CNTR-K8-000850 - Kubernetes Kubelet must deny hostname override. | DISA STIG Kubernetes v1r11 | Unix | CONFIGURATION MANAGEMENT |
CNTR-K8-000880 - The Kubernetes KubeletConfiguration file must be owned by root. | DISA STIG Kubernetes v1r11 | Unix | CONFIGURATION MANAGEMENT |
CNTR-K8-000890 - The Kubernetes KubeletConfiguration files must have file permissions set to 644 or more restrictive. | DISA STIG Kubernetes v1r11 | Unix | CONFIGURATION MANAGEMENT |
EPAS-00-003200 - Software, applications, and configuration files that are part of, or related to, the EDB Postgres Advanced Server installation must be monitored to discover unauthorized changes. | EnterpriseDB PostgreSQL Advanced Server OS Linux v1r1 | Unix | CONFIGURATION MANAGEMENT |
EPAS-00-003210 - EDB Postgres Advanced Server software modules, to include stored procedures, functions, and triggers must be monitored to discover unauthorized changes. | EnterpriseDB PostgreSQL Advanced Server DB v1r1 | PostgreSQLDB | CONFIGURATION MANAGEMENT |
EPAS-00-003300 - The EDB Postgres Advanced Server software installation account must be restricted to authorized users. | EnterpriseDB PostgreSQL Advanced Server DB v1r1 | PostgreSQLDB | CONFIGURATION MANAGEMENT |
EPAS-00-003400 - Database software, including EDB Postgres Advanced Server configuration files, must be stored in dedicated directories, separate from the host OS and other applications. | EnterpriseDB PostgreSQL Advanced Server OS Linux v1r1 | Unix | CONFIGURATION MANAGEMENT |
FGFW-ND-000155 - The FortiGate device must limit privileges to change the software resident within software libraries. | DISA Fortigate Firewall NDM STIG v1r4 | FortiGate | CONFIGURATION MANAGEMENT |
MADB-10-002600 - MariaDB must limit privileges to change software modules, to include stored procedures, functions and triggers, and links to software external to the DBMS. | DISA MariaDB Enterprise 10.x v1r3 DB | MySQLDB | CONFIGURATION MANAGEMENT |
MADB-10-003000 - The role(s)/group(s) used to modify database structure (including but not necessarily limited to tables, indexes, storage, etc.) and logic modules (stored procedures, functions, triggers, links to software external to the MariaDB, etc.) must be restricted to authorized users. | DISA MariaDB Enterprise 10.x v1r3 DB | MySQLDB | CONFIGURATION MANAGEMENT |
MD4X-00-002000 - MongoDB must limit privileges to change software modules, to include stored procedures, functions and triggers, and links to software external to MongoDB. | DISA STIG MongoDB Enterprise Advanced 4.x v1r3 DB | MongoDB | CONFIGURATION MANAGEMENT |
MD4X-00-002400 - The role(s)/group(s) used to modify database structure (including but not necessarily limited to tables, indexes, storage, etc.) and logic modules (stored procedures, functions, triggers, links to software external to MongoDB, etc.) must be restricted to authorized users. | DISA STIG MongoDB Enterprise Advanced 4.x v1r3 DB | MongoDB | CONFIGURATION MANAGEMENT |
MYS8-00-008300 - The MySQL Database Server 8.0 must limit privileges to change software modules, to include stored procedures, functions and triggers, and links to software external to the MySQL Database Server 8.0. | DISA Oracle MySQL 8.0 v1r5 DB | MySQLDB | CONFIGURATION MANAGEMENT |
MYS8-00-008400 - The MySQL Database Server 8.0 software installation account must be restricted to authorized users. | DISA Oracle MySQL 8.0 v1r5 DB | MySQLDB | CONFIGURATION MANAGEMENT |
MYS8-00-008500 - Database software, including MySQL Database Server 8.0 configuration files, must be stored in dedicated directories, or DASD pools (remove), separate from the host OS and other applications. | DISA Oracle MySQL 8.0 v1r5 DB | MySQLDB | CONFIGURATION MANAGEMENT |
MYS8-00-008700 - The role(s)/group(s) used to modify database structure (including but not necessarily limited to tables, indexes, storage, etc.) and logic modules (stored procedures, functions, triggers, links to software external to the MySQL Database Server 8.0, etc.) must be restricted to authorized users. | DISA Oracle MySQL 8.0 v1r5 DB | MySQLDB | CONFIGURATION MANAGEMENT |
OL08-00-010310 - OL 8 system commands must be owned by root. | DISA Oracle Linux 8 STIG v1r9 | Unix | CONFIGURATION MANAGEMENT |
OL08-00-010331 - OL 8 library directories must have mode 755 or less permissive. | DISA Oracle Linux 8 STIG v1r9 | Unix | CONFIGURATION MANAGEMENT |
OL08-00-010341 - OL 8 library directories must be owned by root. | DISA Oracle Linux 8 STIG v1r9 | Unix | CONFIGURATION MANAGEMENT |
OL08-00-010351 - OL 8 library directories must be group-owned by root or a system account. | DISA Oracle Linux 8 STIG v1r9 | Unix | CONFIGURATION MANAGEMENT |
RHEL-08-010300 - RHEL 8 system commands must have mode 755 or less permissive. | DISA Red Hat Enterprise Linux 8 STIG v1r14 | Unix | CONFIGURATION MANAGEMENT |
RHEL-08-010310 - RHEL 8 system commands must be owned by root. | DISA Red Hat Enterprise Linux 8 STIG v1r14 | Unix | CONFIGURATION MANAGEMENT |
