Audits
Settings
Links
Tenable Cloud
Tenable Community & Support
Tenable University
Theme
Light
Dark
Auto
Help
Plugins
Overview
Plugins Pipeline
Newest
Updated
Search
Nessus Families
WAS Families
NNM Families
LCE Families
Tenable OT Security Families
About Plugin Families
Release Notes
Audits
Overview
Newest
Updated
Search Audit Files
Search Items
References
Authorities
Documentation
Download All Audit Files
Policies
Overview
Search
AWS Resources
Azure Resources
GCP Resources
Kubernetes Resources
Indicators
Overview
Search
Indicators of Attack
Indicators of Exposure
CVEs
Overview
Newest
Updated
Search
Attack Path Techniques
Overview
Search
Links
Tenable Cloud
Tenable Community & Support
Tenable University
Settings
Theme
Light
Dark
Auto
Detections
Plugins
Overview
Plugins Pipeline
Release Notes
Newest
Updated
Search
Nessus Families
WAS Families
NNM Families
LCE Families
Tenable OT Security Families
About Plugin Families
Audits
Overview
Newest
Updated
Search Audit Files
Search Items
References
Authorities
Documentation
Download All Audit Files
Policies
Overview
Search
AWS Resources
Azure Resources
GCP Resources
Kubernetes Resources
Indicators
Overview
Search
Indicators of Attack
Indicators of Exposure
Analytics
CVEs
Overview
Newest
Updated
Search
Attack Path Techniques
Overview
Search
Audits
References
CCI
CCI-001094
CCI
CCI|CCI-001094
Title
The information system restricts the ability of individuals to launch organization-defined denial of service attacks against other information systems.
Reference Item Details
Reference:
CCI - DISA Control Correlation Identifier
Category:
2009
Audit Items
View all Reference Audit Items
Name
Plugin
Audit Name
AMLS-L3-000230 - Arista MLS must be configured to restrict it from accepting outbound IP packets that contain an illegitimate address.
Arista
DISA STIG Arista MLS DCS-7000 Series RTR V1R2
AMLS-L3-000230 - The Arista Multilayer Switch must be configured to restrict it from accepting outbound IP packets that contain an illegitimate address in the source address field via egress filter or by enabling Unicast Reverse Path Forwarding.
Arista
DISA STIG Arista MLS DCS-7000 Series RTR v1r3
ARST-RT-000450 - The Arista perimeter router must be configured to restrict it from accepting outbound IP packets that contain an illegitimate address in the source address field via egress filter or by enabling Unicast Reverse Path Forwarding (uRPF).
Arista
DISA STIG Arista MLS EOS 4.2x Router v1r1
AS24-U1-000590 - The Apache web server must be tuned to handle the operational requirements of the hosted application.
Unix
DISA STIG Apache Server 2.4 Unix Server v2r6 Middleware
AS24-U1-000590 - The Apache web server must be tuned to handle the operational requirements of the hosted application.
Unix
DISA STIG Apache Server 2.4 Unix Server v2r7
AS24-U1-000590 - The Apache web server must be tuned to handle the operational requirements of the hosted application.
Unix
DISA STIG Apache Server 2.4 Unix Server v2r6
AS24-U1-000590 - The Apache web server must be tuned to handle the operational requirements of the hosted application.
Unix
DISA STIG Apache Server 2.4 Unix Server v2r7 Middleware
AS24-U1-000590 - The Apache web server must be tuned to handle the operational requirements of the hosted application.
Unix
DISA STIG Apache Server 2.4 Unix Server v2r3
AS24-U1-000590 - The Apache web server must be tuned to handle the operational requirements of the hosted application.
Unix
DISA STIG Apache Server 2.4 Unix Server v2r5
AS24-U1-000590 - The Apache web server must be tuned to handle the operational requirements of the hosted application.
Unix
DISA STIG Apache Server 2.4 Unix Server v2r3 Middleware
AS24-U1-000590 - The Apache web server must be tuned to handle the operational requirements of the hosted application.
Unix
DISA STIG Apache Server 2.4 Unix Server v2r5 Middleware
AS24-U2-000590 - The Apache web server must be tuned to handle the operational requirements of the hosted application.
