Item Search

NameAudit NamePluginCategory
ALMA-09-011240 - AlmaLinux OS 9 must disable core dumps for all users.DISA CloudLinux AlmaLinux OS 9 STIG v1r2Unix

CONFIGURATION MANAGEMENT

ALMA-09-011570 - AlmaLinux OS 9 must disable core dump backtraces.DISA CloudLinux AlmaLinux OS 9 STIG v1r2Unix

CONFIGURATION MANAGEMENT

ALMA-09-012670 - AlmaLinux OS 9 /etc/group- file must be group owned by root.DISA CloudLinux AlmaLinux OS 9 STIG v1r2Unix

CONFIGURATION MANAGEMENT

ALMA-09-013550 - AlmaLinux OS 9 must disable the ability of systemd to spawn an interactive boot process.DISA CloudLinux AlmaLinux OS 9 STIG v1r2Unix

CONFIGURATION MANAGEMENT

ALMA-09-013990 - AlmaLinux OS 9 /etc/gshadow file must be group-owned by root.DISA CloudLinux AlmaLinux OS 9 STIG v1r2Unix

CONFIGURATION MANAGEMENT

ALMA-09-014540 - All AlmaLinux OS 9 local interactive user accounts must be assigned a home directory upon creation.DISA CloudLinux AlmaLinux OS 9 STIG v1r2Unix

CONFIGURATION MANAGEMENT

ALMA-09-016080 - AlmaLinux OS 9 /etc/passwd- file must be owned by root.DISA CloudLinux AlmaLinux OS 9 STIG v1r2Unix

CONFIGURATION MANAGEMENT

ALMA-09-016300 - AlmaLinux OS 9 /etc/passwd file must be group-owned by root.DISA CloudLinux AlmaLinux OS 9 STIG v1r2Unix

CONFIGURATION MANAGEMENT

ALMA-09-017070 - AlmaLinux OS 9 /etc/shadow file must be owned by root.DISA CloudLinux AlmaLinux OS 9 STIG v1r2Unix

CONFIGURATION MANAGEMENT

ALMA-09-017290 - AlmaLinux OS 9 must restrict privilege elevation to authorized personnel.DISA CloudLinux AlmaLinux OS 9 STIG v1r2Unix

CONFIGURATION MANAGEMENT

ALMA-09-017620 - AlmaLinux OS 9 must define default permissions for all authenticated users in such a way that the user can only read and modify their own files.DISA CloudLinux AlmaLinux OS 9 STIG v1r2Unix

CONFIGURATION MANAGEMENT

ALMA-09-018060 - AlmaLinux OS 9 must be configured so that the file integrity tool verifies Access Control Lists (ACLs).DISA CloudLinux AlmaLinux OS 9 STIG v1r2Unix

CONFIGURATION MANAGEMENT

ALMA-09-018280 - AlmaLinux OS 9 must be configured so that the file integrity tool verifies extended attributes.DISA CloudLinux AlmaLinux OS 9 STIG v1r2Unix

CONFIGURATION MANAGEMENT

ALMA-09-019160 - AlmaLinux OS 9 must not enable IP packet forwarding unless the system is a router.DISA CloudLinux AlmaLinux OS 9 STIG v1r2Unix

CONFIGURATION MANAGEMENT

ALMA-09-019380 - AlmaLinux OS 9 must log packets with impossible addresses.DISA CloudLinux AlmaLinux OS 9 STIG v1r2Unix

CONFIGURATION MANAGEMENT

ALMA-09-019930 - AlmaLinux OS 9 must not send Internet Control Message Protocol (ICMP) redirects.DISA CloudLinux AlmaLinux OS 9 STIG v1r2Unix

CONFIGURATION MANAGEMENT

ALMA-09-020040 - There must be no .shosts files on AlmaLinux OS 9.DISA CloudLinux AlmaLinux OS 9 STIG v1r2Unix

CONFIGURATION MANAGEMENT

ALMA-09-020150 - There must be no shosts.equiv files on AlmaLinux OS 9.DISA CloudLinux AlmaLinux OS 9 STIG v1r2Unix

CONFIGURATION MANAGEMENT

ALMA-09-021030 - AlmaLinux OS 9 SSH public host key files must have mode 0644 or less permissive.DISA CloudLinux AlmaLinux OS 9 STIG v1r2Unix

CONFIGURATION MANAGEMENT

ALMA-09-022240 - AlmaLinux OS 9 must have the gnutls-utils package installed.DISA CloudLinux AlmaLinux OS 9 STIG v1r2Unix

CONFIGURATION MANAGEMENT

ALMA-09-022570 - AlmaLinux OS 9 must prevent a user from overriding the disable-restart-buttons setting for the graphical user interface.DISA CloudLinux AlmaLinux OS 9 STIG v1r2Unix

CONFIGURATION MANAGEMENT

ALMA-09-023120 - AlmaLinux OS 9 must prevent special devices on file systems that are imported via Network File System (NFS).DISA CloudLinux AlmaLinux OS 9 STIG v1r2Unix

CONFIGURATION MANAGEMENT

ALMA-09-023780 - AlmaLinux OS 9 must prevent special devices on nonroot local partitions.DISA CloudLinux AlmaLinux OS 9 STIG v1r2Unix

CONFIGURATION MANAGEMENT

ALMA-09-025430 - AlmaLinux OS 9 must use a separate file system for /var.DISA CloudLinux AlmaLinux OS 9 STIG v1r2Unix

