Item Search

NameAudit NamePluginCategory
1.2.4 Ensure valid certificate is set for browser-based administrator interface - Certificate ProfilesCIS Palo Alto Firewall 6 Benchmark L2 v1.0.0Palo_Alto

SYSTEM AND COMMUNICATIONS PROTECTION

1.2.4 Ensure valid certificate is set for browser-based administrator interface - Certificate ProfilesCIS Palo Alto Firewall 7 Benchmark L2 v1.0.0Palo_Alto

SYSTEM AND COMMUNICATIONS PROTECTION

1.2.4 Ensure valid certificate is set for browser-based administrator interface - CertificatesCIS Palo Alto Firewall 7 Benchmark L2 v1.0.0Palo_Alto

SYSTEM AND COMMUNICATIONS PROTECTION

1.2.4 Ensure valid certificate is set for browser-based administrator interface - CertificatesCIS Palo Alto Firewall 6 Benchmark L2 v1.0.0Palo_Alto

SYSTEM AND COMMUNICATIONS PROTECTION

1.6.3 Ensure that the certificate securing Remote Access VPNs is valid - CertificatesCIS Palo Alto Firewall 6 Benchmark L1 v1.0.0Palo_Alto

SYSTEM AND COMMUNICATIONS PROTECTION

1.6.3 Ensure that the certificate securing Remote Access VPNs is valid - CertificatesCIS Palo Alto Firewall 7 Benchmark L2 v1.0.0Palo_Alto

SYSTEM AND COMMUNICATIONS PROTECTION

1.6.3 Ensure that the certificate securing Remote Access VPNs is valid - CertificatesCIS Palo Alto Firewall 6 Benchmark L2 v1.0.0Palo_Alto

SYSTEM AND COMMUNICATIONS PROTECTION

1.6.3 Ensure that the certificate securing Remote Access VPNs is valid - CertificatesCIS Palo Alto Firewall 7 Benchmark L1 v1.0.0Palo_Alto

SYSTEM AND COMMUNICATIONS PROTECTION

1.6.3 Ensure that the certificate securing Remote Access VPNs is valid - GlobalProtect GatewaysCIS Palo Alto Firewall 6 Benchmark L1 v1.0.0Palo_Alto

SYSTEM AND COMMUNICATIONS PROTECTION

1.6.3 Ensure that the certificate securing Remote Access VPNs is valid - GlobalProtect GatewaysCIS Palo Alto Firewall 7 Benchmark L1 v1.0.0Palo_Alto

SYSTEM AND COMMUNICATIONS PROTECTION

1.6.3 Ensure that the certificate securing Remote Access VPNs is valid - GlobalProtect GatewaysCIS Palo Alto Firewall 6 Benchmark L2 v1.0.0Palo_Alto

SYSTEM AND COMMUNICATIONS PROTECTION

1.6.3 Ensure that the certificate securing Remote Access VPNs is valid - GlobalProtect GatewaysCIS Palo Alto Firewall 7 Benchmark L2 v1.0.0Palo_Alto

SYSTEM AND COMMUNICATIONS PROTECTION

1.6.3 Ensure that the certificate securing Remote Access VPNs is valid - GlobalProtect PortalsCIS Palo Alto Firewall 7 Benchmark L1 v1.0.0Palo_Alto

SYSTEM AND COMMUNICATIONS PROTECTION

1.6.3 Ensure that the certificate securing Remote Access VPNs is valid - GlobalProtect PortalsCIS Palo Alto Firewall 6 Benchmark L1 v1.0.0Palo_Alto

SYSTEM AND COMMUNICATIONS PROTECTION

1.6.3 Ensure that the certificate securing Remote Access VPNs is valid - GlobalProtect PortalsCIS Palo Alto Firewall 6 Benchmark L2 v1.0.0Palo_Alto

SYSTEM AND COMMUNICATIONS PROTECTION

1.6.3 Ensure that the certificate securing Remote Access VPNs is valid - GlobalProtect PortalsCIS Palo Alto Firewall 7 Benchmark L2 v1.0.0Palo_Alto

SYSTEM AND COMMUNICATIONS PROTECTION

1.10 Ensure Web Tier ELB have the latest SSL Security Policies configuredCIS Amazon Web Services Three-tier Web Architecture L1 1.0.0amazon_aws

SYSTEM AND COMMUNICATIONS PROTECTION

1.13 Ensure App Tier ELB have the latest SSL Security Policies configuredCIS Amazon Web Services Three-tier Web Architecture L2 1.0.0amazon_aws

SYSTEM AND COMMUNICATIONS PROTECTION

7.2 Ensure a Valid Trusted Certificate Is InstalledCIS Apache HTTP Server 2.2 L1 v3.5.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION

8.3 Ensure that the Certificate used for Decryption is TrustedCIS Palo Alto Firewall 7 Benchmark L2 v1.0.0Palo_Alto

SYSTEM AND COMMUNICATIONS PROTECTION

8.3 Ensure that the Certificate used for Decryption is TrustedCIS Palo Alto Firewall 6 Benchmark L2 v1.0.0Palo_Alto

SYSTEM AND COMMUNICATIONS PROTECTION

8.3 Ensure that the Certificate used for Decryption is TrustedCIS Palo Alto Firewall 6 Benchmark L1 v1.0.0Palo_Alto

SYSTEM AND COMMUNICATIONS PROTECTION

8.3 Ensure that the Certificate used for Decryption is TrustedCIS Palo Alto Firewall 7 Benchmark L1 v1.0.0Palo_Alto

SYSTEM AND COMMUNICATIONS PROTECTION

ARST-ND-000840 - The Arista network device must obtain its public key certificates from an appropriate certificate policy through an approved service provider.DISA STIG Arista MLS EOS 4.2x NDM v2r1Arista

