Audits
Settings
Links
Tenable Cloud
Tenable Community & Support
Tenable University
Theme
Light
Dark
Auto
Help
Plugins
Overview
Plugins Pipeline
Newest
Updated
Search
Nessus Families
WAS Families
NNM Families
LCE Families
Tenable OT Security Families
About Plugin Families
Release Notes
Audits
Overview
Newest
Updated
Search Audit Files
Search Items
References
Authorities
Documentation
Download All Audit Files
Indicators
Overview
Search
Indicators of Attack
Indicators of Exposure
CVEs
Overview
Newest
Updated
Search
Attack Path Techniques
Overview
Search
Links
Tenable Cloud
Tenable Community & Support
Tenable University
Settings
Theme
Light
Dark
Auto
Detections
Plugins
Overview
Plugins Pipeline
Release Notes
Newest
Updated
Search
Nessus Families
WAS Families
NNM Families
LCE Families
Tenable OT Security Families
About Plugin Families
Audits
Overview
Newest
Updated
Search Audit Files
Search Items
References
Authorities
Documentation
Download All Audit Files
Indicators
Overview
Search
Indicators of Attack
Indicators of Exposure
Analytics
CVEs
Overview
Newest
Updated
Search
Attack Path Techniques
Overview
Search
Audits
References
CCI
CCI-002314
CCI
CCI|CCI-002314
Title
Employ automated mechanisms to control remote access methods.
Reference Item Details
Reference:
CCI - DISA Control Correlation Identifier
Category:
2024
Audit Items
View all Reference Audit Items
Name
Plugin
Audit Name
3.5.3.2.3 Ensure iptables rules exist for all open ports - PPSM CLSA and vulnerability assessments.
Unix
CIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIG
5.117 - Users must be prevented from connecting using Terminal Services.
Windows
DISA Windows Vista STIG v6r41
AIOS-12-011200 - Apple iOS must implement the management setting: Disable Allow MailDrop.
MDM
MobileIron - DISA Apple iOS 12 v2r1
AIOS-12-011200 - Apple iOS must implement the management setting: Disable Allow MailDrop.
MDM
AirWatch - DISA Apple iOS 12 v2r1
AIOS-13-011200 - Apple iOS/iPadOS must implement the management setting: Disable Allow MailDrop.
MDM
AirWatch - DISA Apple iOS/iPadOS 13 v2r1
AIOS-13-011200 - Apple iOS/iPadOS must implement the management setting: Disable Allow MailDrop.
MDM
MobileIron - DISA Apple iOS/iPadOS 13 v2r1
AIOS-14-009400 - Apple iOS/iPadOS must implement the management setting: Disable Allow MailDrop.
MDM
MobileIron - DISA Apple iOS/iPadOS 14 v1r3
AIOS-14-009400 - Apple iOS/iPadOS must implement the management setting: Disable Allow MailDrop.
MDM
AirWatch - DISA Apple iOS/iPadOS 14 v1r3
AIOS-16-011000 - Apple iOS/iPadOS 16 must implement the management setting: Disable Allow MailDrop.
MDM
AirWatch - DISA Apple iOS/iPadOS 16 v2r1
AIOS-16-011000 - Apple iOS/iPadOS 16 must implement the management setting: Disable Allow MailDrop.
MDM
MobileIron - DISA Apple iOS/iPadOS 16 v2r1
AIOS-17-011000 - Apple iOS/iPadOS 17 must implement the management setting: Disable Allow MailDrop.
MDM
AirWatch - DISA Apple iOS/iPadOS 17 v2r1
AIOS-17-011000 - Apple iOS/iPadOS 17 must implement the management setting: Disable Allow MailDrop.
MDM
MobileIron - DISA Apple iOS/iPadOS 17 v2r1
AIOS-18-011000 - Apple iOS/iPadOS 18 must implement the management setting: disable Allow MailDrop.
MDM
AirWatch - DISA Apple iOS/iPadOS 18 v1r1
AIOS-18-011000 - Apple iOS/iPadOS 18 must implement the management setting: disable Allow MailDrop.
MDM
MobileIron - DISA Apple iOS/iPadOS 18 v1r1
AIX7-00-001137 - AIX must be able to control the ability of remote login for users.
Unix
DISA STIG AIX 7.x v3r1
AS24-U1-000670 - The Apache web server must restrict inbound connections from nonsecure zones.
Unix
DISA STIG Apache Server 2.4 Unix Server v3r1
AS24-U1-000670 - The Apache web server must restrict inbound connections from nonsecure zones.
Unix
DISA STIG Apache Server 2.4 Unix Server v3r1 Middleware
AS24-W1-000670 - The Apache web server must restrict inbound connections from nonsecure zones.
Windows
DISA STIG Apache Server 2.4 Windows Server v3r1
AS24-W1-000670 - The Apache web server must restrict inbound connections from nonsecure zones.
