Item Search

NameAudit NamePluginCategory
2.4 Ensure DHCP services are disabled for untrusted interfacesCIS Cisco ASA 9.x Firewall L1 v1.1.0Cisco

CONFIGURATION MANAGEMENT, CONTINGENCY PLANNING, PLANNING, PROGRAM MANAGEMENT, SYSTEM AND SERVICES ACQUISITION, SYSTEM AND COMMUNICATIONS PROTECTION

2.5 Ensure ICMP is restricted for untrusted interfacesCIS Cisco ASA 9.x Firewall L1 v1.1.0Cisco

CONFIGURATION MANAGEMENT, CONTINGENCY PLANNING, PLANNING, PROGRAM MANAGEMENT, SYSTEM AND SERVICES ACQUISITION, SYSTEM AND COMMUNICATIONS PROTECTION

3.1 Ensure DNS services are configured correctlyCIS Cisco ASA 9.x Firewall L1 v1.1.0Cisco

CONFIGURATION MANAGEMENT, CONTINGENCY PLANNING, PLANNING, PROGRAM MANAGEMENT, SYSTEM AND SERVICES ACQUISITION, SYSTEM AND COMMUNICATIONS PROTECTION

3.1.2.1 Configure BGP to Log Neighbor ChangesCIS Cisco NX-OS v1.2.0 L1Cisco

CONFIGURATION MANAGEMENT, CONTINGENCY PLANNING, PLANNING, PROGRAM MANAGEMENT, SYSTEM AND SERVICES ACQUISITION, SYSTEM AND COMMUNICATIONS PROTECTION

3.3 Ensure packet fragments are restricted for untrusted interfacesCIS Cisco ASA 9.x Firewall L1 v1.1.0Cisco

CONFIGURATION MANAGEMENT, CONTINGENCY PLANNING, PLANNING, PROGRAM MANAGEMENT, SYSTEM AND SERVICES ACQUISITION, SYSTEM AND COMMUNICATIONS PROTECTION

3.8 Ensure 'security-level' is set to '0' for Internet-facing interfaceCIS Cisco ASA 9.x Firewall L1 v1.1.0Cisco

CONFIGURATION MANAGEMENT, CONTINGENCY PLANNING, PLANNING, PROGRAM MANAGEMENT, SYSTEM AND SERVICES ACQUISITION, SYSTEM AND COMMUNICATIONS PROTECTION

3.9 Ensure Botnet protection is enabled for untrusted interfacesCIS Cisco ASA 9.x Firewall L2 v1.1.0Cisco

CONFIGURATION MANAGEMENT, CONTINGENCY PLANNING, PLANNING, PROGRAM MANAGEMENT, SYSTEM AND SERVICES ACQUISITION, SYSTEM AND COMMUNICATIONS PROTECTION

3.9 Ensure Botnet protection is enabled for untrusted interfacesCIS Cisco Firewall v8.x L1 v4.2.0Cisco

CONFIGURATION MANAGEMENT, CONTINGENCY PLANNING, PLANNING, PROGRAM MANAGEMENT, SYSTEM AND SERVICES ACQUISITION, SYSTEM AND COMMUNICATIONS PROTECTION

ARDC-CN-000335 - Adobe Reader DC must disable periodical uploading of Adobe certificates.DISA STIG Adobe Acrobat Reader DC Continuous Track v2r1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

AS24-U1-000460 - The Apache web server must invalidate session identifiers upon hosted application user logout or other session termination.DISA STIG Apache Server 2.4 Unix Server v3r2Unix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

AS24-U1-000460 - The Apache web server must invalidate session identifiers upon hosted application user logout or other session termination.DISA STIG Apache Server 2.4 Unix Server v3r2 MiddlewareUnix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

AS24-U1-000520 - The Apache web server must generate a session ID using as much of the character set as possible to reduce the risk of brute force.DISA STIG Apache Server 2.4 Unix Server v3r2Unix

SYSTEM AND COMMUNICATIONS PROTECTION

AS24-U1-000520 - The Apache web server must generate a session ID using as much of the character set as possible to reduce the risk of brute force.DISA STIG Apache Server 2.4 Unix Server v3r2 MiddlewareUnix

