server L1 v2.0.0Unix

ACCESS CONTROL

5.5.2 Ensure system accounts are secured - unlocked non-rootCIS CentOS 6 Server L1 v3.0.0Unix

ACCESS CONTROL

5.5.2 Ensure system accounts are secured - unlocked non-rootCIS CentOS 6 Workstation L1 v3.0.0Unix

ACCESS CONTROL

5.5.2 Ensure system accounts are secured - unlocked non-rootCIS Oracle Linux 6 Server L1 v2.0.0Unix

ACCESS CONTROL

5.5.2 Ensure system accounts are secured - unlocked non-rootCIS Oracle Linux 6 Workstation L1 v2.0.0Unix

ACCESS CONTROL

5.5.2 Ensure system accounts are secured - unlocked non-rootCIS Red Hat 6 Workstation L1 v3.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

7.1 Ensure mod_ssl and/or mod_nss Is InstalledCIS Apache HTTP Server 2.4 v2.2.0 L1Unix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

11.1 Ensure SELinux Is Enabled in Enforcing ModeCIS Apache HTTP Server 2.2 L2 v3.6.0Unix

ACCESS CONTROL

11.1 Ensure SELinux Is Enabled in Enforcing ModeCIS Apache HTTP Server 2.2 L2 v3.6.0 MiddlewareUnix

ACCESS CONTROL

MD4X-00-006600 - MongoDB must be configured in accordance with the security configuration settings based on DoD security configuration and implementation guidance, including STIGs, NSA configuration guides, CTOs, DTMs, and IAVMs.DISA STIG MongoDB Enterprise Advanced 4.x v1r4 OSUnix

CONFIGURATION MANAGEMENT

MD7X-00-012500 MongoDB must be configured in accordance with the security configuration settings based on DOD security configuration and implementation guidance, including STIGs, NSA configuration guides, CTOs, DTMs, and IAVMs.DISA MongoDB Enterprise Advanced 7.x STIG v1r1Unix

CONFIGURATION MANAGEMENT

RHEL-06-000021 - The Red Hat Enterprise Linux operating system must not contain .shosts or shosts.equiv files.DISA Red Hat Enterprise Linux 6 STIG v2r2Unix

CONFIGURATION MANAGEMENT

RHEL-06-000533 - The Red Hat Enterprise Linux operating system must have an anti-virus solution installed.DISA Red Hat Enterprise Linux 6 STIG v2r2Unix

CONFIGURATION MANAGEMENT

RHEL-07-010090 - The Red Hat Enterprise Linux operating system must have the screen package installed.DISA Red Hat Enterprise Linux 7 STIG v3r15Unix

ACCESS CONTROL

RHEL-07-010341 - The Red Hat Enterprise Linux operating system must restrict privilege elevation to authorized personnel.DISA Red Hat Enterprise Linux 7 STIG v3r15Unix

CONFIGURATION MANAGEMENT

RHEL-07-020010 - The Red Hat Enterprise Linux operating system must not have the ypserv package installed.DISA Red Hat Enterprise Linux 7 STIG v3r15Unix

CONFIGURATION MANAGEMENT

RHEL-07-020220 - The Red Hat Enterprise Linux operating system must enable the SELinux targeted policy.DISA Red Hat Enterprise Linux 7 STIG v3r15Unix

ACCESS CONTROL, SYSTEM AND INFORMATION INTEGRITY

RHEL-07-020250 - The Red Hat Enterprise Linux operating system must be a vendor supported release.DISA Red Hat Enterprise Linux 7 STIG v3r15Unix

CONFIGURATION MANAGEMENT

RHEL-07-021024 - The Red Hat Enterprise Linux operating system must mount /dev/shm with secure options.DISA Red Hat Enterprise Linux 7 STIG v3r15Unix

CONFIGURATION MANAGEMENT

RHEL-07-021300 - The Red Hat Enterprise Linux operating system must disable Kernel core dumps unless needed.DISA Red Hat Enterprise Linux 7 STIG v3r15Unix

CONFIGURATION MANAGEMENT

RHEL-07-030360 - The Red Hat Enterprise Linux operating system must audit all executions of privileged functions.DISA Red Hat Enterprise Linux 7 STIG v3r15Unix

ACCESS CONTROL

RHEL-07-032000 - The Red Hat Enterprise Linux operating system must use a virus scan program.DISA Red Hat Enterprise Linux 7 STIG v3r15Unix

CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY

RHEL-07-040201 - The Red Hat Enterprise Linux operating system must implement virtual address space randomization.DISA Red Hat Enterprise Linux 7 STIG v3r15Unix

CONFIGURATION MANAGEMENT

RHEL-07-040520 - The Red Hat Enterprise Linux operating system must enable an application firewall, if available.DISA Red Hat Enterprise Linux 7 STIG v3r15Unix

CONFIGURATION MANAGEMENT

RHEL-07-040820 - The Red Hat Enterprise Linux operating system must not have unauthorized IP tunnels configured.DISA Red Hat Enterprise Linux 7 STIG v3r15Unix

CONFIGURATION MANAGEMENT

RHEL-07-040830 - The Red Hat Enterprise Linux operating system must not forward IPv6 source-routed packets.DISA Red Hat Enterprise Linux 7 STIG v3r15Unix

CONFIGURATION MANAGEMENT