Unix
DISA STIG Apache Server 2.4 Unix Site v2r1 Middleware
AS24-U2-000590 - The Apache web server must be tuned to handle the operational requirements of the hosted application.
Unix
DISA STIG Apache Server 2.4 Unix Site v2r4
AS24-U2-000590 - The Apache web server must be tuned to handle the operational requirements of the hosted application.
Unix
DISA STIG Apache Server 2.4 Unix Site v2r2 Middleware
AS24-U2-000590 - The Apache web server must be tuned to handle the operational requirements of the hosted application.
Unix
DISA STIG Apache Server 2.4 Unix Site v2r1
AS24-U2-000590 - The Apache web server must be tuned to handle the operational requirements of the hosted application.
Unix
DISA STIG Apache Server 2.4 Unix Site v2r3
AS24-U2-000590 - The Apache web server must be tuned to handle the operational requirements of the hosted application.
Unix
DISA STIG Apache Server 2.4 Unix Site v2r4 Middleware
AS24-U2-000590 - The Apache web server must be tuned to handle the operational requirements of the hosted application.
Unix
DISA STIG Apache Server 2.4 Unix Site v2r2
AS24-U2-000590 - The Apache web server must be tuned to handle the operational requirements of the hosted application.
Unix
DISA STIG Apache Server 2.4 Unix Site v2r3 Middleware
AS24-W1-000590 - The Apache web server must restrict the ability of users to launch denial-of-service (DoS) attacks against other information systems or networks.
Windows
DISA STIG Apache Server 2.4 Windows Server v2r3
AS24-W1-000590 - The Apache web server must restrict the ability of users to launch denial-of-service (DoS) attacks against other information systems or networks.
Windows
DISA STIG Apache Server 2.4 Windows Server v2r1
AS24-W1-000590 - The Apache web server must restrict the ability of users to launch denial-of-service (DoS) attacks against other information systems or networks.
Windows
DISA STIG Apache Server 2.4 Windows Server v2r2
AS24-W2-000830 - The Apache web server must be tuned to handle the operational requirements of the hosted application.
Windows
DISA STIG Apache Server 2.4 Windows Site v1r3
AS24-W2-000830 - The Apache web server must be tuned to handle the operational requirements of the hosted application.
Windows
DISA STIG Apache Server 2.4 Windows Site v2r1
BIND-9X-001055 - A BIND 9.x server implementation must prohibit recursion on authoritative name servers - allow-recursion
Unix
DISA BIND 9.x STIG v2r2
BIND-9X-001055 - A BIND 9.x server implementation must prohibit recursion on authoritative name servers - allow-recursion
Unix
DISA BIND 9.x STIG v1r9
BIND-9X-001055 - A BIND 9.x server implementation must prohibit recursion on authoritative name servers - options allow-query
Unix
DISA BIND 9.x STIG v2r2
BIND-9X-001055 - A BIND 9.x server implementation must prohibit recursion on authoritative name servers - options allow-query
Unix
DISA BIND 9.x STIG v1r9
BIND-9X-001055 - A BIND 9.x server implementation must prohibit recursion on authoritative name servers - recursion
Unix
DISA BIND 9.x STIG v1r9
BIND-9X-001055 - A BIND 9.x server implementation must prohibit recursion on authoritative name servers - recursion
Unix
DISA BIND 9.x STIG v2r2
BIND-9X-001055 - A BIND 9.x server implementation must prohibit recursion on authoritative name servers - zone allow-query
Unix
DISA BIND 9.x STIG v2r2
BIND-9X-001055 - A BIND 9.x server implementation must prohibit recursion on authoritative name servers - zone allow-query
Unix
DISA BIND 9.x STIG v1r9
BIND-9X-001055 - A BIND 9.x server implementation must prohibit recursion on authoritative name servers.