SYSTEM AND COMMUNICATIONS PROTECTION

AS24-U2-000810 - The Apache web server must only accept client certificates issued by DOD PKI or DoD-approved PKI Certification Authorities (CAs) - CAs.DISA STIG Apache Server 2.4 Unix Site v2r6Unix

SYSTEM AND COMMUNICATIONS PROTECTION

AS24-W1-000480 - The Apache web server must accept only system-generated session identifiers.DISA STIG Apache Server 2.4 Windows Server v2r3Windows

SYSTEM AND COMMUNICATIONS PROTECTION

AS24-W1-000480 - The Apache web server must accept only system-generated session identifiers.DISA STIG Apache Server 2.4 Windows Server v3r3Windows

SYSTEM AND COMMUNICATIONS PROTECTION

AS24-W1-000530 - The Apache web server must generate unique session identifiers with definable entropy - SSLRandomSeed startupDISA STIG Apache Server 2.4 Windows Server v2r3Windows

SYSTEM AND COMMUNICATIONS PROTECTION

AS24-W1-000800 - The Apache web server must only accept client certificates issued by DoD PKI or DoD-approved PKI Certification Authorities (CAs).DISA STIG Apache Server 2.4 Windows Server v2r3Windows

SYSTEM AND COMMUNICATIONS PROTECTION

AS24-W2-000460 - The Apache web server must invalidate session identifiers upon hosted application user logout or other session termination.DISA STIG Apache Server 2.4 Windows Site v2r2Windows

SYSTEM AND COMMUNICATIONS PROTECTION

AS24-W2-000470 - Cookies exchanged between the Apache web server and client, such as session cookies, must have security settings that disallow cookie access outside the originating Apache web server and hosted application - Javascript setCookieDISA STIG Apache Server 2.4 Windows Site v2r2Windows

SYSTEM AND COMMUNICATIONS PROTECTION

IIST-SV-000135 - The IIS 10.0 web server must accept only system-generated session identifiers.DISA IIS 10.0 Server v3r3Windows

CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

OH12-1X-000298 - OHS must have the LoadModule ossl_module directive enabled so SSL requests can be processed with client certificates only issued by DoD PKI or DoD-approved PKI Certification Authorities (CAs).DISA STIG Oracle HTTP Server 12.1.3 v2r3Unix

SYSTEM AND COMMUNICATIONS PROTECTION

OH12-1X-000300 - OHS must have the SSLEngine, SSLProtocol, and SSLWallet directives enabled so SSL requests can be processed with client certificates only issued by DoD PKI or DoD-approved PKI Certification Authorities (CAs) - SSLEngineDISA STIG Oracle HTTP Server 12.1.3 v2r3Unix

SYSTEM AND COMMUNICATIONS PROTECTION

OH12-1X-000302 - OHS must have the SSLVerifyClient directive enabled to only accept client certificates issued by DoD PKI or DoD-approved PKI Certification Authorities (CAs).DISA STIG Oracle HTTP Server 12.1.3 v2r3Unix

SYSTEM AND COMMUNICATIONS PROTECTION

OH12-1X-000303 - OHS must use wallets that have only DoD certificate authorities defined.DISA STIG Oracle HTTP Server 12.1.3 v2r3Unix

SYSTEM AND COMMUNICATIONS PROTECTION

PGS9-00-010300 - PostgreSQL must only accept end entity certificates issued by DoD PKI or DoD-approved PKI Certification Authorities (CAs) for the establishment of all encrypted sessions.DISA STIG PostgreSQL 9.x on RHEL DB v2r5PostgreSQLDB

SYSTEM AND COMMUNICATIONS PROTECTION

SPLK-CL-000040 - Splunk Enterprise must only allow the use of DOD-approved certificate authorities for cryptographic functions.DISA STIG Splunk Enterprise 7.x for Windows v3r1 REST APISplunk

SYSTEM AND COMMUNICATIONS PROTECTION

TCAT-AS-000820 - Tomcat must be configured to limit data exposure between applications.DISA STIG Apache Tomcat Application Server 9 v3r2 MiddlewareUnix

SYSTEM AND COMMUNICATIONS PROTECTION

TCAT-AS-001430 - Certificates in the trust store must be issued/signed by an approved CA.DISA STIG Apache Tomcat Application Server 9 v3r2 MiddlewareUnix

