Item Search

NameAudit NamePluginCategory
1.1 Ensure the Appropriate Version/Patches for Oracle Software Is InstalledCIS Oracle Server 12c DB Unified Auditing v3.0.0OracleDB

CONFIGURATION MANAGEMENT

1.1 Ensure the Appropriate Version/Patches for Oracle Software Is InstalledCIS Oracle Server 19c DB Traditional Auditing v1.2.0OracleDB

SYSTEM AND SERVICES ACQUISITION

1.1 Ensure the Appropriate Version/Patches for Oracle Software Is InstalledCIS Oracle Server 19c DB Unified Auditing v1.2.0OracleDB

SYSTEM AND SERVICES ACQUISITION

1.1 Ensure the Appropriate Version/Patches for Oracle Software Is InstalledCIS Oracle Server 12c DB Traditional Auditing v3.0.0OracleDB

CONFIGURATION MANAGEMENT

1.1.2.11 Ensure bypass the password when joining meetings from meeting list is set to enabledCIS Zoom L2 v1.0.0Zoom

CONFIGURATION MANAGEMENT

1.3.2 Ensure mask phone number in the participant list is set to enabledCIS Zoom L2 v1.0.0Zoom

CONFIGURATION MANAGEMENT

2.1.2.2 Ensure show H.323 contacts is set to disabledCIS Zoom L2 v1.0.0Zoom

CONFIGURATION MANAGEMENT

2.1.2.3 Ensure company contacts is set to disabledCIS Zoom L2 v1.0.0Zoom

CONFIGURATION MANAGEMENT

2.23 Ensure That No Custom Subscription Administrator Roles ExistCIS Microsoft Azure Foundations v3.0.0 L1microsoft_azure

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

3.19 (L1) Host must have an accurate Exception Users listCIS VMware ESXi 8.0 v1.1.0 L1VMware

ACCESS CONTROL, MEDIA PROTECTION

5.2.5 Ensure users must re-authenticate for privilege escalationCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIGUnix

IDENTIFICATION AND AUTHENTICATION

5.4.6 Ensure users must provide password for escalationCIS Amazon Linux 2 STIG v1.0.0 L3Unix

ACCESS CONTROL

18.8.7.1.6 (BL) Ensure 'Prevent installation of devices using drivers that match these device setup classes: Also apply to matching devices that are already installed.' is set to 'True' (checked)CIS Microsoft Windows 8.1 v2.4.1 L1 BitlockerWindows

MEDIA PROTECTION, SYSTEM AND COMMUNICATIONS PROTECTION

AIOS-15-007200 - Apple iOS/iPadOS 15 must not include applications with the following characteristics: access to Siri when the device is locked.AirWatch - DISA Apple iOS/iPadOS 14 v1r4MDM

CONFIGURATION MANAGEMENT

AIOS-16-007200 - Apple iOS/iPadOS 16 must not include applications with the following characteristics: access to Siri when the device is locked.AirWatch - DISA Apple iOS/iPadOS 16 v2r1MDM

CONFIGURATION MANAGEMENT

AIOS-17-007200 - Apple iOS/iPadOS 17 must not include applications with the following characteristics: access to Siri when the device is locked.AirWatch - DISA Apple iOS/iPadOS 17 v2r1MDM

CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION

AIOS-18-007200 - Apple iOS/iPadOS 18 must not include applications with the following characteristics: access to Siri when the device is locked.AirWatch - DISA Apple iOS/iPadOS 18 v1r1MDM

IDENTIFICATION AND AUTHENTICATION

APPL-11-000015 - The macOS system must utilize an Endpoint Security Solution (ESS) and implement all DoD required modules.DISA STIG Apple macOS 11 v1r5Unix

SYSTEM AND INFORMATION INTEGRITY

APPL-11-000015 - The macOS system must utilize an Endpoint Security Solution (ESS) and implement all DoD required modules.DISA STIG Apple macOS 11 v1r8Unix