CONFIGURATION MANAGEMENT

ALMA-09-025870 - AlmaLinux OS 9 must be configured so that the rsyslog daemon does not accept log messages from other servers unless the server is being used for log aggregation.DISA CloudLinux AlmaLinux OS 9 STIG v1r2Unix

CONFIGURATION MANAGEMENT

GOOG-14-009800 - Google Android 14 users must complete required training.AirWatch - DISA Google Android 14 COBO v2r2MDM

CONFIGURATION MANAGEMENT

GOOG-14-009800 - Google Android 14 users must complete required training.MobileIron - DISA Google Android 14 COPE v2r2MDM

CONFIGURATION MANAGEMENT

GOOG-14-009900 - Google Android 14 must be configured to enforce that Wi-Fi Sharing is disabled.MobileIron - DISA Google Android 14 COPE v2r2MDM

CONFIGURATION MANAGEMENT

GOOG-14-010000 - Google Android 14 must have the DOD root and intermediate PKI certificates installed.AirWatch - DISA Google Android 14 COPE v2r2MDM

CONFIGURATION MANAGEMENT

GOOG-14-010100 - The Google Android 14 work profile must be configured to prevent users from adding personal email accounts to the work email app.MobileIron - DISA Google Android 14 COPE v2r2MDM

CONFIGURATION MANAGEMENT

GOOG-14-010200 - The Google Android 14 work profile must be configured to enforce the system application disable list.AirWatch - DISA Google Android 14 COPE v2r2MDM

CONFIGURATION MANAGEMENT

GOOG-14-010400 - The Google Android 14 work profile must be configured to disable automatic completion of workspace internet browser text input.MobileIron - DISA Google Android 14 COPE v2r2MDM

CONFIGURATION MANAGEMENT

GOOG-14-010600 - Google Android 14 must be configured to disallow configuration of date and time.MobileIron - DISA Google Android 14 COPE v2r2MDM

CONFIGURATION MANAGEMENT

GOOG-14-010900 - Android 14 devices must be configured to disable the use of third-party keyboards.AirWatch - DISA Google Android 14 COBO v2r2MDM

CONFIGURATION MANAGEMENT

GOOG-14-011000 - Android 14 devices must be configured to enable Common Criteria Mode (CC Mode) - CC Mode.AirWatch - DISA Google Android 14 COBO v2r2MDM

CONFIGURATION MANAGEMENT

GOOG-14-011000 - Android 14 devices must be configured to enable Common Criteria Mode (CC Mode) - CC Mode.MobileIron - DISA Google Android 14 COBO v2r2MDM

CONFIGURATION MANAGEMENT

RHEL-08-010010 - RHEL 8 vendor packaged system security patches and updates must be installed and up to date.DISA Red Hat Enterprise Linux 8 STIG v2r3Unix

CONFIGURATION MANAGEMENT

RHEL-08-010121 - The RHEL 8 operating system must not have accounts configured with blank or null passwords.DISA Red Hat Enterprise Linux 8 STIG v2r3Unix

CONFIGURATION MANAGEMENT

RHEL-08-010292 - RHEL 8 must ensure the SSH server uses strong entropy.DISA Red Hat Enterprise Linux 8 STIG v2r3Unix

CONFIGURATION MANAGEMENT

RHEL-08-010379 - RHEL 8 must specify the default "include" directory for the /etc/sudoers file.DISA Red Hat Enterprise Linux 8 STIG v2r3Unix

CONFIGURATION MANAGEMENT

RHEL-08-010480 - The RHEL 8 SSH public host key files must have mode 0644 or less permissive.DISA Red Hat Enterprise Linux 8 STIG v2r3Unix

CONFIGURATION MANAGEMENT

RHEL-08-010490 - The RHEL 8 SSH private host key files must have mode 0640 or less permissive.DISA Red Hat Enterprise Linux 8 STIG v2r3Unix

CONFIGURATION MANAGEMENT

RHEL-08-010521 - The RHEL 8 SSH daemon must not allow Kerberos authentication, except to fulfill documented and validated mission requirements.DISA Red Hat Enterprise Linux 8 STIG v2r3Unix

CONFIGURATION MANAGEMENT

RHEL-08-010542 - RHEL 8 must use a separate file system for the system audit data path.DISA Red Hat Enterprise Linux 8 STIG v2r3Unix

CONFIGURATION MANAGEMENT

RHEL-08-010543 - A separate RHEL 8 filesystem must be used for the /tmp directory.DISA Red Hat Enterprise Linux 8 STIG v2r3Unix

CONFIGURATION MANAGEMENT

RHEL-08-010580 - RHEL 8 must prevent special devices on non-root local partitions.DISA Red Hat Enterprise Linux 8 STIG v2r3Unix

CONFIGURATION MANAGEMENT

RHEL-08-010731 - All RHEL 8 local interactive user home directory files must have mode 0750 or less permissive.DISA Red Hat Enterprise Linux 8 STIG v2r3Unix

CONFIGURATION MANAGEMENT

RHEL-08-010740 - All RHEL 8 local interactive user home directories must be group-owned by the home directory owner's primary group.DISA Red Hat Enterprise Linux 8 STIG v2r3Unix

CONFIGURATION MANAGEMENT

RHEL-08-010820 - Unattended or automatic logon via the RHEL 8 graphical user interface must not be allowed.DISA Red Hat Enterprise Linux 8 STIG v2r3Unix

CONFIGURATION MANAGEMENT

WN10-CC-000063 - Windows 10 systems must use either Group Policy or an approved Mobile Device Management (MDM) product to enforce STIG compliance.DISA Microsoft Windows 10 STIG v3r4Windows

CONFIGURATION MANAGEMENT