SYSTEM AND COMMUNICATIONS PROTECTION

Big Sur - Set Smartcard Certificate Trust to HighNIST macOS Big Sur v1.4.0 - 800-53r4 HighUnix

IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

Big Sur - Set Smartcard Certificate Trust to HighNIST macOS Big Sur v1.4.0 - All ProfilesUnix

IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

Big Sur - Set Smartcard Certificate Trust to HighNIST macOS Big Sur v1.4.0 - 800-53r5 HighUnix

IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

CISC-ND-001440 - The Cisco switch must be configured to obtain its public key certificates from an appropriate certificate policy through an approved service provider - enrollmentDISA STIG Cisco IOS XE Switch NDM v1r1Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

EX13-CA-000030 - Exchange Servers must use approved DoD certificates.DISA Microsoft Exchange 2013 Client Access Server STIG v1r2Windows

SYSTEM AND COMMUNICATIONS PROTECTION

EX13-CA-000030 - Exchange Servers must use approved DoD certificates.DISA Microsoft Exchange 2013 Client Access Server STIG v1r3Windows

SYSTEM AND COMMUNICATIONS PROTECTION

EX13-EG-000010 - Exchange servers must use approved DoD certificates.DISA Microsoft Exchange 2013 Edge Transport Server STIG v1r4Windows

SYSTEM AND COMMUNICATIONS PROTECTION

EX13-MB-000010 - Exchange Servers must use approved DoD certificates.DISA Microsoft Exchange 2013 Mailbox Server STIG v1r6Windows

SYSTEM AND COMMUNICATIONS PROTECTION

F5BI-LT-000083 - The BIG-IP Core implementation must be configured to validate certificates used for TLS functions for connections to virtual servers by constructing a certification path (which includes status information) to an accepted trust anchor.DISA F5 BIG-IP Local Traffic Manager 11.x STIG v1r3F5

SYSTEM AND COMMUNICATIONS PROTECTION

GEN008000 - Certificates used to authenticate to the LDAP server must be provided from DoD-approved external PKI - 'client Key Label'DISA STIG AIX 6.1 v1r13Unix

SYSTEM AND COMMUNICATIONS PROTECTION

GEN008000 - Certificates used to authenticate to the LDAP server must be provided from DoD-approved external PKI - 'ldapsslkeyf exists'DISA STIG AIX 6.1 v1r13Unix

SYSTEM AND COMMUNICATIONS PROTECTION

GEN008020 - The LDAP TLS connection must require a certificate and this certificate has a valid path to a trusted CA - 'client Key Label'DISA STIG AIX 6.1 v1r13Unix

SYSTEM AND COMMUNICATIONS PROTECTION

GEN008020 - The LDAP TLS connection must require a certificate and this certificate has a valid path to a trusted CA - 'ldapsslkeyf exists'DISA STIG AIX 6.1 v1r13Unix

SYSTEM AND COMMUNICATIONS PROTECTION

Huawei: HTTPS Server requires SSL policyTNS Huawei VRP Best Practice AuditHuawei

SYSTEM AND COMMUNICATIONS PROTECTION

Install a trusted CA certificate on the poolTNS Citrix HypervisorUnix

SYSTEM AND COMMUNICATIONS PROTECTION

Install a trusted certificate in place of the default self-signed SSL certificateTNS Citrix HypervisorUnix

SYSTEM AND COMMUNICATIONS PROTECTION

MD3X-00-000770 - MongoDB must maintain the confidentiality and integrity of information during reception - PEMKeyFileDISA STIG MongoDB Enterprise Advanced 3.x v1r2Unix

SYSTEM AND COMMUNICATIONS PROTECTION

MD3X-00-000770 - MongoDB must maintain the confidentiality and integrity of information during reception. - PEMKeyFileDISA STIG MongoDB Enterprise Advanced 3.x v1r1Unix

SYSTEM AND COMMUNICATIONS PROTECTION

Monterey - Issue or Obtain Public Key Certificates from an Approved Service ProviderNIST macOS Monterey v1.0.0 - CNSSI 1253Unix

IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

Monterey - Issue or Obtain Public Key Certificates from an Approved Service ProviderNIST macOS Monterey v1.0.0 - 800-53r4 ModerateUnix

IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

Monterey - Issue or Obtain Public Key Certificates from an Approved Service ProviderNIST macOS Monterey v1.0.0 - 800-53r5 HighUnix

IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

Monterey - Issue or Obtain Public Key Certificates from an Approved Service ProviderNIST macOS Monterey v1.0.0 - All ProfilesUnix

IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

Monterey - Issue or Obtain Public Key Certificates from an Approved Service ProviderNIST macOS Monterey v1.0.0 - 800-53r4 HighUnix

IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

Monterey - Issue or Obtain Public Key Certificates from an Approved Service ProviderNIST macOS Monterey v1.0.0 - 800-53r5 ModerateUnix

IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

SonicWALL - Web Interface - Does not use self-signed certTNS SonicWALL v5.9SonicWALL

SYSTEM AND COMMUNICATIONS PROTECTION

WG145 IIS7 - The private web server must use an approved DoD certificate validation process.DISA IIS 7.0 Web Server v1r19Windows

SYSTEM AND COMMUNICATIONS PROTECTION