Item Search

NameAudit NamePluginCategory
1.1.2 Ensure 'Enable Password' is setCIS Cisco Firewall ASA 9 L1 v4.1.0Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

1.1.2 Ensure 'Enable Password' is setCIS Cisco Firewall v8.x L1 v4.2.0Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

1.1.3 Ensure 'Master Key Passphrase' is setCIS Cisco Firewall v8.x L1 v4.2.0Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

1.1.3 Ensure 'Master Key Passphrase' is setCIS Cisco Firewall ASA 9 L1 v4.1.0Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

1.5.6 Ensure NIST FIPS-validated cryptography is configured - enabledCIS Amazon Linux 2 STIG v1.0.0 L3Unix

SYSTEM AND COMMUNICATIONS PROTECTION

1.5.6 Ensure NIST FIPS-validated cryptography is configured - grubCIS Amazon Linux 2 STIG v1.0.0 L3Unix

SYSTEM AND COMMUNICATIONS PROTECTION

1.5.6 Ensure NIST FIPS-validated cryptography is configured - installedCIS Amazon Linux 2 STIG v1.0.0 L3Unix

SYSTEM AND COMMUNICATIONS PROTECTION

1.13.2.5 Ensure 'Minimum Encryption Settings:' is set to Enabled:168CIS Microsoft Office Outlook 2013 v1.1.0 Level 1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

1.13.2.5 Ensure 'Minimum Encryption Settings:' is set to Enabled:168CIS Microsoft Office Outlook 2016 v1.1.0 Level 1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

2.4 Ensure default self-signed certificate for ESXi communication is not usedCIS VMware ESXi 6.5 v1.0.0 Level 1 Bare MetalUnix

SYSTEM AND COMMUNICATIONS PROTECTION

2.5 Ensure Non-Default, Unique Cryptographic Material is in UseCIS MariaDB 10.6 on Linux L1 v1.1.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION

2.7 Ensure expired and revoked SSL certificates are removed from the ESXi serverCIS VMware ESXi 6.5 v1.0.0 Level 1 Bare MetalUnix

SYSTEM AND COMMUNICATIONS PROTECTION

2.13 Set 'Minimum key size (in bits):' to 'Enabled:168'CIS MS Office Outlook 2010 v1.0.0Windows

SYSTEM AND COMMUNICATIONS PROTECTION

3.2 Do Not Send Cross SSL/TLS Referrer HeaderCIS Mozilla Firefox 38 ESR Linux L2 v1.0.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION

4.1 Set SSL Override BehaviorCIS Mozilla Firefox 38 ESR Linux L2 v1.0.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION

4.2.9 Ensure 'ocsp.enable' certificate revocation is set to 'true'CIS IBM WebSphere Liberty v1.0.0 L1Unix

SYSTEM AND COMMUNICATIONS PROTECTION

4.2.11 Ensure that strong algorithms are used for TLS certificates.CIS IBM WebSphere Liberty v1.0.0 L1Unix

SYSTEM AND COMMUNICATIONS PROTECTION

4.2.13 Ensure that hardware crypto cards/modules (HSM) are used to store SSL/TLS certificatesCIS IBM WebSphere Liberty v1.0.0 L2Unix

SYSTEM AND COMMUNICATIONS PROTECTION

4.2.14 Ensure SP800-131a recommendation is used for stronger cryptographic keys and more robust algorithms.CIS IBM WebSphere Liberty v1.0.0 L2Unix

SYSTEM AND COMMUNICATIONS PROTECTION

4.2.15 Ensure that the Federal Information Processing Standards (FIPS) are used for the cryptographic modulesCIS IBM WebSphere Liberty v1.0.0 L2Unix

SYSTEM AND COMMUNICATIONS PROTECTION

4.3.1 Ensure 'signatureAlgorithm' asymmetric key algorithm is set for encrypting the JSON Web TokensCIS IBM WebSphere Liberty v1.0.0 L1Unix

SYSTEM AND COMMUNICATIONS PROTECTION

4.3.4 Ensure 'disableIssChecking' issuer claim is set to 'false' in the RP (Relying Party)CIS IBM WebSphere Liberty v1.0.0 L1Unix

SYSTEM AND COMMUNICATIONS PROTECTION

4.3.6 Ensure 'signatureAlgorithm' is set to a secure algorithm in OIDC Relying Party (RP)CIS IBM WebSphere Liberty v1.0.0 L1Unix

SYSTEM AND COMMUNICATIONS PROTECTION

4.3.7 Ensure 'signatureAlgorithm' is set to a secure algorithm in OIDC Provider (OP)CIS IBM WebSphere Liberty v1.0.0 L1Unix

