Item Search

NameAudit NamePluginCategory
AIOS-12-999999 - All Apple iOS 12 installations must be removed.AirWatch - DISA Apple iOS 12 v2r1MDM

CONFIGURATION MANAGEMENT

AIOS-14-008800 - Apple iOS/iPadOS must require a valid password be successfully entered before the mobile device data is unencrypted.AirWatch - DISA Apple iOS/iPadOS 14 v1r3MDM

SYSTEM AND COMMUNICATIONS PROTECTION

AIOS-14-008800 - Apple iOS/iPadOS must require a valid password be successfully entered before the mobile device data is unencrypted.MobileIron - DISA Apple iOS/iPadOS 14 v1r3MDM

SYSTEM AND COMMUNICATIONS PROTECTION

AIOS-15-011200 - iPhone and iPad must have the latest available iOS/iPadOS operating system installed.MobileIron - DISA Apple iOS/iPadOS 14 v1r4MDM

CONFIGURATION MANAGEMENT

AIOS-17-710400 - Apple iOS/iPadOS 17 must require a valid password be successfully entered before the mobile device data is unencrypted.AirWatch - DISA Apple iOS/iPadOS 17 BYOAD v1r1MDM

SYSTEM AND COMMUNICATIONS PROTECTION

APPL-11-002070 - The macOS system must use an approved antivirus program.DISA STIG Apple macOS 11 v1r5Unix

CONFIGURATION MANAGEMENT

ARST-ND-000340 - The Arista network device must be configured to prohibit the use of all unnecessary and/or nonsecure functions, ports, protocols, and/or services.DISA STIG Arista MLS EOS 4.2x NDM v2r1Arista

CONFIGURATION MANAGEMENT

ARST-RT-000760 - The PE router providing MPLS Virtual Private Wire Service (VPWS) must be configured to have the appropriate virtual circuit identification (VC ID) for each attachment circuit.DISA STIG Arista MLS EOS 4.2x Router v2r1Arista

CONTINGENCY PLANNING

CASA-FW-000220 - The Cisco ASA must be configured to implement scanning threat detection.DISA STIG Cisco ASA FW v2r1Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

CASA-ND-001420 - The Cisco ASA must be running an operating system release that is currently supported by Cisco Systems.DISA STIG Cisco ASA NDM v2r2Cisco

SYSTEM AND SERVICES ACQUISITION

CD12-00-012300 - PostgreSQL must use NIST FIPS 140-2 or 140-3 validated cryptographic modules for cryptographic operations.DISA STIG Crunchy Data PostgreSQL OS v3r1Unix

IDENTIFICATION AND AUTHENTICATION

CNTR-K8-000290 - User-managed resources must be created in dedicated namespaces.DISA STIG Kubernetes v2r2Unix

CONFIGURATION MANAGEMENT

CNTR-K8-000320 - The Kubernetes API server must have the insecure port flag disabled.DISA STIG Kubernetes v2r2Unix

ACCESS CONTROL

DTAVSEL-003 - The McAfee VirusScan Enterprise for Linux 1.9.x/2.0.x must be configured to enable On-Access scanning.McAfee Virus Scan Enterprise for Linux 1.9x/2.0x Managed Client v1r5Unix

SYSTEM AND INFORMATION INTEGRITY

EP11-00-013300 - EDB Postgres Advanced Server v11 products must be a version supported by the vendor.EDB PostgreSQL Advanced Server v11 DB Audit v2r4PostgreSQLDB

SYSTEM AND SERVICES ACQUISITION

EPAS-00-004900 - The EDB Postgres Advanced Server must use NIST FIPS 140-2 or 140-3 validated cryptographic modules for cryptographic operations.EnterpriseDB PostgreSQL Advanced Server OS Linux v2r1Unix

IDENTIFICATION AND AUTHENTICATION

ESXI-67-000060 - The virtual switch MAC Address Change policy must be set to reject on the ESXi host.DISA STIG VMware vSphere 6.7 ESXi v1r3VMware

CONFIGURATION MANAGEMENT

ESXI-67-000999 - The version of ESXi running on the server must be a supported version.DISA STIG VMware vSphere 6.7 ESXi v1r3VMware

CONFIGURATION MANAGEMENT

FFOX-00-000002 - Firefox must be configured to allow only TLS 1.2 or above.DISA STIG Mozilla Firefox MacOS v6r6Unix

ACCESS CONTROL

FNFG-FW-000110 - The FortiGate firewall must employ filters that prevent or limit the effects of all types of commonly known denial-of-service (DoS) attacks, including flooding, packet sweeps, and unauthorized port scanning.DISA Fortigate Firewall STIG v1r3FortiGate

SYSTEM AND COMMUNICATIONS PROTECTION

GEN001100 - Root passwords must never be passed over a network in clear text form - 'ssh is running'DISA STIG AIX 5.3 v1r2Unix

IDENTIFICATION AND AUTHENTICATION

GOOG-10-999999 - All Google Android 10 installations must be removed.AirWatch - DISA Google Android 10.x v2r1MDM

CONFIGURATION MANAGEMENT

GOOG-12-999999 - All Google Android 12 installations must be removed.MobileIron - DISA Google Android 12 COBO v1r2MDM

CONFIGURATION MANAGEMENT

HONW-09-999999 - All Honeywell Android 9 installations must be removed.MobileIron - DISA Honeywell Android 9.x COBO v1r2MDM

CONFIGURATION MANAGEMENT

KNOX-07-003000 - The Samsung must be configured to enable encryption for information at rest on removable storage media.MobileIron - DISA Samsung Android 7 with Knox 2.x v1r1MDM

SYSTEM AND COMMUNICATIONS PROTECTION

Mitigating an attack using TCP profilesTenable F5 BIG-IP Best Practice AuditF5

SYSTEM AND COMMUNICATIONS PROTECTION

MOTO-09-010800 - Motorola Android Pie devices must have the latest available Motorola Android Pie operating system installed.MobileIron - DISA Motorola Android Pie.x COPE v1r2MDM

CONFIGURATION MANAGEMENT

MOTO-09-999999 - All Motorola Android 9 installations must be removed.MobileIron - DISA Motorola Android Pie.x COPE v1r2MDM

CONFIGURATION MANAGEMENT

MOTS-11-010800 - Motorola Solutions Android 11 devices must have the latest available Motorola Solutions Android 11 operating system installed.AirWatch - DISA Motorola Solutions Android 11 COBO v1r3MDM

CONFIGURATION MANAGEMENT

MSFT-11-999999 - All Microsoft Android 11 installations must be removed.AirWatch - DISA Microsoft Android 11 COPE v1r2MDM

CONFIGURATION MANAGEMENT

MSFT-11-999999 - All Microsoft Android 11 installations must be removed.MobileIron - DISA Microsoft Android 11 COPE v1r2MDM

CONFIGURATION MANAGEMENT

O19C-00-000800 - Oracle Database must integrate with an organization-level authentication/access mechanism providing account management and automation for all users, groups, roles, and any other principals.DISA Oracle Database 19c STIG v1r1 DatabaseOracleDB

ACCESS CONTROL

O19C-00-017700 - Oracle Database must employ cryptographic mechanisms preventing the unauthorized disclosure of information during transmission unless the transmitted data is otherwise protected by alternative physical measures.DISA Oracle Database 19c STIG v1r1 UnixUnix

SYSTEM AND COMMUNICATIONS PROTECTION

O19C-00-017700 - Oracle Database must employ cryptographic mechanisms preventing the unauthorized disclosure of information during transmission unless the transmitted data is otherwise protected by alternative physical measures.DISA Oracle Database 19c STIG v1r1 WindowsWindows

SYSTEM AND COMMUNICATIONS PROTECTION

SLES-15-010000 - The SUSE operating system must be a vendor-supported release.DISA SLES 15 STIG v2r2Unix

SYSTEM AND INFORMATION INTEGRITY

SLES-15-010190 - SUSE operating systems with a basic input/output system (BIOS) must require authentication upon booting into single-user and maintenance modes.DISA SLES 15 STIG v2r2Unix

ACCESS CONTROL

SLES-15-040061 - The SUSE operating system must disable the x86 Ctrl-Alt-Delete key sequence for Graphical User Interfaces.DISA SLES 15 STIG v2r2Unix

CONFIGURATION MANAGEMENT

SLES-15-040062 - The SUSE operating system must disable the systemd Ctrl-Alt-Delete burst key sequence.DISA SLES 15 STIG v2r2Unix

CONFIGURATION MANAGEMENT

SQL2-00-019600 - SQL Server databases in the classified environment, containing classified or sensitive information, must be encrypted using approved cryptography.DISA STIG SQL Server 2012 DB Instance Security v1r20MS_SQLDB

SYSTEM AND COMMUNICATIONS PROTECTION

SYMP-AG-000330 - Symantec ProxySG must be configured with a pre-established trust relationship and mechanisms with appropriate authorities that validate user account access authorizations and privileges - Domain ExistsDISA Symantec ProxySG Benchmark ALG v1r3BlueCoat

IDENTIFICATION AND AUTHENTICATION

SYMP-AG-000330 - Symantec ProxySG must be configured with a pre-established trust relationship and mechanisms with appropriate authorities that validate user account access authorizations and privileges - Domain joinedDISA Symantec ProxySG Benchmark ALG v1r3BlueCoat

IDENTIFICATION AND AUTHENTICATION

SYMP-AG-000440 - Symantec ProxySG must terminate all network connections associated with a communications session at the end of the session or terminate user sessions (nonprivileged session) after 15 minutes of inactivity.DISA Symantec ProxySG Benchmark ALG v1r3BlueCoat

SYSTEM AND COMMUNICATIONS PROTECTION

The BIG-IP Core implementation must be configured to protect against or limit the effects of known and unknown types of Denial of Service (DoS) attacks by employing pattern recognition pre-processors when providing content filtering to virtual servers.Tenable F5 BIG-IP Best Practice AuditF5

SYSTEM AND COMMUNICATIONS PROTECTION

VCPF-67-000999 - The version of Perfcharts running on the system must be a supported version.DISA STIG VMware vSphere 6.7 Perfcharts Tomcat v1r3Unix

SYSTEM AND INFORMATION INTEGRITY

VCRP-67-000999 - The version of RhttpProxy running on the system must be a supported version.DISA STIG VMware vSphere 6.7 RhttpProxy v1r3Unix

SYSTEM AND INFORMATION INTEGRITY

VMCH-65-000999 - The version of VMM running on the server must be a supported version.DISA STIG VMware vSphere Virtual Machine 6.5 v2r2VMware

CONFIGURATION MANAGEMENT

WN11-00-000031 - Windows 11 systems must use a BitLocker PIN for pre-boot authentication.DISA Microsoft Windows 11 STIG v2r3Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WN11-00-000070 - Only accounts responsible for the administration of a system must have Administrator rights on the system.DISA Microsoft Windows 11 STIG v2r3Windows

ACCESS CONTROL

WN22-MS-000010 - Windows Server 2022 must only allow administrators responsible for the member server or standalone or nondomain-joined system to have Administrator rights on the system.DISA Microsoft Windows Server 2022 STIG v2r4Windows

ACCESS CONTROL

WN22-UR-000100 - Windows Server 2022 debug programs user right must only be assigned to the Administrators group.DISA Microsoft Windows Server 2022 STIG v2r4Windows

ACCESS CONTROL