SYSTEM AND COMMUNICATIONS PROTECTION

VCEM-70-000004 - ESX Agent Manager must protect cookies from cross-site scripting (XSS).DISA STIG VMware vSphere 7.0 EAM Tomcat v1r2Unix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

VCFL-67-000004 - vSphere Client must protect cookies from XSS.DISA STIG VMware vSphere 6.7 Virgo Client v1r2Unix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

VCLU-70-000004 - Lookup Service must protect cookies from cross-site scripting (XSS) - XSS.DISA STIG VMware vSphere 7.0 Lookup Service v1r2Unix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

VCST-67-000004 - The Security Token Service must protect cookies from XSS.DISA STIG VMware vSphere 6.7 STS Tomcat v1r3Unix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

VCST-70-000004 - The Security Token Service must protect cookies from cross-site scripting (XSS).DISA STIG VMware vSphere 7.0 STS Tomcat v1r2Unix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

WBLC-08-000224 - Oracle WebLogic must terminate user sessions upon user logout or any other organization- or policy-defined session termination events such as idle time limit exceeded.Oracle WebLogic Server 12c Linux v2r2 MiddlewareUnix

SYSTEM AND COMMUNICATIONS PROTECTION

WINPK-000003 - The DoD Interoperability Root CA cross-certificates must be installed.DISA Windows Vista STIG v6r41Windows

IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

WINPK-000004 - The US DoD CCEB Interoperability Root CA cross-certificate must be installed.DISA Windows Vista STIG v6r41Windows

IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

WN10-PK-000005 - The DoD Root CA certificates must be installed in the Trusted Root Store.DISA Microsoft Windows 10 STIG v3r4Windows

IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

WN10-PK-000015 - The DoD Interoperability Root CA cross-certificates must be installed in the Untrusted Certificates Store on unclassified systems.DISA Microsoft Windows 10 STIG v3r4Windows

IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

WN10-PK-000020 - The US DOD CCEB Interoperability Root CA cross-certificates must be installed in the Untrusted Certificates Store on unclassified systems.DISA Microsoft Windows 10 STIG v3r4Windows

IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

WN12-PK-000001 - The DoD Root CA certificates must be installed in the Trusted Root StoreDISA Windows Server 2012 and 2012 R2 DC STIG v3r7Windows

IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

WN12-PK-000001 - The DoD Root CA certificates must be installed in the Trusted Root StoreDISA Windows Server 2012 and 2012 R2 MS STIG v3r7Windows

IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

WN12-PK-000003 - The DoD Interoperability Root CA cross-certificates must be installed into the Untrusted Certificates Store on unclassified systems.DISA Windows Server 2012 and 2012 R2 DC STIG v3r7Windows

IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

WN12-PK-000003 - The DoD Interoperability Root CA cross-certificates must be installed into the Untrusted Certificates Store on unclassified systems.DISA Windows Server 2012 and 2012 R2 MS STIG v3r7Windows

IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

WN12-PK-000004 - The US DoD CCEB Interoperability Root CA cross-certificates must be installed into the Untrusted Certificates Store on unclassified systems.DISA Windows Server 2012 and 2012 R2 MS STIG v3r7Windows

IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

WN16-PK-000010 - The DoD Root CA certificates must be installed in the Trusted Root Store.DISA Microsoft Windows Server 2016 STIG v2r10Windows

IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

WN19-PK-000020 - Windows Server 2019 must have the DoD Interoperability Root Certificate Authority (CA) cross-certificates installed in the Untrusted Certificates Store on unclassified systems.DISA Microsoft Windows Server 2019 STIG v3r4Windows

IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

WN22-PK-000010 - Windows Server 2022 must have the DoD Root Certificate Authority (CA) certificates installed in the Trusted Root Store.DISA Microsoft Windows Server 2022 STIG v2r4Windows

IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

WN22-PK-000020 - Windows Server 2022 must have the DoD Interoperability Root Certificate Authority (CA) cross-certificates installed in the Untrusted Certificates Store on unclassified systems.DISA Microsoft Windows Server 2022 STIG v2r4Windows

IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

WN22-PK-000030 - Windows Server 2022 must have the US DOD CCEB Interoperability Root CA cross-certificates in the Untrusted Certificates Store on unclassified systems.DISA Microsoft Windows Server 2022 STIG v2r4Windows

IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION