Item Search

NameAudit NamePluginCategory
1.12 UBTU-22-215020CIS Ubuntu Linux 22.04 LTS STIG v1.0.0 CAT IIIUnix

CONFIGURATION MANAGEMENT

1.34 UBTU-24-200000CIS Ubuntu Linux 24.04 LTS STIG v1.0.0 CAT IIIUnix

ACCESS CONTROL

1.173 UBTU-24-900920CIS Ubuntu Linux 24.04 LTS STIG v1.0.0 CAT IIIUnix

AUDIT AND ACCOUNTABILITY

AIOS-01-080004 - Apple iOS must enforce a minimum password length of six characters.MobileIron - DISA Apple iOS 10 v1r3MDM

IDENTIFICATION AND AUTHENTICATION

EDGE-00-000042 - Extensions that are approved for use must be allowlisted if used.DISA STIG Edge v2r2Windows

CONFIGURATION MANAGEMENT

GEN000450 - System must limit users to 10 simultaneous system logins or a site-defined number in accordance with operational requirementsDISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN001280 - Manual page files must have mode 0644 or less permissive - '/usr/share/info/*'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN001290 - All manual page files must not have extended ACLs - '/usr/share/info/*'DISA STIG AIX 6.1 v1r14Unix

ACCESS CONTROL

GEN001490 - User home directories must not have extended ACLs.DISA STIG AIX 6.1 v1r14Unix

ACCESS CONTROL

GEN001560 - All files and directories contained in user's home directories must have mode 0750 or less permissive.DISA STIG AIX 6.1 v1r14Unix

ACCESS CONTROL

GEN001780 - Global initialization files must contain the 'mesg -n' or 'mesg n' commands - '/etc/ksh.kshrc'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

CONFIGURATION MANAGEMENT

GEN001780 - Global initialization files must contain the 'mesg -n' or 'mesg n' commands - '/etc/profile.d/*'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

CONFIGURATION MANAGEMENT

GEN001780 - Global initialization files must contain the mesg -n or mesg n commands.DISA STIG AIX 6.1 v1r14Unix

CONFIGURATION MANAGEMENT

GEN002300 - Device files used for backup must only be readable and/or writable by root or the backup user.DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

CONFIGURATION MANAGEMENT

GEN002715 - System audit tool executables must be owned by root - '/sbin/autrace'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

AUDIT AND ACCOUNTABILITY

GEN002715 - System audit tool executables must be owned by root - '/usr/sbin/auditbin'DISA STIG AIX 6.1 v1r14Unix

AUDIT AND ACCOUNTABILITY

GEN002715 - System audit tool executables must be owned by root - '/usr/sbin/auditconv'DISA STIG AIX 6.1 v1r14Unix

AUDIT AND ACCOUNTABILITY

GEN002715 - System audit tool executables must be owned by root - '/usr/sbin/auditselect'DISA STIG AIX 6.1 v1r14Unix

AUDIT AND ACCOUNTABILITY

GEN002716 - System audit tool executables must be group-owned by root, bin, sys, or system - '/sbin/audispd'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

AUDIT AND ACCOUNTABILITY

GEN002717 - System audit tool executables must have mode 0750 or less permissive - '/usr/sbin/auditbin'DISA STIG AIX 6.1 v1r14Unix

AUDIT AND ACCOUNTABILITY

GEN002717 - System audit tool executables must have mode 0750 or less permissive - '/usr/sbin/auditcat'DISA STIG AIX 6.1 v1r14Unix

AUDIT AND ACCOUNTABILITY

GEN002717 - System audit tool executables must have mode 0750 or less permissive - '/usr/sbin/auditconv'DISA STIG AIX 6.1 v1r14Unix

AUDIT AND ACCOUNTABILITY

GEN002718 - System audit tool executables must not have extended ACLs - '/sbin/auditd'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

AUDIT AND ACCOUNTABILITY

GEN002718 - System audit tool executables must not have extended ACLs - '/sbin/autrace'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

