Item Search

NameAudit NamePluginCategory
4.510 - The system must protect against or limit the effects of Denial of Service (DoS) attacks by validating the operating system is implementing rate-limiting measures on impacted network interfaces - sysctlTenable Fedora Linux Best Practices v2.0.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION

ARST-L2-000110 - The Arista MLS layer 2 switch must have Dynamic Address Resolution Protocol (ARP) Inspection (DAI) enabled on all user VLANs.DISA STIG Arista MLS EOS 4.2x L2S v1r1Arista
ARST-RT-000490 - The Arista router must not be configured to have any zero-touch deployment feature enabled when connected to an operational network.DISA STIG Arista MLS EOS 4.2x Router v1r1Arista
ARST-RT-000540 - The Arista router must be configured to have Internet Control Message Protocol (ICMP) mask replies disabled on all external interfaces.DISA STIG Arista MLS EOS 4.2x Router v1r1Arista
Big Sur - Protect Against Denial of Service Attacks by Ensuring Rate-Limiting Measures on Network InterfacesNIST macOS Big Sur v1.4.0 - 800-53r4 LowUnix

SYSTEM AND COMMUNICATIONS PROTECTION

Big Sur - Protect Against Denial of Service Attacks by Ensuring Rate-Limiting Measures on Network InterfacesNIST macOS Big Sur v1.4.0 - 800-53r4 ModerateUnix

SYSTEM AND COMMUNICATIONS PROTECTION

Big Sur - Protect Against Denial of Service Attacks by Ensuring Rate-Limiting Measures on Network InterfacesNIST macOS Big Sur v1.4.0 - 800-53r5 LowUnix

SYSTEM AND COMMUNICATIONS PROTECTION

Big Sur - Protect Against Denial of Service Attacks by Ensuring Rate-Limiting Measures on Network InterfacesNIST macOS Big Sur v1.4.0 - 800-53r5 ModerateUnix

SYSTEM AND COMMUNICATIONS PROTECTION

Big Sur - Protect Against Denial of Service Attacks by Ensuring Rate-Limiting Measures on Network InterfacesNIST macOS Big Sur v1.4.0 - 800-53r4 HighUnix

SYSTEM AND COMMUNICATIONS PROTECTION

Big Sur - Protect Against Denial of Service Attacks by Ensuring Rate-Limiting Measures on Network InterfacesNIST macOS Big Sur v1.4.0 - 800-53r5 HighUnix

SYSTEM AND COMMUNICATIONS PROTECTION

Big Sur - Protect Against Denial of Service Attacks by Ensuring Rate-Limiting Measures on Network InterfacesNIST macOS Big Sur v1.4.0 - All ProfilesUnix

SYSTEM AND COMMUNICATIONS PROTECTION

Big Sur - Protect Against Denial of Service Attacks by Ensuring Rate-Limiting Measures on Network InterfacesNIST macOS Big Sur v1.4.0 - CNSSI 1253Unix

SYSTEM AND COMMUNICATIONS PROTECTION

CASA-ND-001180 - The Cisco ASA must be configured to protect against known types of denial-of-service (DoS) attacks by enabling the Threat Detection feature - DoS attacks by enabling the Threat Detection featureDISA STIG Cisco ASA NDM v1r6Cisco
Catalina - Protect Against Denial of Service Attacks by Ensuring Rate-Limiting Measures on Network InterfacesNIST macOS Catalina v1.5.0 - 800-53r5 ModerateUnix

SYSTEM AND COMMUNICATIONS PROTECTION

Catalina - Protect Against Denial of Service Attacks by Ensuring Rate-Limiting Measures on Network InterfacesNIST macOS Catalina v1.5.0 - 800-53r4 HighUnix

SYSTEM AND COMMUNICATIONS PROTECTION

Catalina - Protect Against Denial of Service Attacks by Ensuring Rate-Limiting Measures on Network InterfacesNIST macOS Catalina v1.5.0 - 800-53r4 LowUnix

SYSTEM AND COMMUNICATIONS PROTECTION

Catalina - Protect Against Denial of Service Attacks by Ensuring Rate-Limiting Measures on Network InterfacesNIST macOS Catalina v1.5.0 - 800-53r4 ModerateUnix

SYSTEM AND COMMUNICATIONS PROTECTION

Catalina - Protect Against Denial of Service Attacks by Ensuring Rate-Limiting Measures on Network InterfacesNIST macOS Catalina v1.5.0 - 800-53r5 HighUnix

SYSTEM AND COMMUNICATIONS PROTECTION

Catalina - Protect Against Denial of Service Attacks by Ensuring Rate-Limiting Measures on Network InterfacesNIST macOS Catalina v1.5.0 - 800-53r5 LowUnix

SYSTEM AND COMMUNICATIONS PROTECTION

Catalina - Protect Against Denial of Service Attacks by Ensuring Rate-Limiting Measures on Network InterfacesNIST macOS Catalina v1.5.0 - All ProfilesUnix

SYSTEM AND COMMUNICATIONS PROTECTION

Catalina - Protect Against Denial of Service Attacks by Ensuring Rate-Limiting Measures on Network InterfacesNIST macOS Catalina v1.5.0 - CNSSI 1253Unix

