Item Search

NameAudit NamePluginCategory
1.9.4 Ensure directory in context.xml is a secure location - configurationCIS Apache Tomcat5.5/6.0 L1 v1.0Unix

AUDIT AND ACCOUNTABILITY

1.9.6 Ensure directory in logging.properties is a secure location (check log directory location)CIS Apache Tomcat5.5/6.0 L1 v1.0Unix

AUDIT AND ACCOUNTABILITY

1.9.6 Ensure directory in logging.properties is a secure location (check prefix application name)CIS Apache Tomcat5.5/6.0 L1 v1.0Unix

AUDIT AND ACCOUNTABILITY

3.1.5 Secure default database location - 'DFTDBPATH value'CIS IBM DB2 OS L2 v1.2.0Unix

AUDIT AND ACCOUNTABILITY

3.1.6 Secure permissions for default database file pathCIS IBM DB2 9 Benchmark v3.0.1 Level 1 OS WindowsWindows

AUDIT AND ACCOUNTABILITY

3.1.6 Secure permissions for default database file pathCIS IBM DB2 9 Benchmark v3.0.1 Level 2 OS WindowsWindows

AUDIT AND ACCOUNTABILITY

3.1.6 Secure permissions for default database file pathCIS IBM DB2 9 Benchmark v3.0.1 Level 1 OS LinuxUnix

AUDIT AND ACCOUNTABILITY

3.1.6 Secure permissions for default database file pathCIS IBM DB2 9 Benchmark v3.0.1 Level 2 OS LinuxUnix

AUDIT AND ACCOUNTABILITY

3.1.8 Secure all diagnostic logs - 'diagpath location'CIS IBM DB2 OS L1 v1.2.0Unix

AUDIT AND ACCOUNTABILITY

3.1.17 Secure permissions for the primary archive log location - LOGARCHMETH1 SettingCIS IBM DB2 v10 v1.1.0 Windows OS Level 1Windows

AUDIT AND ACCOUNTABILITY

3.1.17 Secure permissions for the primary archive log location - LOGARCHMETH1 SettingCIS IBM DB2 v10 v1.1.0 Linux OS Level 1Unix

AUDIT AND ACCOUNTABILITY

3.1.17 Secure permissions for the primary archive log location - LOGARCHMETH1 SettingCIS IBM DB2 v10 v1.1.0 Linux OS Level 2Unix

AUDIT AND ACCOUNTABILITY

3.1.17 Secure permissions for the primary archive log location - LOGARCHMETH1 SettingCIS IBM DB2 v10 v1.1.0 Windows OS Level 2Windows

AUDIT AND ACCOUNTABILITY

3.1.18 Secure permissions for the secondary archive log location - LOGARCHMETH2 SettingCIS IBM DB2 v10 v1.1.0 Windows OS Level 2Windows

AUDIT AND ACCOUNTABILITY

3.1.18 Secure permissions for the secondary archive log location - LOGARCHMETH2 SettingCIS IBM DB2 v10 v1.1.0 Windows OS Level 1Windows

AUDIT AND ACCOUNTABILITY

3.1.18 Secure permissions for the secondary archive log location - LOGARCHMETH2 SettingCIS IBM DB2 v10 v1.1.0 Linux OS Level 2Unix

AUDIT AND ACCOUNTABILITY

3.1.19 Secure permissions for the tertiary archive log location - FAILARCHPATH SettingCIS IBM DB2 v10 v1.1.0 Linux OS Level 2Unix

AUDIT AND ACCOUNTABILITY

3.1.19 Secure permissions for the tertiary archive log location - FAILARCHPATH SettingCIS IBM DB2 v10 v1.1.0 Linux OS Level 1Unix

AUDIT AND ACCOUNTABILITY

3.1.20 Secure permissions for the log mirror location - MIRRORLOGPATH SettingCIS IBM DB2 v10 v1.1.0 Windows OS Level 2Windows

AUDIT AND ACCOUNTABILITY

3.2.4 Secure permissions for the primary archive log locationCIS IBM DB2 9 Benchmark v3.0.1 Level 1 OS LinuxUnix

AUDIT AND ACCOUNTABILITY

3.2.5 Secure permissions for the secondary archive log locationCIS IBM DB2 9 Benchmark v3.0.1 Level 1 OS LinuxUnix

AUDIT AND ACCOUNTABILITY

5.5 Configure newsyslog for secure file permissions (/var/log/amd.log)CIS FreeBSD v1.0.5Unix

AUDIT AND ACCOUNTABILITY

5.5 Configure newsyslog for secure file permissions (/var/log/daily.log)CIS FreeBSD v1.0.5Unix

AUDIT AND ACCOUNTABILITY

5.5 Configure newsyslog for secure file permissions (/var/log/maillog)CIS FreeBSD v1.0.5Unix

AUDIT AND ACCOUNTABILITY

5.5 Configure newsyslog for secure file permissions (/var/log/messages)CIS FreeBSD v1.0.5Unix

AUDIT AND ACCOUNTABILITY

5.5 Configure newsyslog for secure file permissions (/var/log/slip.log)CIS FreeBSD v1.0.5Unix

AUDIT AND ACCOUNTABILITY

5.6 Ensure Cloudwatch Log Group for Web Tier has a retention periodCIS Amazon Web Services Three-tier Web Architecture L1 1.0.0amazon_aws

