Item Search

NameAudit NamePluginCategory
AADC-CL-001280 - Adobe Acrobat Pro DC Classic Default Handler changes must be disabled.DISA STIG Adobe Acrobat Pro DC Classic Track v2r1Windows

CONFIGURATION MANAGEMENT

AIX7-00-001018 - All system files, programs, and directories must be owned by a system account.DISA STIG AIX 7.x v3r1Unix

CONFIGURATION MANAGEMENT

AIX7-00-001019 - AIX device files and directories must only be writable by users with a system account or as configured by the vendor.DISA STIG AIX 7.x v3r1Unix

CONFIGURATION MANAGEMENT

AIX7-00-002072 - AIX system files, programs, and directories must be group-owned by a system group.DISA STIG AIX 7.x v3r1Unix

CONFIGURATION MANAGEMENT

AIX7-00-002088 - AIX library files must have mode 0755 or less permissive.DISA STIG AIX 7.x v3r1Unix

CONFIGURATION MANAGEMENT

ARDC-CL-000050 - Adobe Reader DC must disable the ability to change the Default Handler.DISA STIG Adobe Acrobat Reader DC Classic Track v2r1Windows

CONFIGURATION MANAGEMENT

ARDC-CN-000050 - Adobe Reader DC must disable the ability to change the Default Handler.DISA STIG Adobe Acrobat Reader DC Continuous Track v2r1Windows

CONFIGURATION MANAGEMENT

CISC-ND-000460 - The Cisco router must be configured to limit privileges to change the software resident within software libraries.DISA STIG Cisco IOS Router NDM v3r2Cisco

CONFIGURATION MANAGEMENT

CISC-ND-000460 - The Cisco switch must be configured to limit privileges to change the software resident within software libraries.DISA STIG Cisco IOS Switch NDM v3r2Cisco

CONFIGURATION MANAGEMENT

DB2X-00-002900 - The OS must limit privileges to change the DB2 software resident within software libraries (including privileged programs)DISA STIG IBM DB2 v10.5 LUW v2r1 OS LinuxUnix

CONFIGURATION MANAGEMENT

DB2X-00-003000 - The DB2 software installation account must be restricted to authorized users.DISA STIG IBM DB2 v10.5 LUW v2r1 DatabaseIBM_DB2DB

CONFIGURATION MANAGEMENT

DB2X-00-003300 - The role(s)/group(s) used to modify database structure (including but not necessarily limited to tables, indexes, storage, etc.) and logic modules (stored procedures, functions, triggers, links to software external to DB2, etc.) must be restricted to authorized users - s used to modify database structure and logic modules must be restricted to authorized users.DISA STIG IBM DB2 v10.5 LUW v2r1 DatabaseIBM_DB2DB

CONFIGURATION MANAGEMENT

GEN001140 - System files and directories must not have uneven access permissions - '/usr/bin/*'DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

GEN001140 - System files and directories must not have uneven access permissions - '/usr/lbin/*'DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

GEN001140 - System files and directories must not have uneven access permissions - '/usr/sbin/*'DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

JUNI-ND-000460 - The Juniper router must be configured to limit privileges to change the software resident within software libraries.DISA STIG Juniper Router NDM v3r2Juniper

CONFIGURATION MANAGEMENT

O121-C2-004000 - Administrative privileges must be assigned to database accounts via database roles.DISA STIG Oracle 12c v3r2 DatabaseOracleDB

CONFIGURATION MANAGEMENT

O121-OS-010700 - Database software, applications, and configuration files must be monitored to discover unauthorized changes.DISA STIG Oracle 12c v3r2 DatabaseOracleDB

CONFIGURATION MANAGEMENT

O121-OS-010710 - Logic modules within the database (to include packages, procedures, functions and triggers) must be monitored to discover unauthorized changes.DISA STIG Oracle 12c v3r2 DatabaseOracleDB

CONFIGURATION MANAGEMENT

O121-OS-011200 - The OS must limit privileges to change the DBMS software resident within software libraries (including privileged programs).DISA STIG Oracle 12c v3r2 WindowsWindows

CONFIGURATION MANAGEMENT

OL6-00-000045 - Library files must have mode 0755 or less permissive - '/usr/lib64'DISA STIG Oracle Linux 6 v2r7Unix

CONFIGURATION MANAGEMENT

OL6-00-000046 - Library files must be owned by a system account - '/usr/lib64'DISA STIG Oracle Linux 6 v2r7Unix

CONFIGURATION MANAGEMENT

OL6-00-000047 - All system command files must have mode 755 or less permissive - '/bin'DISA STIG Oracle Linux 6 v2r7Unix

CONFIGURATION MANAGEMENT

OL6-00-000047 - All system command files must have mode 755 or less permissive - '/sbin'DISA STIG Oracle Linux 6 v2r7Unix

CONFIGURATION MANAGEMENT

OL6-00-000047 - All system command files must have mode 755 or less permissive - '/usr/sbin'DISA STIG Oracle Linux 6 v2r7Unix

CONFIGURATION MANAGEMENT

OL6-00-000048 - All system command files must be owned by root - '/bin'DISA STIG Oracle Linux 6 v2r7Unix

CONFIGURATION MANAGEMENT

PGS9-00-000710 - PostgreSQL must limit privileges to change functions and triggers, and links to software external to PostgreSQL.DISA STIG PostgreSQL 9.x on RHEL OS v2r5Unix

