Item Search

NameAudit NamePluginCategory
DG0041-ORACLE11 - Use of the DBMS installation account should be logged.DISA STIG Oracle 11 Installation v9r1 LinuxUnix
DG0063-ORACLE11 - DBMS privileges to restore database data or other DBMS configurations, features, or objects should be restricted to authorized DBMS accounts.DISA STIG Oracle 11 Installation v9r1 LinuxUnix
DG0066-ORACLE11 - Procedures for establishing temporary passwords that meet DoD password requirements for new accounts should be defined, documented and implemented.DISA STIG Oracle 11 Installation v9r1 LinuxUnix
DG0068-ORACLE11 - DBMS tools or applications that echo or require a password entry in clear text should be protected from password display.DISA STIG Oracle 11 Installation v9r1 LinuxUnix
DG0069-ORACLE11 - Procedures and restrictions for import of production data to development databases should be documented, implemented and followed.DISA STIG Oracle 11 Installation v9r1 LinuxUnix
DG0092-ORACLE11 - Database data files containing sensitive information should be encrypted.DISA STIG Oracle 11 Installation v9r1 LinuxUnix
DG0115-ORACLE11 - Recovery procedures and technical system features exist to ensure that recovery is done in a secure and verifiable manner.DISA STIG Oracle 11 Installation v9r1 LinuxUnix
DG0157-ORACLE11 - Remote DBMS administration should be documented and authorized or disabled.DISA STIG Oracle 11 Installation v9r1 LinuxUnix
WA060 A22 - A public web server, if hosted on the NIPRNet, must be isolated in an accredited DoD DMZ Extension.DISA STIG Apache Server 2.2 Unix v1r11Unix
WA060 W22 - A public web server, if hosted on the NIPRNet, must be isolated in an accredited DoD DMZ Extension.DISA STIG Apache Server 2.2 Windows v1r13Windows
WA070 A22 - A private web server must be located on a separate controlled access subnet.DISA STIG Apache Server 2.2 Unix v1r11Unix
WA070 A22 - A private web server must be located on a separate controlled access subnet.DISA STIG Apache Server 2.2 Unix v1r11 MiddlewareUnix
WA070 W22 - A private web server must be located on a separate controlled access subnet.DISA STIG Apache Server 2.2 Windows v1r13Windows
WA230 A22 - The Web site software used with the web server must have all applicable security patches applied and documented.DISA STIG Apache Server 2.2 Unix v1r11 MiddlewareUnix
WA00530 A22 - The process ID (PID) file must be properly secured - permissionsDISA STIG Apache Server 2.2 Unix v1r11Unix
WA00530 W22 - The process ID (PID) file must be properly secured.DISA STIG Apache Server 2.2 Windows v1r13Windows
WA00540 A22 - The web server must be configured to explicitly deny access to the OS root - DenyDISA STIG Apache Server 2.2 Unix v1r11 MiddlewareUnix
WA00555 A22 - The web server must be configured to listen on a specific IP address and port - listenDISA STIG Apache Server 2.2 Unix v1r11 MiddlewareUnix
WA00565 A22 - HTTP request methods must be limited - DenyDISA STIG Apache Server 2.2 Unix v1r11 MiddlewareUnix
WA00565 A22 - HTTP request methods must be limited - LimitExceptDISA STIG Apache Server 2.2 Unix v1r11Unix
WG040 A22 - Public web server resources must not be shared with private assets.DISA STIG Apache Server 2.2 Unix v1r11 MiddlewareUnix
WG050 A22 - The web server password(s) must be entrusted to the SA or Web Manager.DISA STIG Apache Server 2.2 Unix v1r11 MiddlewareUnix
WG060 W22 - The service account used to run the web service must have its password changed at least annually.DISA STIG Apache Server 2.2 Windows v1r13Windows
WG080 W22 - Installation of a compiler on production web server must be prohibited.DISA STIG Apache Server 2.2 Windows v1r13Windows