Unix
DISA BIND 9.x STIG v2r3
BIND-9X-001080 - A BIND 9.x implementation configured as a caching name server must restrict recursive queries to only the IP addresses and IP address ranges of known supported clients - allow-query
Unix
DISA BIND 9.x STIG v1r9
BIND-9X-001080 - A BIND 9.x implementation configured as a caching name server must restrict recursive queries to only the IP addresses and IP address ranges of known supported clients - allow-query
Unix
DISA BIND 9.x STIG v2r2
BIND-9X-001080 - A BIND 9.x implementation configured as a caching name server must restrict recursive queries to only the IP addresses and IP address ranges of known supported clients - allow-recursion
Unix
DISA BIND 9.x STIG v2r2
BIND-9X-001080 - A BIND 9.x implementation configured as a caching name server must restrict recursive queries to only the IP addresses and IP address ranges of known supported clients - allow-recursion
Unix
DISA BIND 9.x STIG v1r9
BIND-9X-001080 - A BIND 9.x implementation configured as a caching name server must restrict recursive queries to only the IP addresses and IP address ranges of known supported clients.
Unix
DISA BIND 9.x STIG v2r3
CISC-RT-000310 - The Cisco perimeter router must be configured to restrict it from accepting outbound IP packets that contain an illegitimate address in the source address field via egress filter or by enabling Unicast Reverse Path Forwarding (uRPF).
Cisco
DISA STIG Cisco IOS Router RTR v2r1
CISC-RT-000310 - The Cisco perimeter router must be configured to restrict it from accepting outbound IP packets that contain an illegitimate address in the source address field via egress filter or by enabling Unicast Reverse Path Forwarding (uRPF).
Cisco
DISA STIG Cisco IOS XE Router RTR v2r4
CISC-RT-000310 - The Cisco perimeter router must be configured to restrict it from accepting outbound IP packets that contain an illegitimate address in the source address field via egress filter or by enabling Unicast Reverse Path Forwarding (uRPF).
Cisco
DISA STIG Cisco IOS-XR Router RTR v2r3
CISC-RT-000310 - The Cisco perimeter router must be configured to restrict it from accepting outbound IP packets that contain an illegitimate address in the source address field via egress filter or by enabling Unicast Reverse Path Forwarding (uRPF).
Cisco
DISA STIG Cisco IOS XE Router RTR v2r6
CISC-RT-000310 - The Cisco perimeter router must be configured to restrict it from accepting outbound IP packets that contain an illegitimate address in the source address field via egress filter or by enabling Unicast Reverse Path Forwarding (uRPF).
Cisco
DISA STIG Cisco IOS-XR Router RTR v2r4
CISC-RT-000310 - The Cisco perimeter router must be configured to restrict it from accepting outbound IP packets that contain an illegitimate address in the source address field via egress filter or by enabling Unicast Reverse Path Forwarding (uRPF).
Cisco
DISA STIG Cisco IOS-XR Router RTR v2r2
CISC-RT-000310 - The Cisco perimeter router must be configured to restrict it from accepting outbound IP packets that contain an illegitimate address in the source address field via egress filter or by enabling Unicast Reverse Path Forwarding (uRPF).
Cisco
DISA STIG Cisco IOS Router RTR v1r4
CISC-RT-000310 - The Cisco perimeter router must be configured to restrict it from accepting outbound IP packets that contain an illegitimate address in the source address field via egress filter or by enabling Unicast Reverse Path Forwarding (uRPF).
Cisco
DISA STIG Cisco IOS XE Router RTR v2r1
CISC-RT-000310 - The Cisco perimeter router must be configured to restrict it from accepting outbound IP packets that contain an illegitimate address in the source address field via egress filter or by enabling Unicast Reverse Path Forwarding (uRPF).
Cisco
DISA STIG Cisco IOS XE Router RTR v2r3
CISC-RT-000310 - The Cisco perimeter router must be configured to restrict it from accepting outbound IP packets that contain an illegitimate address in the source address field via egress filter or by enabling Unicast Reverse Path Forwarding (uRPF).
Cisco
DISA STIG Cisco IOS XE Router RTR v2r9
CISC-RT-000310 - The Cisco perimeter router must be configured to restrict it from accepting outbound IP packets that contain an illegitimate address in the source address field via egress filter or by enabling Unicast Reverse Path Forwarding (uRPF).
Cisco
DISA STIG Cisco IOS Router RTR v2r4
CISC-RT-000310 - The Cisco perimeter router must be configured to restrict it from accepting outbound IP packets that contain an illegitimate address in the source address field via egress filter or by enabling Unicast Reverse Path Forwarding (uRPF).
Cisco
DISA STIG Cisco IOS XE Router RTR v2r2