Item Search

NameAudit NamePluginCategory
AIOS-13-010500 - Apple iOS/iPadOS must require a valid password be successfully entered before the mobile device data is unencrypted.MobileIron - DISA Apple iOS/iPadOS 13 v2r1MDM

SYSTEM AND COMMUNICATIONS PROTECTION

AS24-W1-000940 - All accounts installed with the Apache web server software and tools must have passwords assigned and default passwords changed.DISA STIG Apache Server 2.4 Windows Server v3r3Windows

CONFIGURATION MANAGEMENT

CISC-ND-000470 - The Cisco router must be configured to prohibit the use of all unnecessary and nonsecure functions and services.DISA STIG Cisco IOS Router NDM v3r2Cisco

CONFIGURATION MANAGEMENT

CISC-ND-000720 - The Cisco router must be configured to terminate all network connections associated with device management after five minutes of inactivity.DISA STIG Cisco IOS-XR Router NDM v3r2Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

CISC-RT-000130 - The Cisco router must be configured to restrict traffic destined to itself.DISA STIG Cisco IOS-XR Router RTR v3r2Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

CISC-RT-000280 - The Cisco perimeter router must be configured to protect an enclave connected to an alternate gateway by using an inbound filter that only permits packets with destination addresses within the sites address space.DISA STIG Cisco IOS-XR Router RTR v3r2Cisco

ACCESS CONTROL

CISC-RT-000290 - The Cisco perimeter router must be configured to not be a Border Gateway Protocol (BGP) peer to an alternate gateway service provider.DISA STIG Cisco IOS-XR Router RTR v3r2Cisco

ACCESS CONTROL

CISC-RT-000630 - The Cisco PE router must be configured to have each Virtual Routing and Forwarding (VRF) instance bound to the appropriate physical or logical interfaces to maintain traffic separation between all MPLS L3VPNs.DISA STIG Cisco IOS Router RTR v3r2Cisco

CONTINGENCY PLANNING

CISC-RT-000670 - The Cisco PE router providing MPLS Virtual Private Wire Service (VPWS) must be configured to have the appropriate pseudowire ID for each attachment circuit.DISA STIG Cisco IOS-XR Router RTR v3r2Cisco

CONTINGENCY PLANNING

CISC-RT-000680 - The Cisco PE router providing Virtual Private LAN Services (VPLS) must be configured to have all attachment circuits defined to the virtual forwarding instance (VFI) with the globally unique VPN ID assigned for each customer VLAN.DISA STIG Cisco IOS-XR Router RTR v3r2Cisco

CONFIGURATION MANAGEMENT

CISC-RT-000730 - The Cisco PE router must be configured to block any traffic that is destined to IP core infrastructure.DISA STIG Cisco IOS Router RTR v3r2Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

IIST-SV-000120 - All IIS 10.0 web server sample code, example applications, and tutorials must be removed from a production IIS 10.0 server.DISA IIS 10.0 Server v3r3Windows

CONFIGURATION MANAGEMENT

IISW-SV-000131 - IIS 8.5 Web server accounts accessing the directory tree, the shell, or other operating system functions and utilities must only be administrative accounts.DISA IIS 8.5 Server v2r7Windows

SYSTEM AND COMMUNICATIONS PROTECTION

IISW-SV-000156 - All accounts installed with the IIS 8.5 web server software and tools must have passwords assigned and default passwords changed.DISA IIS 8.5 Server v2r7Windows

CONFIGURATION MANAGEMENT

JUNI-RT-000280 - The Juniper perimeter router must be configured to protect an enclave connected to an approved gateway by using an inbound filter that only permits packets with destination addresses within the site's address space.DISA STIG Juniper Router RTR v3r2Juniper

ACCESS CONTROL

JUNI-RT-000650 - The Juniper PE router providing MPLS Virtual Private Wire Service (VPWS) must be configured to have the appropriate virtual circuit identification (VC ID) for each attachment circuit.DISA STIG Juniper Router RTR v3r2Juniper