SYSTEM AND COMMUNICATIONS PROTECTION

CISC-ND-001220 - The Cisco switch must be configured to protect against known types of denial-of-service (DoS) attacks by employing organization-defined security safeguards - ip access-listDISA STIG Cisco IOS XE Switch NDM v1r1Cisco
CNTR-K8-002600 - Kubernetes API Server must configure timeouts to limit attack surface.DISA STIG Kubernetes v1r4Unix
CNTR-K8-002600 - Kubernetes API Server must configure timeouts to limit attack surface.DISA STIG Kubernetes v1r6Unix
FGFW-ND-000290 - The FortiGate device must protect against known types of denial-of-service (DoS) attacks by employing organization-defined security safeguards.DISA Fortigate Firewall NDM STIG v1r1FortiGate
FGFW-ND-000290 - The FortiGate device must protect against known types of denial-of-service (DoS) attacks by employing organization-defined security safeguards.DISA Fortigate Firewall NDM STIG v1r3FortiGate
JBOS-AS-000640 - The JBoss server, when hosting mission critical applications, must be in a high-availability (HA) cluster.DISA RedHat JBoss EAP 6.3 STIG v1r4Unix
JUEX-L2-000100 - The Juniper EX switch must be configured to enable STP Loop Protection on all non-designated STP switch ports.DISA Juniper EX Series Layer 2 Switch v1r2Juniper
JUEX-L2-000110 - The Juniper EX switch must be configured not to forward unknown unicast traffic to access interfaces.DISA Juniper EX Series Layer 2 Switch v1r2Juniper
JUEX-L2-000140 - The Juniper EX switch must be configured to enable Dynamic Address Resolution Protocol (ARP) Inspection (DAI) on all user VLANs.DISA Juniper EX Series Layer 2 Switch v1r2Juniper
JUEX-RT-000670 - The Juniper PE router must be configured to implement Internet Group Management Protocol (IGMP) or Multicast Listener Discovery (MLD) snooping for each Virtual Private LAN Services (VPLS) bridge domain.DISA Juniper EX Series Router v1r3Juniper
JUSX-IP-000018 - The Juniper Networks SRX Series Gateway IDPS must protect against or limit the effects of known and unknown types of Denial of Service (DoS) attacks by employing anomaly-based detection.DISA Juniper SRX Services Gateway IDPS v1r2Juniper
Monterey - Protect Against Denial of Service Attacks by Ensuring Rate-Limiting Measures on Network InterfacesNIST macOS Monterey v1.0.0 - 800-53r4 LowUnix

SYSTEM AND COMMUNICATIONS PROTECTION

Monterey - Protect Against Denial of Service Attacks by Ensuring Rate-Limiting Measures on Network InterfacesNIST macOS Monterey v1.0.0 - 800-53r4 HighUnix

SYSTEM AND COMMUNICATIONS PROTECTION

Monterey - Protect Against Denial of Service Attacks by Ensuring Rate-Limiting Measures on Network InterfacesNIST macOS Monterey v1.0.0 - 800-53r5 ModerateUnix

SYSTEM AND COMMUNICATIONS PROTECTION

Monterey - Protect Against Denial of Service Attacks by Ensuring Rate-Limiting Measures on Network InterfacesNIST macOS Monterey v1.0.0 - All ProfilesUnix

SYSTEM AND COMMUNICATIONS PROTECTION

Monterey - Protect Against Denial of Service Attacks by Ensuring Rate-Limiting Measures on Network InterfacesNIST macOS Monterey v1.0.0 - 800-53r5 LowUnix

SYSTEM AND COMMUNICATIONS PROTECTION

Monterey - Protect Against Denial of Service Attacks by Ensuring Rate-Limiting Measures on Network InterfacesNIST macOS Monterey v1.0.0 - 800-53r4 ModerateUnix

SYSTEM AND COMMUNICATIONS PROTECTION

Monterey - Protect Against Denial of Service Attacks by Ensuring Rate-Limiting Measures on Network InterfacesNIST macOS Monterey v1.0.0 - CNSSI 1253Unix

SYSTEM AND COMMUNICATIONS PROTECTION

Monterey - Protect Against Denial of Service Attacks by Ensuring Rate-Limiting Measures on Network InterfacesNIST macOS Monterey v1.0.0 - 800-53r5 HighUnix

SYSTEM AND COMMUNICATIONS PROTECTION

OH12-1X-000307 - OHS must be tuned to handle the operational requirements of the hosted application.DISA STIG Oracle HTTP Server 12.1.3 v1r7Unix
RHEL-08-040150 - A firewall must be able to protect against or limit the effects of Denial of Service (DoS) attacks by ensuring RHEL 8 can implement rate-limiting measures on impacted network interfaces - FirewallBackendDISA Red Hat Enterprise Linux 8 STIG v1r1Unix
RHEL-08-040150 - A firewall must be able to protect against or limit the effects of Denial of Service (DoS) attacks by ensuring RHEL 8 can implement rate-limiting measures on impacted network interfaces - nftables statusDISA Red Hat Enterprise Linux 8 STIG v1r1Unix
RHEL-08-040150 - A firewall must be able to protect against or limit the effects of Denial of Service (DoS) attacks by ensuring RHEL 8 can implement rate-limiting measures on impacted network interfaces - packageDISA Red Hat Enterprise Linux 8 STIG v1r5Unix
UBTU-20-010446 - The Ubuntu operating system must configure the uncomplicated firewall to rate-limit impacted network interfaces.DISA STIG Ubuntu 20.04 LTS v1r10Unix
UBTU-20-010446 - The Ubuntu operating system must configure the uncomplicated firewall to rate-limit impacted network interfaces.DISA STIG Ubuntu 20.04 LTS v1r4Unix
VCST-67-000029 - The Security Token Service must disable the shutdown port.DISA STIG VMware vSphere 6.7 STS Tomcat v1r1Unix
WN11-CC-000035 - The system must be configured to ignore NetBIOS name release requests except from WINS servers.DISA Windows 11 STIG v1r5Windows
WN11-CC-000220 - File Explorer heap termination on corruption must be disabled.DISA Windows 11 STIG v1r5Windows
WN22-CC-000060 - Windows Server 2022 must be configured to ignore NetBIOS name release requests except from WINS servers.DISA Windows Server 2022 STIG v1r1Windows