Item Search

NameAudit NamePluginCategory
GEN002825-2 - The audit system must be configured to audit the loading and unloading of dynamic kernel modules - delete_module - 'delete_module'DISA STIG for Oracle Linux 5 v2r1Unix

AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT

GEN003040 - Crontabs must be owned by root or the crontab creator - '/etc/cron.monthly/*'DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

GEN003040 - Crontabs must be owned by root or the crontab creator - '/etc/crontab'DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

GEN003050 - Crontab files must be group-owned by root, cron, or the crontab creators primary group - '/etc/cron.daily/*'DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

GEN003050 - Crontab files must be group-owned by root, cron, or the crontab creators primary group - '/etc/cron.monthly/*'DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

GEN003050 - Crontab files must be group-owned by root, cron, or the crontab creators primary group - '/etc/crontab'DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

GEN003060 - Default system accounts (with the exception of root) must not be listed in the cron.allow file or must be included in the cron.deny file, if cron.allow does not exist - 'bin'DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

GEN003060 - Default system accounts (with the exception of root) must not be listed in the cron.allow file or must be included in the cron.deny file, if cron.allow does not exist - 'daemon'DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

GEN003060 - Default system accounts (with the exception of root) must not be listed in the cron.allow file or must be included in the cron.deny file, if cron.allow does not exist - 'halt'DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

GEN003060 - Default system accounts (with the exception of root) must not be listed in the cron.allow file or must be included in the cron.deny file, if cron.allow does not exist - 'operator'DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

GEN003080 - Crontab files must have mode 0600 or less permissive, and files in cron script directories must have mode 0700 or less permissive - '/etc/crontab'DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

GEN003080 - Crontab files must have mode 0600 or less permissive, and files in cron script directories must have mode 0700 or less permissive - '/var/spool/cron/*'DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

GEN003090 - Crontab files must not have extended ACLs - '/etc/cron.d'DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

GEN003090 - Crontab files must not have extended ACLs - '/etc/cron.daily'DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

GEN003090 - Crontab files must not have extended ACLs - '/etc/cron.weekly'DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

GEN003110 - Cron and crontab directories must not have extended ACLs - '/etc/cron.weekly'DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

GEN003120 - Cron and crontab directories must be owned by root or bin - '/etc/cron.hourly'DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

GEN003120 - Cron and crontab directories must be owned by root or bin - '/etc/cron.monthly'DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

GEN003140 - Cron and crontab directories must be group-owned by root, sys, bin or cron - '/etc/cron.monthly'DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

GEN003140 - Cron and crontab directories must be group-owned by root, sys, bin or cron - '/etc/cron.weekly'DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

GEN003140 - Cron and crontab directories must be group-owned by root, sys, bin or cron - '/var/spool/cron'DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

GEN003160 - Cron logging must be implemented.DISA STIG for Oracle Linux 5 v2r1Unix

AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT

GEN003260 - The cron.deny file must be owned by root, bin, or sys.DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

GEN003270 - The cron.deny file must be group-owned by root, bin, or sys.DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

GEN003320 - Default system accounts (with the exception of root) must not be listed in the at.allow file or must be included in the at.deny file if the at.allow file does not exist - 'daemon'DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

GEN003320 - Default system accounts (with the exception of root) must not be listed in the at.allow file or must be included in the at.deny file if the at.allow file does not exist - 'news'DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

GEN003320 - Default system accounts (with the exception of root) must not be listed in the at.allow file or must be included in the at.deny file if the at.allow file does not exist - 'operator'DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

GEN003380 - The at daemon must not execute programs in, or subordinate to, world-writable directories - at daemon must not execute programs in, or subordinate to, world-writable directories.DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

GEN003430 - The at directory must be group-owned by root, bin, sys, or cron - at directory must be group-owned by root, bin, sys, or cron.DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

GEN003500 - Process core dumps must be disabled unless needed.DISA STIG for Oracle Linux 5 v2r1Unix

CONFIGURATION MANAGEMENT

GEN003510 - Kernel core dumps must be disabled unless needed - chkconfigDISA STIG for Oracle Linux 5 v2r1Unix

CONFIGURATION MANAGEMENT

GEN003581 - Network interfaces must not be configured to allow user control.DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

GEN003600 - The system must not forward IPv4 source-routed packets - 'net.ipv4.conf.all.accept_source_route'DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL

GEN003602 - The system must not process Internet Control Message Protocol (ICMP) timestamp requests - 'timestamp-reply -j DROP'DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

GEN003607 - The system must not accept source-routed IPv4 packets - 'net.ipv4.conf.all.accept_source_route'DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

GEN003608 - Proxy Address Resolution Protocol (Proxy ARP) must not be enabled on the system.DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

GEN003609 - The system must ignore IPv4 Internet Control Message Protocol (ICMP) redirect messages - 'net.ipv4.conf.default.accept_redirects'DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

GEN003611 - The system must log martian packets - 'net.ipv4.conf.default.log_martians'DISA STIG for Oracle Linux 5 v2r1Unix

AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT

GEN003612 - The system must be configured to use TCP syncookies when experiencing a TCP SYN flood.DISA STIG for Oracle Linux 5 v2r1Unix

SYSTEM AND COMMUNICATIONS PROTECTION

GEN003620 - A separate file system must be used for user home directories (such as /home or an equivalent) - such as /home or equivalent.DISA STIG for Oracle Linux 5 v2r1Unix

CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

GEN003621 - The system must use a separate file system for /var.DISA STIG for Oracle Linux 5 v2r1Unix

CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

GEN003624 - The system must use a separate file system for /tmp (or equivalent).DISA STIG for Oracle Linux 5 v2r1Unix

CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

GEN003800 - Inetd or xinetd logging/tracing must be enabled - '/etc/xinetd.conf log_on_success'DISA STIG for Oracle Linux 5 v2r1Unix

AUDIT AND ACCOUNTABILITY

GEN003830 - The rlogind service must not be running.DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL

GEN003865 - Network analysis tools must not be installed - 'tcpdump'DISA STIG for Oracle Linux 5 v2r1Unix

CONFIGURATION MANAGEMENT

GEN003865 - Network analysis tools must not be installed - 'tshark'DISA STIG for Oracle Linux 5 v2r1Unix

CONFIGURATION MANAGEMENT

GEN003920 - The hosts.lpd (or equivalent) file must be owned by root, bin, sys, or lp.DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

GEN003930 - The hosts.lpd (or equivalent) file must be group-owned by lp.DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

GEN003940 - The hosts.lpd (or equivalent) must have mode 0644 or less permissive.DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

GEN004360 - The alias file must be owned by root - '/etc/aliases.db'DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT