Item Search

NameAudit NamePluginCategory
CISC-RT-000391 - The Cisco perimeter router must be configured to suppress Router Advertisements on all external IPv6-enabled interfaces.DISA Cisco IOS Router RTR STIG v3r3Cisco

CONFIGURATION MANAGEMENT

O19C-00-009900 - The Oracle Listener must be configured to require administration authentication.DISA Oracle Database 19c STIG v1r1 UnixUnix

CONFIGURATION MANAGEMENT

O19C-00-010600 - Oracle Database production application and data directories must be protected from developers on shared production/development database management system (DBMS) host systems.DISA Oracle Database 19c STIG v1r1 DatabaseOracleDB

CONFIGURATION MANAGEMENT

O19C-00-011700 - Network client connections must be restricted to supported versions.DISA Oracle Database 19c STIG v1r1 UnixUnix

CONFIGURATION MANAGEMENT

O19C-00-011700 - Network client connections must be restricted to supported versions.DISA Oracle Database 19c STIG v1r1 WindowsWindows

CONFIGURATION MANAGEMENT

O19C-00-012000 - Oracle Database must provide a mechanism to automatically identify accounts designated as temporary or emergency accounts.DISA Oracle Database 19c STIG v1r1 DatabaseOracleDB

CONFIGURATION MANAGEMENT

O19C-00-012300 - Oracle Database must verify account lockouts persist until reset by an administrator.DISA Oracle Database 19c STIG v1r1 DatabaseOracleDB

CONFIGURATION MANAGEMENT

O19C-00-012500 - Oracle Database must disable user accounts after 35 days of inactivity.DISA Oracle Database 19c STIG v1r1 DatabaseOracleDB

CONFIGURATION MANAGEMENT

OL08-00-010382 - OL 8 must restrict privilege elevation to authorized personnel.DISA Oracle Linux 8 STIG v2r4Unix

CONFIGURATION MANAGEMENT

OL08-00-010470 - There must be no ".shosts" files on the OL 8 operating system.DISA Oracle Linux 8 STIG v2r4Unix

CONFIGURATION MANAGEMENT

RHEL-08-010544 - RHEL 8 must use a separate file system for /var/tmp.DISA Red Hat Enterprise Linux 8 STIG v2r3Unix

CONFIGURATION MANAGEMENT

RHEL-08-010620 - RHEL 8 must prevent files with the setuid and setgid bit set from being executed on file systems that are used with removable media.DISA Red Hat Enterprise Linux 8 STIG v2r3Unix

CONFIGURATION MANAGEMENT

RHEL-08-010640 - RHEL 8 must prevent special devices on file systems that are imported via Network File System (NFS).DISA Red Hat Enterprise Linux 8 STIG v2r3Unix

CONFIGURATION MANAGEMENT

RHEL-08-010660 - Local RHEL 8 initialization files must not execute world-writable programs.DISA Red Hat Enterprise Linux 8 STIG v2r3Unix

CONFIGURATION MANAGEMENT

RHEL-08-010670 - RHEL 8 must disable kernel dumps unless needed.DISA Red Hat Enterprise Linux 8 STIG v2r3Unix

CONFIGURATION MANAGEMENT

RHEL-08-010675 - RHEL 8 must disable core dump backtraces.DISA Red Hat Enterprise Linux 8 STIG v2r3Unix

CONFIGURATION MANAGEMENT

RHEL-08-010680 - For RHEL 8 systems using Domain Name Servers (DNS) resolution, at least two name servers must be configured.DISA Red Hat Enterprise Linux 8 STIG v2r3Unix

CONFIGURATION MANAGEMENT

RHEL-08-010700 - All RHEL 8 world-writable directories must be owned by root, sys, bin, or an application user.DISA Red Hat Enterprise Linux 8 STIG v2r3Unix

CONFIGURATION MANAGEMENT

RHEL-08-010720 - All RHEL 8 local interactive users must have a home directory assigned in the /etc/passwd file.DISA Red Hat Enterprise Linux 8 STIG v2r3Unix

CONFIGURATION MANAGEMENT

RHEL-08-010730 - All RHEL 8 local interactive user home directories must have mode 0750 or less permissive.DISA Red Hat Enterprise Linux 8 STIG v2r3Unix

CONFIGURATION MANAGEMENT

RHEL-08-010770 - All RHEL 8 local initialization files must have mode 0740 or less permissive.DISA Red Hat Enterprise Linux 8 STIG v2r3Unix

CONFIGURATION MANAGEMENT

RHEL-08-010790 - All RHEL 8 local files and directories must have a valid group owner.DISA Red Hat Enterprise Linux 8 STIG v2r3Unix

CONFIGURATION MANAGEMENT

RHEL-08-010800 - A separate RHEL 8 filesystem must be used for user home directories (such as /home or an equivalent).DISA Red Hat Enterprise Linux 8 STIG v2r3Unix

CONFIGURATION MANAGEMENT

RHEL-08-020310 - RHEL 8 must enforce a delay of at least four seconds between logon prompts following a failed logon attempt.DISA Red Hat Enterprise Linux 8 STIG v2r3Unix

CONFIGURATION MANAGEMENT

RHEL-08-020351 - RHEL 8 must define default permissions for all authenticated users in such a way that the user can only read and modify their own files.DISA Red Hat Enterprise Linux 8 STIG v2r3Unix

CONFIGURATION MANAGEMENT

RHEL-08-020352 - RHEL 8 must set the umask value to 077 for all local interactive user accounts.DISA Red Hat Enterprise Linux 8 STIG v2r3Unix

CONFIGURATION MANAGEMENT

RHEL-08-040172 - The systemd Ctrl-Alt-Delete burst key sequence in RHEL 8 must be disabled.DISA Red Hat Enterprise Linux 8 STIG v2r3Unix

CONFIGURATION MANAGEMENT

RHEL-08-040200 - The root account must be the only account having unrestricted access to the RHEL 8 system.DISA Red Hat Enterprise Linux 8 STIG v2r3Unix

CONFIGURATION MANAGEMENT

RHEL-08-040209 - RHEL 8 must prevent IPv4 Internet Control Message Protocol (ICMP) redirect messages from being accepted.DISA Red Hat Enterprise Linux 8 STIG v2r3Unix

CONFIGURATION MANAGEMENT

RHEL-08-040280 - RHEL 8 must ignore IPv6 Internet Control Message Protocol (ICMP) redirect messages.DISA Red Hat Enterprise Linux 8 STIG v2r3Unix

CONFIGURATION MANAGEMENT

RHEL-08-040281 - RHEL 8 must disable access to network bpf syscall from unprivileged processes.DISA Red Hat Enterprise Linux 8 STIG v2r3Unix

CONFIGURATION MANAGEMENT

RHEL-08-040285 - RHEL 8 must use reverse path filtering on all IPv4 interfaces.DISA Red Hat Enterprise Linux 8 STIG v2r3Unix

CONFIGURATION MANAGEMENT

RHEL-08-040340 - RHEL 8 remote X connections for interactive users must be disabled unless to fulfill documented and validated mission requirements.DISA Red Hat Enterprise Linux 8 STIG v2r3Unix

CONFIGURATION MANAGEMENT

RHEL-08-040350 - If the Trivial File Transfer Protocol (TFTP) server is required, the RHEL 8 TFTP daemon must be configured to operate in secure mode.DISA Red Hat Enterprise Linux 8 STIG v2r3Unix

CONFIGURATION MANAGEMENT

RHEL-08-040390 - The tuned package must not be installed unless mission essential on RHEL 8.DISA Red Hat Enterprise Linux 8 STIG v2r3Unix

CONFIGURATION MANAGEMENT

SLES-15-020099 - The SUSE operating system must specify the default "include" directory for the /etc/sudoers file.DISA SUSE Linux Enterprise Server 15 STIG v2r4Unix

CONFIGURATION MANAGEMENT

SLES-15-020290 - The SUSE operating system must prevent the use of dictionary words for passwords.DISA SUSE Linux Enterprise Server 15 STIG v2r4Unix

CONFIGURATION MANAGEMENT

SLES-15-030810 - The SUSE operating system must use a separate file system for the system audit data path.DISA SUSE Linux Enterprise Server 15 STIG v2r4Unix

CONFIGURATION MANAGEMENT

SLES-15-040030 - There must be no shosts.equiv files on the SUSE operating system.DISA SUSE Linux Enterprise Server 15 STIG v2r4Unix

CONFIGURATION MANAGEMENT

SLES-15-040060 - The SUSE operating system must disable the x86 Ctrl-Alt-Delete key sequence.DISA SUSE Linux Enterprise Server 15 STIG v2r4Unix

CONFIGURATION MANAGEMENT

SLES-15-040090 - All SUSE operating system local interactive user home directories must have mode 0750 or less permissive.DISA SUSE Linux Enterprise Server 15 STIG v2r4Unix

CONFIGURATION MANAGEMENT

SLES-15-040100 - All SUSE operating system local interactive user home directories must be group-owned by the home directory owner's primary group.DISA SUSE Linux Enterprise Server 15 STIG v2r4Unix

CONFIGURATION MANAGEMENT

SLES-15-040120 - All SUSE operating system local interactive user initialization files executable search paths must contain only paths that resolve to the users home directory.DISA SUSE Linux Enterprise Server 15 STIG v2r4Unix

CONFIGURATION MANAGEMENT

SLES-15-040140 - SUSE operating system file systems that contain user home directories must be mounted to prevent files with the setuid and setgid bit set from being executed.DISA SUSE Linux Enterprise Server 15 STIG v2r4Unix

CONFIGURATION MANAGEMENT

SLES-15-040170 - SUSE operating system file systems that are being imported via Network File System (NFS) must be mounted to prevent binary files from being executed.DISA SUSE Linux Enterprise Server 15 STIG v2r4Unix

CONFIGURATION MANAGEMENT

SLES-15-040220 - The SUSE operating system must be configured to not overwrite Pluggable Authentication Modules (PAM) configuration on package changes.DISA SUSE Linux Enterprise Server 15 STIG v2r4Unix

CONFIGURATION MANAGEMENT

SLES-15-040250 - The SUSE operating system SSH daemon private host key files must have mode 0640 or less permissive.DISA SUSE Linux Enterprise Server 15 STIG v2r4Unix

CONFIGURATION MANAGEMENT

SLES-15-040260 - The SUSE operating system SSH daemon must perform strict mode checking of home directory configuration files.DISA SUSE Linux Enterprise Server 15 STIG v2r4Unix

CONFIGURATION MANAGEMENT

SLES-15-040290 - The SUSE operating system SSH daemon must disable forwarded remote X connections for interactive users, unless to fulfill documented and validated mission requirements.DISA SUSE Linux Enterprise Server 15 STIG v2r4Unix

CONFIGURATION MANAGEMENT

SLES-15-040341 - The SUSE operating system must prevent Internet Protocol version 6 (IPv6) Internet Control Message Protocol (ICMP) redirect messages from being accepted.DISA SUSE Linux Enterprise Server 15 STIG v2r4Unix

CONFIGURATION MANAGEMENT