CONFIGURATION MANAGEMENT

PPS9-00-003210 - EDB Postgres Advanced Server software modules, to include stored procedures, functions and triggers must be monitored to discover unauthorized changes.EDB PostgreSQL Advanced Server DB Audit v2r3PostgreSQLDB

CONFIGURATION MANAGEMENT

RHEL-06-000047 - All system command files must have mode 755 or less permissive - '/sbin/*'DISA Red Hat Enterprise Linux 6 STIG v2r2Unix

CONFIGURATION MANAGEMENT

RHEL-06-000047 - All system command files must have mode 755 or less permissive - '/usr/local/bin/*'DISA Red Hat Enterprise Linux 6 STIG v2r2Unix

CONFIGURATION MANAGEMENT

RHEL-06-000047 - All system command files must have mode 755 or less permissive - '/usr/sbin/*'DISA Red Hat Enterprise Linux 6 STIG v2r2Unix

CONFIGURATION MANAGEMENT

SQL4-00-014900 - SQL Server must be monitored to discover unauthorized changes to functions.DISA STIG SQL Server 2014 Database Audit v1r7MS_SQLDB

CONFIGURATION MANAGEMENT

SQL4-00-015100 - SQL Server must be monitored to discover unauthorized changes to triggers.DISA STIG SQL Server 2014 Database Audit v1r7MS_SQLDB

CONFIGURATION MANAGEMENT

SQL4-00-015350 - Software, applications, and configuration files that are part of, or related to, the SQL Server installation must be monitored to discover unauthorized changes.DISA STIG SQL Server 2014 Instance OS Audit v2r4Windows

CONFIGURATION MANAGEMENT

SQL4-00-015400 - SQL Server software installation account(s) must be restricted to authorized users.DISA STIG SQL Server 2014 Instance OS Audit v2r4Windows

CONFIGURATION MANAGEMENT

SQL4-00-015500 - Database software directories, including SQL Server configuration files, must be stored in dedicated directories, separate from the host OS and other applications.DISA STIG SQL Server 2014 Instance OS Audit v2r4Windows

CONFIGURATION MANAGEMENT

SQL4-00-015600 - Database objects (including but not limited to tables, indexes, storage, stored procedures, functions, triggers, links to software external to SQL Server, etc.) must be owned by database/DBMS principals authorized for ownership.DISA STIG SQL Server 2014 Database Audit v1r7MS_SQLDB

CONFIGURATION MANAGEMENT

SQL4-00-030700 - The role(s)/group(s) used to modify database structure (including but not necessarily limited to tables, indexes, storage, etc.) and logic modules (stored procedures, functions, triggers, links to software external to SQL Server, etc.) must be restricted to authorized users - s used to modify database structure and logic modules must be restricted to authorized users.DISA STIG SQL Server 2014 Instance DB Audit v2r4MS_SQLDB

CONFIGURATION MANAGEMENT

SQL6-D0-001100 - SQL Server must limit privileges to change software modules, to include stored procedures, functions, and triggers.DISA STIG SQL Server 2016 Database Audit v3r2MS_SQLDB

CONFIGURATION MANAGEMENT

SQL6-D0-001400 - The role(s)/group(s) used to modify database structure (including but not necessarily limited to tables, indexes, storage, etc.) and logic modules (stored procedures, functions, triggers, links to software external to SQL Server, etc.) must be restricted to authorized users.DISA STIG SQL Server 2016 Database Audit v3r2MS_SQLDB

CONFIGURATION MANAGEMENT

TCAT-AS-000450 - Tomcat user UMASK must be set to 0027.DISA STIG Apache Tomcat Application Server 9 v3r1 MiddlewareUnix

CONFIGURATION MANAGEMENT

UBTU-16-011030 - System commands must have mode 0755 or less permissive.DISA STIG Ubuntu 16.04 LTS v2r3Unix

CONFIGURATION MANAGEMENT

UBTU-16-011050 - System commands must be group-owned by root.DISA STIG Ubuntu 16.04 LTS v2r3Unix

CONFIGURATION MANAGEMENT

UBTU-18-010137 - The Ubuntu operating system library files must be group-owned by root.DISA STIG Ubuntu 18.04 LTS v2r15Unix

CONFIGURATION MANAGEMENT

UBTU-18-010140 - The Ubuntu operating system must have directories that contain system commands set to a mode of 0755 or less permissive.DISA STIG Ubuntu 18.04 LTS v2r15Unix

CONFIGURATION MANAGEMENT

UBTU-18-010141 - The Ubuntu operating system must have system commands owned by root.DISA STIG Ubuntu 18.04 LTS v2r15Unix

CONFIGURATION MANAGEMENT

UBTU-18-010142 - The Ubuntu operating system must have directories that contain system commands owned by root.DISA STIG Ubuntu 18.04 LTS v2r15Unix

CONFIGURATION MANAGEMENT

VCENTER-000012 - The vCenter Server administrative users must have the correct roles assigned.DISA STIG VMWare ESXi vCenter 5 STIG v2r1VMware

CONFIGURATION MANAGEMENT

WBLC-03-000125 - Oracle WebLogic must limit privileges to change the software resident within software libraries (including privileged programs).Oracle WebLogic Server 12c Windows v2r2Windows

CONFIGURATION MANAGEMENT

WBLC-03-000125 - Oracle WebLogic must limit privileges to change the software resident within software libraries (including privileged programs).Oracle WebLogic Server 12c Linux v2r2Unix

CONFIGURATION MANAGEMENT