Item Search

NameAudit NamePluginCategory
AIOS-01-080004 - Apple iOS must enforce a minimum password length of six characters.MobileIron - DISA Apple iOS 10 v1r3MDM

IDENTIFICATION AND AUTHENTICATION

AIOS-01-080004 - Apple iOS must enforce a minimum password length of six characters.AirWatch - DISA Apple iOS 10 v1r3MDM

IDENTIFICATION AND AUTHENTICATION

EDGE-00-000042 - Extensions that are approved for use must be allowlisted if used.DISA STIG Edge v2r2Windows

CONFIGURATION MANAGEMENT

GEN000450 - System must limit users to 10 simultaneous system logins or a site-defined number in accordance with operational requirementsDISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN001280 - Manual page files must have mode 0644 or less permissive - '/usr/share/info/*'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN001290 - All manual page files must not have extended ACLs - '/usr/share/info/*'DISA STIG AIX 6.1 v1r14Unix

ACCESS CONTROL

GEN001490 - User home directories must not have extended ACLs.DISA STIG AIX 6.1 v1r14Unix

ACCESS CONTROL

GEN001560 - All files and directories contained in user's home directories must have mode 0750 or less permissive.DISA STIG AIX 6.1 v1r14Unix

ACCESS CONTROL

GEN001780 - Global initialization files must contain the 'mesg -n' or 'mesg n' commands - '/etc/ksh.kshrc'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

CONFIGURATION MANAGEMENT

GEN001780 - Global initialization files must contain the 'mesg -n' or 'mesg n' commands - '/etc/profile.d/*'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

CONFIGURATION MANAGEMENT

GEN001780 - Global initialization files must contain the mesg -n or mesg n commands.DISA STIG AIX 6.1 v1r14Unix

CONFIGURATION MANAGEMENT

GEN002300 - Device files used for backup must only be readable and/or writable by root or the backup user.DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

CONFIGURATION MANAGEMENT

GEN002715 - System audit tool executables must be owned by root - '/sbin/autrace'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

AUDIT AND ACCOUNTABILITY

GEN002715 - System audit tool executables must be owned by root - '/usr/sbin/auditbin'DISA STIG AIX 6.1 v1r14Unix

AUDIT AND ACCOUNTABILITY

GEN002715 - System audit tool executables must be owned by root - '/usr/sbin/auditconv'DISA STIG AIX 6.1 v1r14Unix

AUDIT AND ACCOUNTABILITY

GEN002715 - System audit tool executables must be owned by root - '/usr/sbin/auditselect'DISA STIG AIX 6.1 v1r14Unix

AUDIT AND ACCOUNTABILITY

GEN002716 - System audit tool executables must be group-owned by root, bin, sys, or system - '/sbin/audispd'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

AUDIT AND ACCOUNTABILITY

GEN002717 - System audit tool executables must have mode 0750 or less permissive - '/usr/sbin/auditbin'DISA STIG AIX 6.1 v1r14Unix

AUDIT AND ACCOUNTABILITY

GEN002717 - System audit tool executables must have mode 0750 or less permissive - '/usr/sbin/auditcat'DISA STIG AIX 6.1 v1r14Unix

AUDIT AND ACCOUNTABILITY

GEN002717 - System audit tool executables must have mode 0750 or less permissive - '/usr/sbin/auditconv'DISA STIG AIX 6.1 v1r14Unix

AUDIT AND ACCOUNTABILITY

GEN002718 - System audit tool executables must not have extended ACLs - '/sbin/autrace'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

AUDIT AND ACCOUNTABILITY

GEN002718 - System audit tool executables must not have extended ACLs - '/usr/sbin/auditselect'DISA STIG AIX 6.1 v1r14Unix

AUDIT AND ACCOUNTABILITY

GEN002719 - The audit system must alert the SA in the event of an audit processing failure - '/etc/audit/auditd.conf disk_error_action'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

AUDIT AND ACCOUNTABILITY

GEN002750 - The audit system must be configured to audit account creation - 'User audit class assignments should be reviewed'DISA STIG AIX 6.1 v1r14Unix