CONTINGENCY PLANNING

JUSX-VN-000012 - The Juniper SRX Services Gateway VPN must not accept certificates that have been revoked when using PKI for authentication.DISA Juniper SRX Services Gateway VPN v3r1Juniper

CONFIGURATION MANAGEMENT

JUSX-VN-000023 - The Juniper SRX Services Gateway VPN Internet Key Exchange (IKE) must use cryptography that is compliant with Suite B parameters when transporting classified traffic across an unclassified network.DISA Juniper SRX Services Gateway VPN v3r1Juniper

SYSTEM AND COMMUNICATIONS PROTECTION

JUSX-VN-000025 - The Juniper SRX Services Gateway VPN must configure Internet Key Exchange (IKE) with SHA1 or greater to protect the authenticity of communications sessions.DISA Juniper SRX Services Gateway VPN v3r1Juniper

SYSTEM AND COMMUNICATIONS PROTECTION

O121-BP-021900 - The Oracle REMOTE_OS_AUTHENT parameter must be set to FALSE.DISA STIG Oracle 12c v3r2 DatabaseOracleDB

CONFIGURATION MANAGEMENT

O121-C1-004500 - DBA OS accounts must be granted only those host system privileges necessary for the administration of the DBMS.DISA STIG Oracle 12c v3r2 LinuxUnix

CONFIGURATION MANAGEMENT

O121-C2-018300 - The DBMS must take needed steps to protect data at rest and ensure confidentiality and integrity of application data.DISA STIG Oracle 12c v3r2 DatabaseOracleDB

SYSTEM AND COMMUNICATIONS PROTECTION

O121-N1-015602 - When using command-line tools such as Oracle SQL*Plus, which can accept a plain-text password, users must use an alternative logon method that does not expose the password.DISA STIG Oracle 12c v3r2 WindowsWindows

CONFIGURATION MANAGEMENT

OL07-00-010450 - The Oracle Linux operating system must not allow an unrestricted logon to the system.DISA Oracle Linux 7 STIG v3r2Unix

CONFIGURATION MANAGEMENT

OL07-00-010482 - Oracle Linux operating systems version 7.2 or newer with a Basic Input/Output System (BIOS) must require authentication upon booting into single-user and maintenance modes - BIOS must require authentication upon booting into single-user and maintenance modes.DISA Oracle Linux 7 STIG v3r2Unix

ACCESS CONTROL

OL07-00-010491 - Oracle Linux operating systems version 7.2 or newer using Unified Extensible Firmware Interface (UEFI) must require authentication upon booting into single-user and maintenance modes - UEFI must require authentication upon booting into single-user and maintenance modes.DISA Oracle Linux 7 STIG v3r2Unix

ACCESS CONTROL

OL07-00-020000 - The Oracle Linux operating system must not have the rsh-server package installed.DISA Oracle Linux 7 STIG v3r2Unix

CONFIGURATION MANAGEMENT

OL07-00-020230 - The Oracle Linux operating system must be configured so that the x86 Ctrl-Alt-Delete key sequence is disabled on the command line.DISA Oracle Linux 7 STIG v3r2Unix

CONFIGURATION MANAGEMENT

OL07-00-040700 - The Oracle Linux operating system must not have the Trivial File Transfer Protocol (TFTP) server package installed if not required for operational support - TFTP server package installed if not required for operational support.DISA Oracle Linux 7 STIG v3r2Unix

CONFIGURATION MANAGEMENT

SLES-12-010610 - The SUSE operating system must disable the x86 Ctrl-Alt-Delete key sequence.DISA SLES 12 STIG v3r2Unix

CONFIGURATION MANAGEMENT

SP13-00-000125 - SharePoint must implement an information system isolation boundary that minimizes the number of nonsecurity functions included within the boundary containing security functions.DISA STIG SharePoint 2013 v2r4Windows

