Item Search

NameAudit NamePluginCategory
AIOS-01-080004 - Apple iOS must enforce a minimum password length of six characters.AirWatch - DISA Apple iOS 10 v1r3MDM

IDENTIFICATION AND AUTHENTICATION

GEN000380 - All Group Identifiers (GIDs) referenced in the /etc/passwd file must be defined in the /etc/group file.DISA STIG AIX 6.1 v1r14Unix

CONFIGURATION MANAGEMENT

GEN000450 - System must limit users to 10 simultaneous system logins or a site-defined number in accordance with operational requirementsDISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN001280 - Manual page files must have mode 0644 or less permissive - '/usr/share/info/*'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN001280 - Manual page files must have mode 0644 or less permissive - '/usr/share/infopage/*'DISA STIG AIX 6.1 v1r14Unix

ACCESS CONTROL

GEN001280 - Manual page files must have mode 0644 or less permissive - '/usr/share/man/*'DISA STIG AIX 6.1 v1r14Unix

ACCESS CONTROL

GEN001290 - All manual page files must not have extended ACLs - '/usr/share/info/*'DISA STIG AIX 6.1 v1r14Unix

ACCESS CONTROL

GEN001490 - User home directories must not have extended ACLs.DISA STIG AIX 6.1 v1r14Unix

ACCESS CONTROL

GEN001560 - All files and directories contained in user's home directories must have mode 0750 or less permissive.DISA STIG AIX 6.1 v1r14Unix

ACCESS CONTROL

GEN001780 - Global initialization files must contain the 'mesg -n' or 'mesg n' commands - '/etc/ksh.kshrc'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

CONFIGURATION MANAGEMENT

GEN001780 - Global initialization files must contain the 'mesg -n' or 'mesg n' commands - '/etc/profile.d/*'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

CONFIGURATION MANAGEMENT

GEN001780 - Global initialization files must contain the mesg -n or mesg n commands.DISA STIG AIX 6.1 v1r14Unix

CONFIGURATION MANAGEMENT

GEN002300 - Device files used for backup must only be readable and/or writable by root or the backup user.DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

CONFIGURATION MANAGEMENT

GEN002715 - System audit tool executables must be owned by root - '/sbin/autrace'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

AUDIT AND ACCOUNTABILITY

GEN002715 - System audit tool executables must be owned by root - '/usr/sbin/auditbin'DISA STIG AIX 6.1 v1r14Unix

AUDIT AND ACCOUNTABILITY

GEN002715 - System audit tool executables must be owned by root - '/usr/sbin/auditconv'DISA STIG AIX 6.1 v1r14Unix

AUDIT AND ACCOUNTABILITY

GEN002715 - System audit tool executables must be owned by root - '/usr/sbin/auditselect'DISA STIG AIX 6.1 v1r14Unix

AUDIT AND ACCOUNTABILITY

GEN002716 - System audit tool executables must be group-owned by bin, sys, or system - '/usr/sbin/auditbin'DISA STIG AIX 6.1 v1r14Unix

AUDIT AND ACCOUNTABILITY

GEN002716 - System audit tool executables must be group-owned by bin, sys, or system - '/usr/sbin/auditcat'DISA STIG AIX 6.1 v1r14Unix

AUDIT AND ACCOUNTABILITY

GEN002716 - System audit tool executables must be group-owned by bin, sys, or system - '/usr/sbin/auditconv'DISA STIG AIX 6.1 v1r14Unix

AUDIT AND ACCOUNTABILITY

GEN002716 - System audit tool executables must be group-owned by bin, sys, or system - '/usr/sbin/auditmerge'DISA STIG AIX 6.1 v1r14Unix

AUDIT AND ACCOUNTABILITY

GEN002716 - System audit tool executables must be group-owned by root, bin, sys, or system - '/sbin/audispd'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

AUDIT AND ACCOUNTABILITY

GEN002717 - System audit tool executables must have mode 0750 or less permissive - '/usr/sbin/audit'DISA STIG AIX 6.1 v1r14Unix

AUDIT AND ACCOUNTABILITY

GEN002717 - System audit tool executables must have mode 0750 or less permissive - '/usr/sbin/auditbin'DISA STIG AIX 6.1 v1r14Unix

