| 1.2 UBTU-24-100010 | CIS Ubuntu Linux 24.04 LTS STIG v1.0.0 CAT III | Unix | CONFIGURATION MANAGEMENT | 
| 1.11 UBTU-22-215015 | CIS Ubuntu Linux 22.04 LTS STIG v1.0.0 CAT III | Unix | CONFIGURATION MANAGEMENT | 
| 1.177 UBTU-24-901220 | CIS Ubuntu Linux 24.04 LTS STIG v1.0.0 CAT III | Unix | AUDIT AND ACCOUNTABILITY | 
| GEN000380 - All GIDs referenced in the /etc/passwd file must be defined in the /etc/group file. | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | CONFIGURATION MANAGEMENT | 
| GEN000380 - All Group Identifiers (GIDs) referenced in the /etc/passwd file must be defined in the /etc/group file. | DISA STIG AIX 6.1 v1r14 | Unix | CONFIGURATION MANAGEMENT | 
| GEN000510 - The system must display a publicly-viewable pattern during a graphical desktop environment session lock. | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL | 
| GEN001080 - The root shell must be located in the / file system. | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | CONFIGURATION MANAGEMENT | 
| GEN001280 - Manual page files must have mode 0644 or less permissive - '/usr/share/infopage/*' | DISA STIG AIX 6.1 v1r14 | Unix | ACCESS CONTROL | 
| GEN001280 - Manual page files must have mode 0644 or less permissive - '/usr/share/man/*' | DISA STIG AIX 6.1 v1r14 | Unix | ACCESS CONTROL | 
| GEN001290 - All manual page files must not have extended ACLs - '/usr/share/man' | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL | 
| GEN001375 - For systems using DNS resolution, at least two name servers must be configured | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | SYSTEM AND COMMUNICATIONS PROTECTION | 
| GEN001375 - For systems using DNS resolution, at least two name servers must be configured - first name server | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | SYSTEM AND COMMUNICATIONS PROTECTION | 
| GEN001550 - Files and directories in user home directories must be group-owned by a group of which the home directory's owner is a member. | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL | 
| GEN001780 - Global initialization files must contain the 'mesg -n' or 'mesg n' commands - '/etc/csh.cshrc' | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | CONFIGURATION MANAGEMENT | 
| GEN001780 - Global initialization files must contain the 'mesg -n' or 'mesg n' commands - '/etc/csh.login' | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | CONFIGURATION MANAGEMENT | 
| GEN001780 - Global initialization files must contain the 'mesg -n' or 'mesg n' commands - '/etc/environment' | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | CONFIGURATION MANAGEMENT | 
| GEN002715 - System audit tool executables must be owned by root - '/sbin/auditctl' | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | AUDIT AND ACCOUNTABILITY | 
| GEN002716 - System audit tool executables must be group-owned by bin, sys, or system - '/usr/sbin/auditbin' | DISA STIG AIX 6.1 v1r14 | Unix | AUDIT AND ACCOUNTABILITY | 
| GEN002716 - System audit tool executables must be group-owned by bin, sys, or system - '/usr/sbin/auditcat' | DISA STIG AIX 6.1 v1r14 | Unix | AUDIT AND ACCOUNTABILITY | 
| GEN002716 - System audit tool executables must be group-owned by bin, sys, or system - '/usr/sbin/auditconv' | DISA STIG AIX 6.1 v1r14 | Unix | AUDIT AND ACCOUNTABILITY | 
| GEN002716 - System audit tool executables must be group-owned by bin, sys, or system - '/usr/sbin/auditmerge' | DISA STIG AIX 6.1 v1r14 | Unix | AUDIT AND ACCOUNTABILITY | 
| GEN002716 - System audit tool executables must be group-owned by root, bin, sys, or system - '/sbin/auditd' | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | AUDIT AND ACCOUNTABILITY | 
| GEN002716 - System audit tool executables must be group-owned by root, bin, sys, or system - '/sbin/ausearch' | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | AUDIT AND ACCOUNTABILITY | 
| GEN002716 - System audit tool executables must be group-owned by root, bin, sys, or system - '/sbin/autrace' | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | AUDIT AND ACCOUNTABILITY | 