AUDIT AND ACCOUNTABILITY

GEN002718 - System audit tool executables must not have extended ACLs - '/usr/sbin/auditselect'DISA STIG AIX 6.1 v1r14Unix

AUDIT AND ACCOUNTABILITY

GEN002719 - The audit system must alert the SA in the event of an audit processing failure - '/etc/audit/auditd.conf disk_error_action'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

AUDIT AND ACCOUNTABILITY

GEN003220 - Cron programs must not set the umask to a value less restrictive than 077 - '/etc/cron.d/*'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN003220 - Cron programs must not set the umask to a value less restrictive than 077 - '/etc/cron.hourly/*'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN003522 - The kernel core dump data directory must have mode 0700 or less permissive.DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN003602 - The system must not process ICMP timestamp requests.DISA STIG AIX 6.1 v1r14Unix

ACCESS CONTROL

GEN003611 - The system must log martian packets.DISA STIG AIX 6.1 v1r14Unix

AUDIT AND ACCOUNTABILITY

GEN003621 - The system must use a separate file system for /var.DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

SYSTEM AND COMMUNICATIONS PROTECTION

GEN003800 - Xinetd logging/tracing must be enabled - '/etc/xinetd.conf log_on_failure'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

AUDIT AND ACCOUNTABILITY

GEN003800 - Xinetd logging/tracing must be enabled - '/etc/xinetd.conf log_on_success'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

AUDIT AND ACCOUNTABILITY

GEN003800 - Xinetd logging/tracing must be enabled - '/etc/xinetd.conf log_type'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

AUDIT AND ACCOUNTABILITY

GEN003800 - Xinetd logging/tracing must be enabled - '/etc/xinetd.d/* log_on_failure'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

AUDIT AND ACCOUNTABILITY

GEN003860 - The system must not have the finger service active.DISA STIG AIX 6.1 v1r14Unix

ACCESS CONTROL

GEN004440 - Sendmail logging must not be set to less than nine in the sendmail.cf file.DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

CONFIGURATION MANAGEMENT

GEN004660 - The SMTP service must not have the EXPN feature active.DISA STIG AIX 6.1 v1r14Unix

CONFIGURATION MANAGEMENT

GEN004980 - The FTP daemon must be configured for logging or verbose mode - '/etc/inetd.conf contains ftpd -l'DISA STIG AIX 6.1 v1r14Unix

AUDIT AND ACCOUNTABILITY

GEN005524 - The SSH daemon must not permit GSSAPI authentication unless needed.DISA STIG AIX 6.1 v1r14Unix

CONFIGURATION MANAGEMENT

GEN005526 - The SSH daemon must not permit Kerberos authentication unless needed.DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

CONFIGURATION MANAGEMENT

GEN005760 - The NFS export configuration file must have mode 0644 or less permissive.DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN005770 - The NFS exports configuration file must not have an extended ACL.DISA STIG AIX 6.1 v1r14Unix

ACCESS CONTROL

GEN006570 - The file integrity tool must be configured to verify ACLs.DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

SYSTEM AND INFORMATION INTEGRITY

GEN006575 - The file integrity tool must use FIPS 140-2 approved cryptographic hashes for validating file contents.DISA STIG AIX 6.1 v1r14Unix

SYSTEM AND INFORMATION INTEGRITY

GEN006575 - The file integrity tool must use FIPS 140-2 approved cryptographic hashes for validating file contents.DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

SYSTEM AND INFORMATION INTEGRITY

GEN008420 - The system must use available memory address randomization techniques.DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

CONFIGURATION MANAGEMENT

GEN008460 - The system must have USB disabled unless needed - 'lsdev'DISA STIG AIX 6.1 v1r14Unix

CONFIGURATION MANAGEMENT

SPLK-CL-000410 - Splunk Enterprise must be configured to prohibit password reuse for a minimum of five generations.DISA STIG Splunk Enterprise 8.x for Linux v2r2 STIG OSUnix

IDENTIFICATION AND AUTHENTICATION