SYSTEM AND COMMUNICATIONS PROTECTION

SP13-00-000145 - SharePoint must use mechanisms for authentication to a cryptographic module that meet the requirements of applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance for such authentication.DISA STIG SharePoint 2013 v2r4Windows

IDENTIFICATION AND AUTHENTICATION

SQL6-D0-003200 - SQL Server must use NSA-approved cryptography to protect classified information in accordance with the data owners requirements.DISA STIG SQL Server 2016 Database Audit v3r2MS_SQLDB

SYSTEM AND COMMUNICATIONS PROTECTION

SQL6-D0-008700 - SQL Server must use NIST FIPS 140-2 or 140-3 validated cryptographic modules for cryptographic operations.DISA STIG SQL Server 2016 Instance OS Audit v3r4Windows

IDENTIFICATION AND AUTHENTICATION

WN10-00-000040 - Windows 10 systems must be maintained at a supported servicing level.DISA Microsoft Windows 10 STIG v3r4Windows

CONFIGURATION MANAGEMENT

WN10-00-000100 - Internet Information System (IIS) or its subcomponents must not be installed on a workstation.DISA Microsoft Windows 10 STIG v3r4Windows

CONFIGURATION MANAGEMENT

WN10-00-000150 - Structured Exception Handling Overwrite Protection (SEHOP) must be enabled.DISA Microsoft Windows 10 STIG v3r4Windows

SYSTEM AND INFORMATION INTEGRITY

WN10-CC-000345 - The Windows Remote Management (WinRM) service must not use Basic authentication.DISA Microsoft Windows 10 STIG v3r4Windows

MAINTENANCE

WN10-SO-000140 - Anonymous SID/Name translation must not be allowed.DISA Microsoft Windows 10 STIG v3r4Windows

CONFIGURATION MANAGEMENT

WN10-SO-000150 - Anonymous enumeration of shares must be restricted.DISA Microsoft Windows 10 STIG v3r4Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WN12-00-000005 - Users with Administrative privileges must have separate accounts for administrative duties and normal operational tasks.DISA Windows Server 2012 and 2012 R2 MS STIG v3r7Windows

CONFIGURATION MANAGEMENT

WN12-CC-000059 - Solicited Remote Assistance must not be allowed.DISA Windows Server 2012 and 2012 R2 DC STIG v3r7Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WN12-CC-000123 - The Windows Remote Management (WinRM) client must not use Basic authentication.DISA Windows Server 2012 and 2012 R2 DC STIG v3r7Windows

MAINTENANCE

WN12-CC-000126 - The Windows Remote Management (WinRM) service must not use Basic authentication.DISA Windows Server 2012 and 2012 R2 DC STIG v3r7Windows

MAINTENANCE

WN12-GE-000001 - Systems must be maintained at a supported OS or service pack level.DISA Windows Server 2012 and 2012 R2 MS STIG v3r7Windows

CONFIGURATION MANAGEMENT

WN12-GE-000005 - Local volumes must use a format that supports NTFS attributes.DISA Windows Server 2012 and 2012 R2 DC STIG v3r7Windows

ACCESS CONTROL

WN12-GE-000015 - Windows 2012/2012 R2 accounts must be configured to require passwords.DISA Windows Server 2012 and 2012 R2 MS STIG v3r7Windows

IDENTIFICATION AND AUTHENTICATION

WN12-SO-000052 - Anonymous enumeration of shares must be restricted.DISA Windows Server 2012 and 2012 R2 DC STIG v3r7Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WN12-SO-000059 - Network shares that can be accessed anonymously must not be allowed.DISA Windows Server 2012 and 2012 R2 DC STIG v3r7Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WN12-SO-000067 - The LanMan authentication level must be set to send NTLMv2 response only, and to refuse LM and NTLM.DISA Windows Server 2012 and 2012 R2 MS STIG v3r7Windows

CONFIGURATION MANAGEMENT