| GEN002717 - System audit tool executables must have mode 0750 or less permissive - '/sbin/aureport' | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | AUDIT AND ACCOUNTABILITY | 
| GEN002717 - System audit tool executables must have mode 0750 or less permissive - '/sbin/ausearch' | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | AUDIT AND ACCOUNTABILITY | 
| GEN002717 - System audit tool executables must have mode 0750 or less permissive - '/sbin/autrace' | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | AUDIT AND ACCOUNTABILITY | 
| GEN002717 - System audit tool executables must have mode 0750 or less permissive - '/usr/sbin/audit' | DISA STIG AIX 6.1 v1r14 | Unix | AUDIT AND ACCOUNTABILITY | 
| GEN002718 - System audit tool executables must not have extended ACLs - '/sbin/ausearch' | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | AUDIT AND ACCOUNTABILITY | 
| GEN002718 - System audit tool executables must not have extended ACLs - '/usr/sbin/auditcat' | DISA STIG AIX 6.1 v1r14 | Unix | AUDIT AND ACCOUNTABILITY | 
| GEN002718 - System audit tool executables must not have extended ACLs - '/usr/sbin/auditconv' | DISA STIG AIX 6.1 v1r14 | Unix | AUDIT AND ACCOUNTABILITY | 
| GEN002718 - System audit tool executables must not have extended ACLs - '/usr/sbin/auditstream' | DISA STIG AIX 6.1 v1r14 | Unix | AUDIT AND ACCOUNTABILITY | 
| GEN003220 - Cron programs must not set the umask to a value less restrictive than 077 - '/etc/cron.daily/*' | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL | 
| GEN003220 - Cron programs must not set the umask to a value less restrictive than 077 - '/var/spool/cron/*' | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL | 
| GEN003520 - The kernel core dump data directory must be owned by root. | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL | 
| GEN003521 - The kernel core dump data directory must be group-owned by bin, sys, or system. | DISA STIG AIX 6.1 v1r14 | Unix | ACCESS CONTROL | 
| GEN003521 - The kernel core dump data directory must be group-owned by root, bin, sys, or system. | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL | 
| GEN003523 - The kernel core dump data directory must not have an extended ACL. | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL | 
| GEN003602 - The system must not process Internet Control Message Protocol (ICMP) timestamp requests - 'timestamp-reply -j DROP' | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL | 
| GEN003623 - The system must use a separate file system for the system audit data path. | DISA STIG AIX 6.1 v1r14 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION | 
| GEN003624 - The system must use a separate file system for /tmp (or equivalent). | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | SYSTEM AND COMMUNICATIONS PROTECTION | 
| GEN003800 - Xinetd logging/tracing must be enabled - '/etc/xinetd.d/* log_on_success' | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | AUDIT AND ACCOUNTABILITY | 
| GEN003860 - The system must not have the finger service active. | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL | 
| GEN004560 - The SMTP service's SMTP greeting must not provide version information. | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | CONFIGURATION MANAGEMENT | 
| GEN004700 - The Sendmail service must not have the wizard backdoor active. | DISA STIG AIX 6.1 v1r14 | Unix | CONFIGURATION MANAGEMENT | 
| GEN005533 - The SSH daemon must limit connections to a single session. | DISA STIG AIX 6.1 v1r14 | Unix | ACCESS CONTROL | 
| GEN005760 - The NFS export configuration file must have mode 0644 or less permissive. | DISA STIG AIX 6.1 v1r14 | Unix | ACCESS CONTROL | 
| GEN005770 - The NFS exports configuration file must not have an extended ACL. | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL | 
| GEN006571 - The file integrity tool must be configured to verify extended attributes. | DISA STIG AIX 6.1 v1r14 | Unix | SYSTEM AND INFORMATION INTEGRITY | 
| GEN008500 - The system must have IEEE 1394 (Firewire) disabled unless needed. | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | CONFIGURATION MANAGEMENT |