Item Search

NameAudit NamePluginCategory
AIX7-00-002110 - AIX must setup SSH daemon to disable revoked public keys.DISA STIG AIX 7.x v3r1Unix

IDENTIFICATION AND AUTHENTICATION

ALMA-09-039070 - AlmaLinux OS 9, for PKI-based authentication, must validate certificates by constructing a certification path (which includes status information) to an accepted trust anchor.DISA CloudLinux AlmaLinux OS 9 STIG v1r2Unix

IDENTIFICATION AND AUTHENTICATION

AOSX-13-000750 - The macOS system must issue or obtain public key certificates under an appropriate certificate policy from an approved service provider.DISA STIG Apple Mac OSX 10.13 v2r5Unix

IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

AOSX-14-003001 - The macOS system must issue or obtain public key certificates under an appropriate certificate policy from an approved service provider.DISA STIG Apple Mac OSX 10.14 v2r6Unix

IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

AOSX-14-003002 - The macOS system must enable certificate for smartcards.DISA STIG Apple Mac OSX 10.14 v2r6Unix

IDENTIFICATION AND AUTHENTICATION

AS24-U2-000380 - The Apache web server must perform RFC 5280-compliant certification path validation.DISA STIG Apache Server 2.4 Unix Site v2r6Unix

IDENTIFICATION AND AUTHENTICATION

AS24-U2-000380 - The Apache web server must perform RFC 5280-compliant certification path validation.DISA STIG Apache Server 2.4 Unix Site v2r6 MiddlewareUnix

IDENTIFICATION AND AUTHENTICATION

AS24-W2-000390 - Only authenticated system administrators or the designated PKI Sponsor for the Apache web server must have access to the Apache web servers private key.DISA STIG Apache Server 2.4 Windows Site v2r2Windows

IDENTIFICATION AND AUTHENTICATION

Big Sur - Disable Password Authentication for SSHNIST macOS Big Sur v1.4.0 - All ProfilesUnix

IDENTIFICATION AND AUTHENTICATION, MAINTENANCE

BIND-9X-001111 - The TSIG keys used with the BIND 9.x implementation must be group owned by a privileged account.DISA BIND 9.x STIG v2r3Unix

IDENTIFICATION AND AUTHENTICATION

Catalina - Disable Password Authentication for SSHNIST macOS Catalina v1.5.0 - All ProfilesUnix

IDENTIFICATION AND AUTHENTICATION, MAINTENANCE

DKER-EE-002410 - Docker Enterprise secret management commands must be used for managing secrets in a Swarm cluster.DISA STIG Docker Enterprise 2.x Linux/Unix v2r2Unix

IDENTIFICATION AND AUTHENTICATION

EP11-00-004500 - The EDB Postgres Advanced Server, when utilizing PKI-based authentication, must validate certificates by performing RFC 5280-compliant certification path validation.EDB PostgreSQL Advanced Server v11 Windows OS Audit v2r4Windows

IDENTIFICATION AND AUTHENTICATION

GEN005523 - The SSH private host key files must have mode 0600 or less permissive.DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

IIST-SV-000129 - The IIS 10.0 web server must perform RFC 5280-compliant certification path validation.DISA IIS 10.0 Server v2r10Windows

IDENTIFICATION AND AUTHENTICATION

IISW-SV-000129 - The IIS 8.5 web server must perform RFC 5280-compliant certification path validation.DISA IIS 8.5 Server v2r7Windows

IDENTIFICATION AND AUTHENTICATION

JBOS-AS-000320 - The JBoss server must be configured to restrict access to the web servers private key to authenticated system administrators.DISA JBoss EAP 6.3 STIG v2r6Unix

IDENTIFICATION AND AUTHENTICATION

JRE8-WN-000150 - Oracle JRE 8 must enable the dialog to enable users to check publisher certificates for revocation - deployment.security.validation.crl.lockedDISA STIG Oracle JRE 8 Windows v2r1Windows

IDENTIFICATION AND AUTHENTICATION

JRE8-WN-000160 - Oracle JRE 8 must lock the option to enable users to check publisher certificates for revocation - eployment.security.revocation.check.lockedDISA STIG Oracle JRE 8 Windows v2r1Windows

IDENTIFICATION AND AUTHENTICATION

MD7X-00-003900 If passwords are used for authentication, MongoDB must transmit only encrypted representations of passwords.DISA MongoDB Enterprise Advanced 7.x STIG v1r1Unix

IDENTIFICATION AND AUTHENTICATION

Monterey - Disable Password Authentication for SSHNIST macOS Monterey v1.0.0 - 800-53r5 LowUnix

IDENTIFICATION AND AUTHENTICATION, MAINTENANCE

Monterey - Disable Password Authentication for SSHNIST macOS Monterey v1.0.0 - 800-53r4 ModerateUnix

IDENTIFICATION AND AUTHENTICATION, MAINTENANCE

Monterey - Disable Password Authentication for SSHNIST macOS Monterey v1.0.0 - 800-53r5 ModerateUnix

IDENTIFICATION AND AUTHENTICATION, MAINTENANCE

Monterey - Disable Password Authentication for SSHNIST macOS Monterey v1.0.0 - All ProfilesUnix

IDENTIFICATION AND AUTHENTICATION, MAINTENANCE

Monterey - Disable Password Authentication for SSHNIST macOS Monterey v1.0.0 - 800-171Unix

IDENTIFICATION AND AUTHENTICATION, MAINTENANCE

Monterey - Disable Password Authentication for SSHNIST macOS Monterey v1.0.0 - CNSSI 1253Unix

IDENTIFICATION AND AUTHENTICATION, MAINTENANCE

Monterey - Disable Password Authentication for SSHNIST macOS Monterey v1.0.0 - 800-53r4 HighUnix