SYSTEM AND INFORMATION INTEGRITY

DB2X-00-003200 - Database objects (including but not limited to tables, indexes, storage, stored procedures, functions, triggers, links to software external to DB2, etc.) must be owned by database/DBMS principals authorized for ownershipDISA STIG IBM DB2 v10.5 LUW v2r1 DatabaseIBM_DB2DB

CONFIGURATION MANAGEMENT

DTAM148 - McAfee VirusScan Access Protection Rules Anti-Spyware Maximum Protection must be set to block and log execution of scripts from the Temp folder.DISA McAfee VirusScan 8.8 Local Client STIG v6r1Windows

SYSTEM AND INFORMATION INTEGRITY

DTAM148 - McAfee VirusScan Access Protection: Anti-Spyware Maximum Protection must be set to block and log execution of scripts from the Temp folder.DISA McAfee VirusScan 8.8 Managed Client STIG v6r1Windows

SYSTEM AND INFORMATION INTEGRITY

DTAM170 - McAfee VirusScan Access Protection Rules Anti-Spyware Maximum Protection must be set to block and report when common all programs are run from the Temp folder.DISA McAfee VirusScan 8.8 Managed Client STIG v6r1Windows

SYSTEM AND INFORMATION INTEGRITY

DTBI680 - The update check interval must be configured and set to 30 days.DISA STIG Microsoft Internet Explorer 9 v1r15Windows

SYSTEM AND INFORMATION INTEGRITY

ESXI-06-000003 - The system must verify the exception users list for lockdown mode.DISA STIG VMware vSphere 6.x ESXi v1r5VMware

CONFIGURATION MANAGEMENT

ESXI-06-000075 - The connectivity between VSAN Health Check and public Hardware Compatibility List must be disabled or restricted by use of an external proxy server.DISA STIG VMware vSphere 6.x ESXi v1r5VMware

CONFIGURATION MANAGEMENT

IIST-SI-000215 - Mappings to unused and vulnerable scripts on the IIS 10.0 website must be removed.DISA IIS 10.0 Site v2r11Windows

CONFIGURATION MANAGEMENT

IIST-SI-000216 - The IIS 10.0 website must have resource mappings set to disable the serving of certain file types.DISA IIS 10.0 Site v2r11Windows

CONFIGURATION MANAGEMENT

IISW-SI-000215 - Mappings to unused and vulnerable scripts on the IIS 8.5 website must be removed.DISA IIS 8.5 Site v2r9Windows

CONFIGURATION MANAGEMENT

JUSX-DM-000108 - The Juniper SRX Services Gateway must be configured to prohibit the use of unnecessary and/or nonsecure functions, ports, protocols, and/or services, as defined in the PPSM CAL and vulnerability assessments.DISA Juniper SRX Services Gateway NDM v3r2Juniper

CONFIGURATION MANAGEMENT

Management Access Policy - HTTPS - Cipher ConfigurationTenable Cisco ACICisco_ACI
MSFT-11-001100 - Microsoft Android 11 allow list must be configured to not include applications with the following characteristics: - Back up MD data to non-DOD cloud servers (including user and application access to cloud backup services);- Transmit MD diagnostic data to non-DOD servers;- Voice assistant application if available when MD is locked;- Voice dialing application if available when MD is locked;- Allows synchronization of data or applications between devices associated with user; and- Allows unencrypted (or encrypted but not FIPS 140-2/FIPS 140-3 validated) data sharing with other MDs or printers.AirWatch - DISA Microsoft Android 11 COPE v1r2MDM

CONFIGURATION MANAGEMENT

MSFT-11-001100 - Microsoft Android 11 allow list must be configured to not include applications with the following characteristics: - Back up MD data to non-DOD cloud servers (including user and application access to cloud backup services);- Transmit MD diagnostic data to non-DOD servers;- Voice assistant application if available when MD is locked;- Voice dialing application if available when MD is locked;- Allows synchronization of data or applications between devices associated with user; and- Allows unencrypted (or encrypted but not FIPS 140-2/FIPS 140-3 validated) data sharing with other MDs or printers.MobileIron - DISA Microsoft Android 11 COPE v1r2MDM

CONFIGURATION MANAGEMENT

SHPT-00-000435 - SharePoint must protect audit information from unauthorized modification of usage and health data collection logs.DISA STIG SharePoint 2010 v1r9Windows

AUDIT AND ACCOUNTABILITY

SHPT-00-000810 - SharePoint must identify potentially security-relevant error conditions.DISA STIG SharePoint 2010 v1r9Windows

SYSTEM AND INFORMATION INTEGRITY

SLES-15-020230 - The SUSE operating system must employ user passwords with a maximum lifetime of 60 days.DISA SLES 15 STIG v2r2Unix

IDENTIFICATION AND AUTHENTICATION

SOL-11.1-020030 - The operating system must protect audit tools from unauthorized access.DISA STIG Solaris 11 SPARC v3r1Unix

AUDIT AND ACCOUNTABILITY

SOL-11.1-020040 - The operating system must protect audit tools from unauthorized modification.DISA STIG Solaris 11 SPARC v3r1Unix

AUDIT AND ACCOUNTABILITY

SOL-11.1-020040 - The operating system must protect audit tools from unauthorized modification.DISA STIG Solaris 11 X86 v3r1Unix

AUDIT AND ACCOUNTABILITY

SOL-11.1-020050 - The operating system must protect audit tools from unauthorized deletion.DISA STIG Solaris 11 X86 v3r1Unix

AUDIT AND ACCOUNTABILITY

SOL-11.1-020080 - System packages must be configured with the vendor-provided files, permissions, and ownerships.DISA STIG Solaris 11 SPARC v3r1Unix

AUDIT AND ACCOUNTABILITY

SPLK-CL-000080 - Splunk Enterprise must use LDAPS for the LDAP connection.DISA STIG Splunk Enterprise 7.x for Windows v3r1 REST APISplunk

IDENTIFICATION AND AUTHENTICATION

SPLK-CL-000175 - Splunk Enterprise forwarders must be configured with Indexer Acknowledgement enabled.DISA STIG Splunk Enterprise 7.x for Windows v3r1 OSWindows

CONFIGURATION MANAGEMENT

vCenter : change-default-passwordVMWare vSphere 5.X Hardening GuideVMware
VCTR-67-000054 - The vCenter Server must disable or restrict the connectivity between vSAN Health Check and public Hardware Compatibility List by use of an external proxy server.DISA STIG VMware vSphere 6.7 vCenter v1r4VMware

CONFIGURATION MANAGEMENT

VCWN-06-000053 - The connectivity between VSAN Health Check and public Hardware Compatibility List must be disabled or restricted.DISA STIG VMware vSphere vCenter 6.x v1r4VMware

CONFIGURATION MANAGEMENT

VCWN-65-000054 - The vCenter Server for Windows must disable or restrict the connectivity between vSAN Health Check and public Hardware Compatibility List by use of an external proxy server.DISA STIG VMware vSphere vCenter 6.5 v2r3VMware

CONFIGURATION MANAGEMENT

VCWN-65-000060 - The vCenter Server for Windows must enable revocation checking for certificate based authentication.DISA STIG VMware vSphere vCenter 6.5 v2r3VMware

CONFIGURATION MANAGEMENT

VCWN-65-000062 - The vCenter Server for Windows must enable Login banner for vSphere web client.DISA STIG VMware vSphere vCenter 6.5 v2r3VMware

CONFIGURATION MANAGEMENT

WG204 IIS6 - A web server must not be co-hosted with other servicesDISA STIG IIS 6.0 Server v6r16Windows

CONFIGURATION MANAGEMENT