AUDIT AND ACCOUNTABILITY

GEN002717 - System audit tool executables must have mode 0750 or less permissive - '/usr/sbin/auditcat'DISA STIG AIX 6.1 v1r14Unix

AUDIT AND ACCOUNTABILITY

GEN002717 - System audit tool executables must have mode 0750 or less permissive - '/usr/sbin/auditconv'DISA STIG AIX 6.1 v1r14Unix

AUDIT AND ACCOUNTABILITY

GEN002718 - System audit tool executables must not have extended ACLs - '/sbin/autrace'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

AUDIT AND ACCOUNTABILITY

GEN002718 - System audit tool executables must not have extended ACLs - '/usr/sbin/auditcat'DISA STIG AIX 6.1 v1r14Unix

AUDIT AND ACCOUNTABILITY

GEN002718 - System audit tool executables must not have extended ACLs - '/usr/sbin/auditselect'DISA STIG AIX 6.1 v1r14Unix

AUDIT AND ACCOUNTABILITY

GEN002719 - The audit system must alert the SA in the event of an audit processing failure - '/etc/audit/auditd.conf disk_error_action'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

AUDIT AND ACCOUNTABILITY

GEN002750 - The audit system must be configured to audit account creation - 'gshadow'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN002750 - The audit system must be configured to audit account creation - 'shadow'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN002750 - The audit system must be configured to audit account creation - 'User audit class assignments should be reviewed'DISA STIG AIX 6.1 v1r14Unix

ACCESS CONTROL

GEN002750 - The audit system must be configured to audit account creation - 'useradd'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN002753 - The audit system must be configured to audit account termination - 'User audit class assignments should be reviewed'DISA STIG AIX 6.1 v1r14Unix

ACCESS CONTROL

GEN002870 - The system must be configured to send audit records to a remote audit server - '/etc/security/audit/config streammode=on'DISA STIG AIX 6.1 v1r14Unix

AUDIT AND ACCOUNTABILITY

GEN002870 - The system must be configured to send audit records to a remote audit server - '/etc/syslog.conf contains *.* @<server>'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

AUDIT AND ACCOUNTABILITY

GEN003621 - The system must use a separate file system for /var.DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

SYSTEM AND COMMUNICATIONS PROTECTION

GEN003650 - All local file systems must employ journaling or another mechanism ensuring file system consistency.DISA STIG AIX 6.1 v1r14Unix

CONTINGENCY PLANNING

GEN003800 - Xinetd logging/tracing must be enabled - '/etc/xinetd.conf log_type'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

AUDIT AND ACCOUNTABILITY

GEN004440 - Sendmail logging must not be set to less than nine in the sendmail.cf file.DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

CONFIGURATION MANAGEMENT

GEN005526 - The SSH daemon must not permit Kerberos authentication unless needed.DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

CONFIGURATION MANAGEMENT

GEN005760 - The NFS export configuration file must have mode 0644 or less permissive.DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN006575 - The file integrity tool must use FIPS 140-2 approved cryptographic hashes for validating file contents.DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

SYSTEM AND INFORMATION INTEGRITY

GEN008420 - The system must use available memory address randomization techniques.DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

CONFIGURATION MANAGEMENT

GEN008460 - The system must have USB disabled unless needed - 'lsdev'DISA STIG AIX 6.1 v1r14Unix

CONFIGURATION MANAGEMENT

GEN008820 - The system package management tool must not automatically obtain updates.DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

SYSTEM AND INFORMATION INTEGRITY

KNOX-07-000100 - The Samsung Android 7 with Knox must be configured to enforce a minimum password length of six characters.AirWatch - DISA Samsung Android 7 with Knox 2.x v1r1MDM

IDENTIFICATION AND AUTHENTICATION

SPLK-CL-000140 - Splunk Enterprise must allow only the individuals appointed by the information system security manager (ISSM) to have full admin rights to the system - ISSM to have full admin rights to the system.DISA STIG Splunk Enterprise 8.x for Linux v2r1 STIG REST APISplunk

AUDIT AND ACCOUNTABILITY

SPLK-CL-000360 - Splunk Enterprise must be configured to enforce password complexity by requiring that at least one numeric character be used.DISA STIG Splunk Enterprise 8.x for Linux v2r1 STIG OSUnix

IDENTIFICATION AND AUTHENTICATION