ACCESS CONTROL

GEN002753 - The audit system must be configured to audit account termination - 'User audit class assignments should be reviewed'DISA STIG AIX 6.1 v1r14Unix

ACCESS CONTROL

GEN002870 - The system must be configured to send audit records to a remote audit server - '/etc/security/audit/config streammode=on'DISA STIG AIX 6.1 v1r14Unix

AUDIT AND ACCOUNTABILITY

GEN003220 - Cron programs must not set the umask to a value less restrictive than 077 - '/etc/cron.hourly/*'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN003522 - The kernel core dump data directory must have mode 0700 or less permissive.DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN003602 - The system must not process ICMP timestamp requests.DISA STIG AIX 6.1 v1r14Unix

ACCESS CONTROL

GEN003611 - The system must log martian packets.DISA STIG AIX 6.1 v1r14Unix

AUDIT AND ACCOUNTABILITY

GEN003621 - The system must use a separate file system for /var.DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

SYSTEM AND COMMUNICATIONS PROTECTION

GEN003800 - Xinetd logging/tracing must be enabled - '/etc/xinetd.conf log_on_failure'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

AUDIT AND ACCOUNTABILITY

GEN003800 - Xinetd logging/tracing must be enabled - '/etc/xinetd.conf log_on_success'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

AUDIT AND ACCOUNTABILITY

GEN003800 - Xinetd logging/tracing must be enabled - '/etc/xinetd.conf log_type'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

AUDIT AND ACCOUNTABILITY

GEN003800 - Xinetd logging/tracing must be enabled - '/etc/xinetd.d/* log_on_failure'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

AUDIT AND ACCOUNTABILITY

GEN003860 - The system must not have the finger service active.DISA STIG AIX 6.1 v1r14Unix

ACCESS CONTROL

GEN004440 - Sendmail logging must not be set to less than nine in the sendmail.cf file.DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

CONFIGURATION MANAGEMENT

GEN004660 - The SMTP service must not have the EXPN feature active.DISA STIG AIX 6.1 v1r14Unix

CONFIGURATION MANAGEMENT

GEN004980 - The FTP daemon must be configured for logging or verbose mode - '/etc/inetd.conf contains ftpd -l'DISA STIG AIX 6.1 v1r14Unix

AUDIT AND ACCOUNTABILITY

GEN005524 - The SSH daemon must not permit GSSAPI authentication unless needed.DISA STIG AIX 6.1 v1r14Unix

CONFIGURATION MANAGEMENT

GEN005526 - The SSH daemon must not permit Kerberos authentication unless needed.DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

CONFIGURATION MANAGEMENT

GEN005760 - The NFS export configuration file must have mode 0644 or less permissive.DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN005770 - The NFS exports configuration file must not have an extended ACL.DISA STIG AIX 6.1 v1r14Unix

ACCESS CONTROL

GEN006570 - The file integrity tool must be configured to verify ACLs.DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

SYSTEM AND INFORMATION INTEGRITY

GEN006575 - The file integrity tool must use FIPS 140-2 approved cryptographic hashes for validating file contents.DISA STIG AIX 6.1 v1r14Unix

SYSTEM AND INFORMATION INTEGRITY

GEN006575 - The file integrity tool must use FIPS 140-2 approved cryptographic hashes for validating file contents.DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

SYSTEM AND INFORMATION INTEGRITY

GEN008420 - The system must use available memory address randomization techniques.DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

CONFIGURATION MANAGEMENT

GEN008460 - The system must have USB disabled unless needed - 'lsdev'DISA STIG AIX 6.1 v1r14Unix

CONFIGURATION MANAGEMENT

KNOX-07-000100 - The Samsung Android 7 with Knox must be configured to enforce a minimum password length of six characters.AirWatch - DISA Samsung Android 7 with Knox 2.x v1r1MDM

IDENTIFICATION AND AUTHENTICATION

SPLK-CL-000360 - Splunk Enterprise must be configured to enforce password complexity by requiring that at least one numeric character be used.DISA STIG Splunk Enterprise 8.x for Linux v2r1 STIG OSUnix

IDENTIFICATION AND AUTHENTICATION