RHEL-08-010320 - RHEL 8 system commands must be group-owned by root or a system account. | DISA Red Hat Enterprise Linux 8 STIG v1r14 | Unix | CONFIGURATION MANAGEMENT |
RHEL-08-010341 - RHEL 8 library directories must be owned by root. | DISA Red Hat Enterprise Linux 8 STIG v1r14 | Unix | CONFIGURATION MANAGEMENT |
RHEL-08-010351 - RHEL 8 library directories must be group-owned by root or a system account. | DISA Red Hat Enterprise Linux 8 STIG v1r14 | Unix | CONFIGURATION MANAGEMENT |
RHEL-09-232010 - RHEL 9 system commands must have mode 755 or less permissive. | DISA Red Hat Enterprise Linux 9 STIG v1r3 | Unix | CONFIGURATION MANAGEMENT |
RHEL-09-232190 - RHEL 9 system commands must be owned by root. | DISA Red Hat Enterprise Linux 9 STIG v1r3 | Unix | CONFIGURATION MANAGEMENT |
SLES-12-010871 - The SUSE operating system library files must have mode 0755 or less permissive. | DISA SLES 12 STIG v2r13 | Unix | CONFIGURATION MANAGEMENT |
SLES-12-010873 - The SUSE operating system library files must be owned by root. | DISA SLES 12 STIG v2r13 | Unix | CONFIGURATION MANAGEMENT |
SLES-12-010875 - The SUSE operating system library files must be group-owned by root. | DISA SLES 12 STIG v2r13 | Unix | CONFIGURATION MANAGEMENT |
SLES-12-010877 - The SUSE operating system must have system commands set to a mode of 755 or less permissive. | DISA SLES 12 STIG v2r13 | Unix | CONFIGURATION MANAGEMENT |
SLES-12-010883 - The SUSE operating system must have directories that contain system commands group-owned by root. | DISA SLES 12 STIG v2r13 | Unix | CONFIGURATION MANAGEMENT |
SLES-15-010351 - The SUSE operating system library files must have mode 0755 or less permissive. | DISA SLES 15 STIG v1r12 | Unix | CONFIGURATION MANAGEMENT |
SLES-15-010352 - The SUSE operating system library directories must have mode 0755 or less permissive. | DISA SLES 15 STIG v1r12 | Unix | CONFIGURATION MANAGEMENT |
SLES-15-010354 - The SUSE operating system library directories must be owned by root. | DISA SLES 15 STIG v1r12 | Unix | CONFIGURATION MANAGEMENT |
SLES-15-010355 - The SUSE operating system library files must be group-owned by root. | DISA SLES 15 STIG v1r12 | Unix | CONFIGURATION MANAGEMENT |
SQL2-00-004400 - SQL Server must not grant users direct access to the View Any Database permission. | DISA STIG SQL Server 2012 DB Instance Security v1r20 | MS_SQLDB | CONFIGURATION MANAGEMENT |
SQL2-00-014900 - SQL Server must be monitored to discover unauthorized changes to functions. | DISA STIG SQL Server 2012 Database Audit v1r20 | MS_SQLDB | CONFIGURATION MANAGEMENT |
SQL2-00-015100 - SQL Server must be monitored to discover unauthorized changes to triggers. | DISA STIG SQL Server 2012 Database Audit v1r20 | MS_SQLDB | CONFIGURATION MANAGEMENT |
SQL2-00-015200 - SQL Server must be monitored to discover unauthorized changes to stored procedures. | DISA STIG SQL Server 2012 Database Audit v1r20 | MS_SQLDB | CONFIGURATION MANAGEMENT |
SQL2-00-015300 - SQL Server must monitor for security-relevant configuration settings to discover unauthorized changes. | DISA STIG SQL Server 2012 DB Instance Security v1r20 | MS_SQLDB | CONFIGURATION MANAGEMENT |
SQL2-00-015400 - SQL Server software installation account(s) must be restricted to authorized users. | DISA STIG SQL Server 2012 Database OS Audit v1r20 | Windows | CONFIGURATION MANAGEMENT |
SQL2-00-015600 - Database objects must be owned by accounts authorized for ownership. | DISA STIG SQL Server 2012 Database Audit v1r20 | MS_SQLDB | CONFIGURATION MANAGEMENT |
SQL2-00-015610 - In a database owned by [sa], or by any other login having administrative privileges at the instance level, the database property TRUSTWORTHY must be OFF. | DISA STIG SQL Server 2012 Database Audit v1r20 | MS_SQLDB | CONFIGURATION MANAGEMENT |
SQL2-00-015620 - In a database owned by a login not having administrative privileges at the instance level, the database property TRUSTWORTHY must be OFF unless required and authorized. | DISA STIG SQL Server 2012 Database Audit v1r20 | MS_SQLDB | CONFIGURATION MANAGEMENT |
SQL2-00-025300 - The OS must limit privileges to the SQL Server backup directories and files. | DISA STIG SQL Server 2012 Database OS Audit v1r20 | Windows | CONFIGURATION MANAGEMENT |
SQL4-00-014900 - SQL Server must be monitored to discover unauthorized changes to functions. | DISA STIG SQL Server 2014 Database Audit v1r6 | MS_SQLDB | CONFIGURATION MANAGEMENT |
UBTU-20-010457 - The Ubuntu operating system must have system commands owned by root or a system account. | DISA STIG Ubuntu 20.04 LTS v1r12 | Unix | CONFIGURATION MANAGEMENT |
UBTU-20-010458 - The Ubuntu operating system must have system commands group-owned by root or a system account. | DISA STIG Ubuntu 20.04 LTS v1r12 | Unix | CONFIGURATION MANAGEMENT |
VCPG-67-000008 - All VCDB tables must be owned by the 'vc' user account - vc user account. | DISA STIG VMware vSphere 6.7 PostgreSQL v1r2 | Unix | CONFIGURATION MANAGEMENT |