IDENTIFICATION AND AUTHENTICATION, MAINTENANCE

Monterey - Disable Password Authentication for SSHNIST macOS Monterey v1.0.0 - 800-53r4 LowUnix

IDENTIFICATION AND AUTHENTICATION, MAINTENANCE

Monterey - Disable Password Authentication for SSHNIST macOS Monterey v1.0.0 - 800-53r5 HighUnix

IDENTIFICATION AND AUTHENTICATION, MAINTENANCE

O112-C2-015300 - The DBMS, when utilizing PKI-based authentication, must validate certificates by constructing a certification path with status information to an accepted trust anchor.DISA STIG Oracle 11.2g v2r5 WindowsWindows

IDENTIFICATION AND AUTHENTICATION

O121-C1-015400 - The DBMS, when using PKI-based authentication, must enforce authorized access to the corresponding private key.DISA STIG Oracle 12c v3r4 LinuxUnix

IDENTIFICATION AND AUTHENTICATION

O121-C2-015300 - The DBMS, when utilizing PKI-based authentication, must validate certificates by constructing a certification path with status information to an accepted trust anchor.DISA STIG Oracle 12c v3r4 DatabaseOracleDB

IDENTIFICATION AND AUTHENTICATION

OH12-1X-000248 - OHS must have the SSLVerifyClient directive set within each SSL-enabled VirtualHost directive to perform RFC 5280-compliant certification path validation.DISA STIG Oracle HTTP Server 12.1.3 v2r3Unix

IDENTIFICATION AND AUTHENTICATION

OH12-1X-000249 - OHS must have the SSLCARevocationFile and SSLCRLCheck directives within each SSL-enabled VirtualHost directive set to perform RFC 5280-compliant certification path validation when using single certification revocation - SSLCRLCheckDISA STIG Oracle HTTP Server 12.1.3 v2r3Unix

IDENTIFICATION AND AUTHENTICATION

OH12-1X-000250 - OHS must have SSLCARevocationPath and SSLCRLCheck directives within each SSL-enabled VirtualHost directive set to perform RFC 5280-compliant certification path validation when using multiple certification revocation - SSLCARevocationPathDISA STIG Oracle HTTP Server 12.1.3 v2r3Unix

IDENTIFICATION AND AUTHENTICATION

TCAT-AS-000700 - DOD root CA certificates must be installed in Tomcat trust store.DISA STIG Apache Tomcat Application Server 9 v3r2 MiddlewareUnix

IDENTIFICATION AND AUTHENTICATION

TCAT-AS-000710 - Keystore file must be protected.DISA STIG Apache Tomcat Application Server 9 v3r2 MiddlewareUnix

IDENTIFICATION AND AUTHENTICATION

UBTU-18-010426 - The Ubuntu operating system must map the authenticated identity to the user or group account for PKI-based authentication.DISA STIG Ubuntu 18.04 LTS v2r15Unix

IDENTIFICATION AND AUTHENTICATION

WBLC-05-000172 - Oracle WebLogic, when utilizing PKI-based authentication, must validate certificates by constructing a certification path with status information to an accepted trust anchor - Secure Listen PortOracle WebLogic Server 12c Linux v2r2Unix

IDENTIFICATION AND AUTHENTICATION

WBLC-05-000172 - Oracle WebLogic, when utilizing PKI-based authentication, must validate certificates by constructing a certification path with status information to an accepted trust anchor - Unsecure Listen PortOracle WebLogic Server 12c Linux v2r2 MiddlewareUnix

IDENTIFICATION AND AUTHENTICATION

WBLC-05-000174 - Oracle WebLogic must map the PKI-based authentication identity to the user account.Oracle WebLogic Server 12c Windows v2r2Windows

IDENTIFICATION AND AUTHENTICATION

WBLC-05-000174 - Oracle WebLogic must map the PKI-based authentication identity to the user account.Oracle WebLogic Server 12c Linux v2r2Unix

IDENTIFICATION AND AUTHENTICATION

WBLC-05-000174 - Oracle WebLogic must map the PKI-based authentication identity to the user account.Oracle WebLogic Server 12c Linux v2r2 MiddlewareUnix

IDENTIFICATION AND AUTHENTICATION

WN12-PK-000005-DC - Domain controllers must have a PKI server certificate.DISA Windows Server 2012 and 2012 R2 DC STIG v3r7Windows

IDENTIFICATION AND AUTHENTICATION

WN12-PK-000006-DC - Domain Controller PKI certificates must be issued by the DoD PKI or an approved External Certificate Authority (ECA).DISA Windows Server 2012 and 2012 R2 DC STIG v3r7Windows

IDENTIFICATION AND AUTHENTICATION

WN16-DC-000280 - Domain controllers must have a PKI server certificate.DISA Microsoft Windows Server 2016 STIG v2r10Windows

IDENTIFICATION AND AUTHENTICATION

WN19-DC-000280 - Windows Server 2019 domain controllers must have a PKI server certificate.DISA Microsoft Windows Server 2019 STIG v3r4Windows

IDENTIFICATION AND AUTHENTICATION

WN19-PK-000030 - Windows Server 2019 must have the US DoD CCEB Interoperability Root CA cross-certificates in the Untrusted Certificates Store on unclassified systems.DISA Microsoft Windows Server 2019 STIG v3r4Windows

IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

WN19-SO-000350 - Windows Server 2019 users must be required to enter a password to access private keys stored on the computer.DISA Microsoft Windows Server 2019 STIG v3r4Windows

IDENTIFICATION AND AUTHENTICATION

WN22-PK-000010 - Windows Server 2022 must have the DoD Root Certificate Authority (CA) certificates installed in the Trusted Root Store.DISA Microsoft Windows Server 2022 STIG v2r4Windows

IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION