Item Search

NameAudit NamePluginCategory
DG0003-ORACLE11 - The latest security patches should be installed.DISA STIG Oracle 11 Installation v9r1 LinuxUnix
DG0013-ORACLE11 - Database backup procedures should be defined, documented and implemented.DISA STIG Oracle 11 Installation v9r1 WindowsWindows
DG0020-ORACLE11 - Backup and recovery procedures should be developed, documented, implemented and periodically tested.DISA STIG Oracle 11 Installation v9r1 LinuxUnix
DG0021-ORACLE11 - A baseline of database application software should be documented and maintained.DISA STIG Oracle 11 Installation v9r1 LinuxUnix
DG0032-ORACLE11 - Audit records should be restricted to authorized individuals - 'AUD$ table access is restricted'DISA STIG Oracle 11 Instance v9r1 DatabaseOracleDB
DG0042-ORACLE11 - Use of the DBMS software installation account should be restricted to DBMS software installation, upgrade and maintenance actions.DISA STIG Oracle 11 Installation v9r1 LinuxUnix
DG0050-ORACLE11 - Database software, applications and configuration files should be monitored to discover unauthorized changes.DISA STIG Oracle 11 Installation v9r1 WindowsWindows
DG0069-ORACLE11 - Procedures and restrictions for import of production data to development databases should be documented, implemented and followed.DISA STIG Oracle 11 Installation v9r1 LinuxUnix
DG0069-ORACLE11 - Procedures and restrictions for import of production data to development databases should be documented, implemented and followed.DISA STIG Oracle 11 Installation v9r1 WindowsWindows
DG0073-ORACLE11 - Database accounts should not specify account lock times less than the site-approved minimum - 'Account lockout is < 3'DISA STIG Oracle 11 Instance v9r1 DatabaseOracleDB
DG0074-ORACLE11 - Unapproved inactive or expired database accounts should not be found on the database.DISA STIG Oracle 11 Instance v9r1 DatabaseOracleDB
DG0075-ORACLE11 - Unauthorized database links should not be defined and active - 'No external database links exist'DISA STIG Oracle 11 Instance v9r1 DatabaseOracleDB
DG0083-ORACLE11 - Automated notification of suspicious activity detected in the audit trail should be implemented.DISA STIG Oracle 11 Installation v9r1 LinuxUnix
DG0090-ORACLE11 - Sensitive information stored in the database should be protected by encryption.DISA STIG Oracle 11 Installation v9r1 WindowsWindows
DG0097-ORACLE11 - Plans and procedures for testing DBMS installations, upgrades and patches should be defined and followed prior to production implementation.DISA STIG Oracle 11 Installation v9r1 WindowsWindows
DG0120-ORACLE11 - Unauthorized access to external database objects should be removed from application user roles.DISA STIG Oracle 11 Installation v9r1 LinuxUnix
DG0127-ORACLE11 - DBMS account passwords should not be set to easily guessed words or values - 'profile'DISA STIG Oracle 11 Instance v9r1 DatabaseOracleDB
DG0155-ORACLE11 - The DBMS should have configured all applicable settings to use trusted files, functions, features, or other components during startup, shutdown, aborts, or other unplanned interruptions.DISA STIG Oracle 11 Installation v9r1 WindowsWindows
DG0157-ORACLE11 - Remote DBMS administration should be documented and authorized or disabled.DISA STIG Oracle 11 Installation v9r1 WindowsWindows
DG0172-ORACLE11 - Changes to DBMS security labels should be audited.DISA STIG Oracle 11 Instance v9r1 DatabaseOracleDB
DG0175-ORACLE11 - The DBMS host platform and other dependent applications should be configured in compliance with applicable STIG requirements.DISA STIG Oracle 11 Installation v9r1 LinuxUnix
DG0176-ORACLE11 - The DBMS audit logs should be included in backup operations.DISA STIG Oracle 11 Installation v9r1 WindowsWindows
DG0190-ORACLE11 - Credentials stored and used by the DBMS to access remote databases or applications should be authorized and restricted to authorized users.DISA STIG Oracle 11 Instance v9r1 DatabaseOracleDB