AUDIT AND ACCOUNTABILITY

5.7 Ensure Cloudwatch Log Group for App Tier has a retention periodCIS Amazon Web Services Three-tier Web Architecture L1 1.0.0amazon_aws

AUDIT AND ACCOUNTABILITY

7.4 Ensure directory in context.xml is a secure location - configurationCIS Apache Tomcat 7 L1 v1.1.0 MiddlewareUnix

AUDIT AND ACCOUNTABILITY

7.4 Ensure directory in context.xml is a secure location - configurationCIS Apache Tomcat 7 L1 v1.1.0Unix

AUDIT AND ACCOUNTABILITY

7.6 Ensure directory in logging.properties is a secure location (check log directory location)CIS Apache Tomcat 7 L1 v1.1.0 MiddlewareUnix

AUDIT AND ACCOUNTABILITY

7.6 Ensure directory in logging.properties is a secure location (check prefix application name)CIS Apache Tomcat 7 L1 v1.1.0Unix

AUDIT AND ACCOUNTABILITY

7.6 Ensure directory in logging.properties is a secure location (check prefix application name)CIS Apache Tomcat 7 L1 v1.1.0 MiddlewareUnix

AUDIT AND ACCOUNTABILITY

20.47 Ensure 'Permissions for the Application Event Log must prevent access by non-privileged accounts'CIS Microsoft Windows Server 2022 STIG v1.0.0 STIG DCWindows

AUDIT AND ACCOUNTABILITY

20.48 Ensure 'Permissions for the Application Event Log must prevent access by non-privileged accounts'CIS Microsoft Windows Server 2019 STIG v2.0.0 STIG DCWindows

AUDIT AND ACCOUNTABILITY

20.48 Ensure 'Permissions for the Application Event Log must prevent access by non-privileged accounts'CIS Microsoft Windows Server 2019 STIG v2.0.0 STIG MSWindows

AUDIT AND ACCOUNTABILITY

20.48 Ensure 'Permissions for the Application Event Log must prevent access by non-privileged accounts'CIS Microsoft Windows Server 2016 STIG v3.0.0 STIG MSWindows

AUDIT AND ACCOUNTABILITY

20.48 Ensure 'Permissions for the Security Event Log must prevent access by non-privileged accounts'CIS Microsoft Windows Server 2022 STIG v1.0.0 STIG DCWindows

AUDIT AND ACCOUNTABILITY

20.49 Ensure 'Permissions for the Security Event Log must prevent access by non-privileged accounts'CIS Microsoft Windows Server 2016 STIG v3.0.0 STIG DCWindows

AUDIT AND ACCOUNTABILITY

20.49 Ensure 'Permissions for the Security Event Log must prevent access by non-privileged accounts'CIS Microsoft Windows Server 2019 STIG v2.0.0 STIG DCWindows

AUDIT AND ACCOUNTABILITY

20.49 Ensure 'Permissions for the Security Event Log must prevent access by non-privileged accounts'CIS Microsoft Windows Server 2019 STIG v2.0.0 STIG MSWindows

AUDIT AND ACCOUNTABILITY

20.49 Ensure 'Permissions for the Security Event Log must prevent access by non-privileged accounts'CIS Microsoft Windows Server 2016 STIG v3.0.0 STIG MSWindows

AUDIT AND ACCOUNTABILITY

20.49 Ensure 'Permissions for the System Event Log must prevent access by non-privileged accounts'CIS Microsoft Windows Server 2022 STIG v1.0.0 STIG MSWindows

AUDIT AND ACCOUNTABILITY

20.50 Ensure 'Permissions for the System Event Log must prevent access by non-privileged accounts'CIS Microsoft Windows Server 2016 STIG v3.0.0 STIG DCWindows

AUDIT AND ACCOUNTABILITY

20.50 Ensure 'Permissions for the System Event Log must prevent access by non-privileged accounts'CIS Microsoft Windows Server 2019 STIG v2.0.0 STIG DCWindows

AUDIT AND ACCOUNTABILITY

20.50 Ensure 'Permissions for the System Event Log must prevent access by non-privileged accounts'CIS Microsoft Windows Server 2016 STIG v3.0.0 STIG MSWindows

AUDIT AND ACCOUNTABILITY

Logging Directives should be restricted to authorized users. - 'CustomLog logs/access_log combined'TNS IBM HTTP Server Best PracticeWindows

AUDIT AND ACCOUNTABILITY

Logging Directives should be restricted to authorized users. - 'ErrorLog logs/error_log'TNS IBM HTTP Server Best PracticeWindows

AUDIT AND ACCOUNTABILITY

Logging Directives should be restricted to authorized users. - 'LogFormat'TNS IBM HTTP Server Best PracticeWindows

AUDIT AND ACCOUNTABILITY

Logging Directives should be restricted to authorized users. - 'LogLevel notice'TNS IBM HTTP Server Best PracticeWindows

AUDIT AND ACCOUNTABILITY