WG145 IIS6 - The private web server must use an approved DoD certificate validation process. - 'Check W3SVC/WEBSITES CertCheckMode'DISA STIG IIS 6.0 Site Checklist v6r16Windows
WG220 A22 - Web administration tools must be restricted to the web manager and the web manager's designees - ResourceConfigDISA STIG Apache Server 2.2 Unix v1r11 MiddlewareUnix
WG240 IIS6 - Logs of web server access and errors must be established and maintained.DISA STIG IIS 6.0 Site Checklist v6r16Windows
WG255 A22 - Access to the web server log files must be restricted to administrators, web administrators, and auditors.DISA STIG Apache Site 2.2 Unix v1r11Unix
WG260 IIS6 - Only fully reviewed and tested web sites must exist on a production web server.DISA STIG IIS 6.0 Site Checklist v6r16Windows
WG270 A22 - The web server's htpasswd files (if present) must reflect proper ownership and permissionsDISA STIG Apache Server 2.2 Unix v1r11 MiddlewareUnix
WG270 A22 - The web server's htpasswd files (if present) must reflect proper ownership and permissionsDISA STIG Apache Server 2.2 Unix v1r11Unix
WG275 W22 - The web server, although started by superuser or privileged account, must run using a non-privileged account.DISA STIG Apache Server 2.2 Windows v1r13Windows
WG280 - The access control files are owned by a privileged web server account - HTTPD_CONFIG_DIRECTORY/httpd.confDISA STIG Apache Server 2.2 Unix v1r11Unix
WG330 A22 - A public web server must limit email to outbound only - sendmailDISA STIG Apache Server 2.2 Unix v1r11Unix
WG330 A22 - A public web server must limit email to outbound only - sendmailDISA STIG Apache Server 2.2 Unix v1r11 MiddlewareUnix
WG330 IIS6 - A public web server must limit e-mail to outbound only.DISA STIG IIS 6.0 Server v6r16Windows
WG350 A22 - A private web server will have a valid DoD server certificate.DISA STIG Apache Site 2.2 Unix v1r11 MiddlewareUnix
WG350 IIS6 - A private web server must have a valid server certificate.DISA STIG IIS 6.0 Site Checklist v6r16Windows
WG350 W22 - A private web server must have a valid DoD server certificate.DISA STIG Apache Site 2.2 Windows v1r13Windows
WG355 A22 - A private web server's list of CAs in a trust hierarchy must lead to an authorized DoD PKI Root CA.DISA STIG Apache Server 2.2 Unix v1r11Unix
WG355 A22 - A private web server's list of CAs in a trust hierarchy must lead to an authorized DoD PKI Root CA.DISA STIG Apache Server 2.2 Unix v1r11 MiddlewareUnix
WG355 IIS6 - A private web site must utilize certificates from a trusted DoD CA.DISA STIG IIS 6.0 Site Checklist v6r16Windows
WG355 W22 - A private web server's list of CAs in a trust hierarchy must lead to an authorized DoD PKI Root CA.DISA STIG Apache Server 2.2 Windows v1r13Windows
WG410 IIS6 - Interactive scripts must have proper access controls. - 'Execute Permissions set 'Script only'DISA STIG IIS 6.0 Site Checklist v6r16Windows
WG410 W22 - Interactive scripts used on a web server must have proper access controls.DISA STIG Apache Site 2.2 Windows v1r13Windows
WG430 A22 - Anonymous FTP user access to interactive scripts is prohibited.DISA STIG Apache Site 2.2 Unix v1r11Unix
WG430 W22 - Anonymous FTP user access to interactive scripts must be prohibited.DISA STIG Apache Site 2.2 Windows v1r13Windows
WG440 A22 - Monitoring software must include CGI or equivalent programs in its scope.DISA STIG Apache Server 2.2 Unix v1r11 MiddlewareUnix
WG460 W22 - PERL scripts must use the TAINT option.DISA STIG Apache Site 2.2 Windows v1r13Windows
WG470 W22 - Wscript.exe and Cscript.exe must only be accessible by the SA and/or the web administrator. - 'Cscript.exe'DISA STIG Apache Server 2.2 Windows v1r13Windows