Windows
DISA STIG Apache Server 2.4 Windows Server v2r3
AS24-W2-000670 - The Apache web server must restrict inbound connections from nonsecure zones.
Windows
DISA STIG Apache Server 2.4 Windows Site v2r1
Big Sur - Control remote access methods
Unix
NIST macOS Big Sur v1.4.0 - All Profiles
Catalina - Control remote access methods
Unix
NIST macOS Catalina v1.5.0 - All Profiles
F5BI-AP-000153 - The BIG-IP APM module access policy profile must control remote access methods to virtual servers.
F5
DISA F5 BIG-IP Access Policy Manager STIG v2r3
GEN001000 - Remote consoles must be disabled or protected from unauthorized access.
Unix
DISA STIG Solaris 10 SPARC v2r4
GEN001000 - Remote consoles must be disabled or protected from unauthorized access.
Unix
DISA STIG Solaris 10 X86 v2r4
GEN008520 - The system must employ a local firewall.
Unix
DISA STIG for Oracle Linux 5 v2r1
GEN008540 - The system's local firewall must implement a deny-all, allow-by-exception policy.
Unix
DISA STIG Solaris 10 SPARC v2r4
GEN008540 - The system's local firewall must implement a deny-all, allow-by-exception policy.
Unix
DISA STIG Solaris 10 X86 v2r4
GEN008540 - The systems local firewall must implement a deny-all, allow-by-exception policy.
Unix
DISA STIG for Oracle Linux 5 v2r1
KNOX-07-005100 - The Samsung must be configured to enable authentication of hotspot connections to the device using a preshared key.
MDM
AirWatch - DISA Samsung Android 7 with Knox 2.x v1r1
KNOX-07-005100 - The Samsung must be configured to enable authentication of hotspot connections to the device using a preshared key.
MDM
MobileIron - DISA Samsung Android 7 with Knox 2.x v1r1
Monterey - Control remote access methods
Unix
NIST macOS Monterey v1.0.0 - All Profiles
OL08-00-040100 - A firewall must be installed on OL 8.
Unix
DISA Oracle Linux 8 STIG v2r2
OL08-00-040101 - A firewall must be active on OL 8.
Unix
DISA Oracle Linux 8 STIG v2r2
PHTN-67-000055 - The Photon operating system must configure sshd with a specific ListenAddress.
Unix
DISA STIG VMware vSphere 6.7 Photon OS v1r6
RHEL-08-040100 - A firewall must be installed on RHEL 8.
Unix
DISA Red Hat Enterprise Linux 8 STIG v2r1
RHEL-08-040101 - A firewall must be active on RHEL 8.
Unix
DISA Red Hat Enterprise Linux 8 STIG v2r1
RHEL-09-251010 - RHEL 9 must have the firewalld package installed.
Unix
DISA Red Hat Enterprise Linux 9 STIG v2r2
RHEL-09-251015 - The firewalld service on RHEL 9 must be active.
Unix
DISA Red Hat Enterprise Linux 9 STIG v2r2
UBTU-16-030030 - An application firewall must be installed.
Unix
DISA STIG Ubuntu 16.04 LTS v2r3
UBTU-18-010023 - The Ubuntu operating system must have an application firewall installed in order to control remote access methods.
Unix
DISA STIG Ubuntu 18.04 LTS v2r15
UBTU-18-010507 - The Ubuntu operating system must enable and run the uncomplicated firewall(ufw).
Unix
DISA STIG Ubuntu 18.04 LTS v2r15
UBTU-20-010433 - The Ubuntu operating system must have an application firewall installed in order to control remote access methods.
Unix
DISA STIG Ubuntu 20.04 LTS v2r1
UBTU-20-010434 - The Ubuntu operating system must enable and run the uncomplicated firewall(ufw).
Unix
DISA STIG Ubuntu 20.04 LTS v2r1
UBTU-22-251010 - Ubuntu 22.04 LTS must have an application firewall installed in order to control remote access methods.
Unix
DISA STIG Canonical Ubuntu 22.04 LTS v2r2
UBTU-22-251015 - Ubuntu 22.04 LTS must enable and run the Uncomplicated Firewall (ufw).
Unix
DISA STIG Canonical Ubuntu 22.04 LTS v2r2
VCFL-67-000006 - vSphere Client must be configured to enable SSL/TLS.
Unix
DISA STIG VMware vSphere 6.7 Virgo Client v1r2
VCLD-67-000003 - VAMI must use cryptography to protect the integrity of remote sessions.
Unix
DISA STIG VMware vSphere 6.7 VAMI-lighttpd v1r3
VCLD-70-000003 - VAMI must use cryptography to protect the integrity of remote sessions.
Unix
DISA STIG VMware vSphere 7.0 VAMI v1r2
VCLD-80-000004 The vCenter VAMI service must use cryptography to protect the integrity of remote sessions.
Unix
DISA VMware vSphere 8.0 vCenter Appliance Management Interface (VAMI) STIG v2r1