DG0194-ORACLE11 - Privileges assigned to developers on shared production and development DBMS hosts and the DBMS should be monitored every three months or more frequently for unauthorized changes.DISA STIG Oracle 11 Installation v9r1 WindowsWindows
DG0198-ORACLE11 - Remote administration of the DBMS should be restricted to known, dedicated and encrypted network addresses and ports.DISA STIG Oracle 11 Installation v9r1 LinuxUnix
DO3696-ORACLE11 - The Oracle RESOURCE_LIMIT parameter should be set to TRUE - 'resource_limit = true'DISA STIG Oracle 11 Instance v9r1 DatabaseOracleDB
WA000-WWA026 A22 - The httpd.conf StartServers directive must be set properly.DISA STIG Apache Server 2.2 Unix v1r11 MiddlewareUnix
WA000-WWA032 A22 - The httpd.conf MaxClients directive must be set properly.DISA STIG Apache Server 2.2 Unix v1r11 MiddlewareUnix
WA000-WWA050 A22 - All interactive programs must be placed in a designated directory with appropriate permissions - confDISA STIG Apache Server 2.2 Unix v1r11 MiddlewareUnix
WA000-WWA060 A22 - The HTTP request message body size must be limited.DISA STIG Apache Server 2.2 Unix v1r11 MiddlewareUnix
WA060 IIS6 - A public web server, if hosted on the NIPRNet, must be isolated in an accredited DoD DMZ Extension.DISA STIG IIS 6.0 Server v6r16Windows
WA00535 A22 - The score board file must be properly secured.DISA STIG Apache Server 2.2 Unix v1r11 MiddlewareUnix
WA00535 A22 - The score board file must be properly secured.DISA STIG Apache Server 2.2 Unix v1r11Unix
WA00540 A22 - The web server must be configured to explicitly deny access to the OS root - OrderDISA STIG Apache Server 2.2 Unix v1r11 MiddlewareUnix
WA00555 A22 - The web server must be configured to listen on a specific IP address and port - 80DISA STIG Apache Server 2.2 Unix v1r11 MiddlewareUnix
WA00565 A22 - HTTP request methods must be limited - LimitExceptDISA STIG Apache Server 2.2 Unix v1r11 MiddlewareUnix
WA00565 A22 - HTTP request methods must be limited - LimitExceptDISA STIG Apache Server 2.2 Unix v1r11Unix
WA00565 A22 - HTTP request methods must be limited - OrderDISA STIG Apache Server 2.2 Unix v1r11Unix
WG040 A22 - Public web server resources must not be shared with private assets.DISA STIG Apache Server 2.2 Unix v1r11Unix
WG060 W22 - The service account used to run the web service must have its password changed at least annually.DISA STIG Apache Server 2.2 Windows v1r13Windows
WG145 A22 - The private web server must use an approved DoD certificate validation process.DISA STIG Apache Server 2.2 Unix v1r11 MiddlewareUnix
WG204 A22 - A web server must be segregated from other services.DISA STIG Apache Server 2.2 Unix v1r11Unix
WG220 IIS6 - Access to web administration tools must be restricted to the Web Manager and the Web Manager's designees.DISA STIG IIS 6.0 Server v6r16Windows
WG255 A22 - Access to the web server log files must be restricted to administrators, web administrators, and auditors.DISA STIG Apache Site 2.2 Unix v1r11Unix
WG270 W22 - The web server's htpasswd files (if present) must reflect proper ownership and permissions.DISA STIG Apache Server 2.2 Windows v1r13Windows
WG275 W22 - The web server, although started by superuser or privileged account, must run using a non-privileged account.DISA STIG Apache Server 2.2 Windows v1r13Windows
WG280 - The access control files are owned by a privileged web server account - .htaccess existDISA STIG Apache Server 2.2 Windows v1r13Windows
WG330 A22 - A public web server must limit email to outbound only - sendmailDISA STIG Apache Server 2.2 Unix v1r11Unix
WG350 A22 - A private web server will have a valid DoD server certificate.DISA STIG Apache Site 2.2 Unix v1r11 MiddlewareUnix
WG430 W22 - Anonymous FTP user access to interactive scripts must be prohibited.DISA STIG Apache Site 2.2 Windows v1r13Windows