SYSTEM AND COMMUNICATIONS PROTECTION

4.3.8 Ensure 'httpsRequired' is set to 'true' in OIDC Relying Party (RP)CIS IBM WebSphere Liberty v1.0.0 L1Unix

SYSTEM AND COMMUNICATIONS PROTECTION

4.3.9 Ensure 'tokenEndpointAuthMethodsSupported' is set to a valid authentication method in OIDC Provider (OP)CIS IBM WebSphere Liberty v1.0.0 L1Unix

SYSTEM AND COMMUNICATIONS PROTECTION

4.3.10 Ensure 'accessTokenEncoding' is set to a strong hash algorithm in OAuth 2.0CIS IBM WebSphere Liberty v1.0.0 L1Unix

SYSTEM AND COMMUNICATIONS PROTECTION

4.3.12 Ensure 'clientSecretEncoding' is set to a strong encoding type in OAuth 2.0CIS IBM WebSphere Liberty v1.0.0 L1Unix

SYSTEM AND COMMUNICATIONS PROTECTION

4.3.13 Ensure 'httpsRequired' is set to 'true' in OAuth 2.0CIS IBM WebSphere Liberty v1.0.0 L1Unix

SYSTEM AND COMMUNICATIONS PROTECTION

4.6 Set SSL Override BehaviorCIS Mozilla Firefox 102 ESR Linux L2 v1.0.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION

6.2 Disable 'nobody' Access for RPC Encryption Key Storage ServiceCIS Solaris 11 L1 v1.1.0Unix

CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

6.2 Disable 'nobody' Access for RPC Encryption Key Storage ServiceCIS Solaris 11.1 L1 v1.0.0Unix

CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

6.2 Disable "nobody" Access for RPC Encryption Key Storage ServiceCIS Solaris 11.2 L1 v1.1.0Unix

CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

6.3 Disable 'nobody' Access for RPC Encryption Key Storage Service - Check if 'ENABLE_NOBODY_KEYS' is set to NO.CIS Solaris 10 L1 v5.2Unix

CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

6.5 Ensure 'sslProtocol' is Configured Correctly for Secure ConnectorsCIS Apache Tomcat 10.1 v1.0.0 L1Unix

SYSTEM AND COMMUNICATIONS PROTECTION

6.5 Ensure 'sslProtocol' is Configured Correctly for Secure ConnectorsCIS Apache Tomcat 10 L1 v1.1.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION

6.5 Ensure 'sslProtocol' is Configured Correctly for Secure ConnectorsCIS Apache Tomcat 10 L1 v1.1.0 MiddlewareUnix

SYSTEM AND COMMUNICATIONS PROTECTION

6.5 Ensure SSL Protocol is set to TLS for Secure Connectors - verify sslProtocol is set to TLSCIS Apache Tomcat 8 L1 v1.1.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION

7.8 Ensure node certificates are rotated as appropriateCIS Docker Community Edition v1.1.0 L2 DockerUnix

SYSTEM AND COMMUNICATIONS PROTECTION

8.2 Ensure Signing Keys are Generated with a Secure AlgorithmCIS BIND DNS v1.0.0 L2 Authoritative Name ServerUnix

SYSTEM AND COMMUNICATIONS PROTECTION

Access Security - J-Web - Use HTTPS with a valid certificate signed by a trusted CA - local-certificateJuniper Hardening JunOS 12 Devices ChecklistJuniper

SYSTEM AND COMMUNICATIONS PROTECTION

Access Security - J-Web - Use HTTPS with a valid certificate signed by a trusted CA - trusted CAJuniper Hardening JunOS 12 Devices ChecklistJuniper

SYSTEM AND COMMUNICATIONS PROTECTION

Minimum encryption settingsMSCT Microsoft 365 Apps for Enterprise 2206 v1.0.0Windows

SYSTEM AND COMMUNICATIONS PROTECTION

Minimum encryption settingsMSCT Office 2016 v1.0.0Windows

SYSTEM AND COMMUNICATIONS PROTECTION

Minimum encryption settingsMSCT M365 Apps for enterprise 2412 v1.0.0Windows

SYSTEM AND COMMUNICATIONS PROTECTION

Minimum encryption settingsMSCT Office 365 ProPlus 1908 v1.0.0Windows

SYSTEM AND COMMUNICATIONS PROTECTION

Minimum encryption settingsMSCT Microsoft 365 Apps for Enterprise 2112 v1.0.0Windows

SYSTEM AND COMMUNICATIONS PROTECTION

Minimum encryption settingsMicrosoft 365 Apps for Enterprise 2306 v1.0.0Windows

SYSTEM AND COMMUNICATIONS PROTECTION

Minimum encryption settingsMSCT M365 Apps for enterprise 2312 v1.0.0Windows

SYSTEM AND COMMUNICATIONS PROTECTION

Switch identity profileArubaOS Switch 16.x Hardening Guide v1.0.0ArubaOS

SYSTEM AND COMMUNICATIONS PROTECTION