Item Search

NameAudit NamePluginCategory
CNTR-K8-000850 - Kubernetes Kubelet must deny hostname override.DISA STIG Kubernetes v1r11Unix

CONFIGURATION MANAGEMENT

CNTR-K8-000880 - The Kubernetes KubeletConfiguration file must be owned by root.DISA STIG Kubernetes v1r11Unix

CONFIGURATION MANAGEMENT

CNTR-K8-000890 - The Kubernetes KubeletConfiguration files must have file permissions set to 644 or more restrictive.DISA STIG Kubernetes v1r11Unix

CONFIGURATION MANAGEMENT

EPAS-00-003200 - Software, applications, and configuration files that are part of, or related to, the EDB Postgres Advanced Server installation must be monitored to discover unauthorized changes.EnterpriseDB PostgreSQL Advanced Server OS Linux v1r1Unix

CONFIGURATION MANAGEMENT

EPAS-00-003210 - EDB Postgres Advanced Server software modules, to include stored procedures, functions, and triggers must be monitored to discover unauthorized changes.EnterpriseDB PostgreSQL Advanced Server DB v1r1PostgreSQLDB

CONFIGURATION MANAGEMENT

EPAS-00-003300 - The EDB Postgres Advanced Server software installation account must be restricted to authorized users.EnterpriseDB PostgreSQL Advanced Server DB v1r1PostgreSQLDB

CONFIGURATION MANAGEMENT

EPAS-00-003400 - Database software, including EDB Postgres Advanced Server configuration files, must be stored in dedicated directories, separate from the host OS and other applications.EnterpriseDB PostgreSQL Advanced Server OS Linux v1r1Unix

CONFIGURATION MANAGEMENT

FGFW-ND-000155 - The FortiGate device must limit privileges to change the software resident within software libraries.DISA Fortigate Firewall NDM STIG v1r4FortiGate

CONFIGURATION MANAGEMENT

MADB-10-002600 - MariaDB must limit privileges to change software modules, to include stored procedures, functions and triggers, and links to software external to the DBMS.DISA MariaDB Enterprise 10.x v1r3 DBMySQLDB

CONFIGURATION MANAGEMENT

MADB-10-003000 - The role(s)/group(s) used to modify database structure (including but not necessarily limited to tables, indexes, storage, etc.) and logic modules (stored procedures, functions, triggers, links to software external to the MariaDB, etc.) must be restricted to authorized users.DISA MariaDB Enterprise 10.x v1r3 DBMySQLDB

CONFIGURATION MANAGEMENT

MD4X-00-002000 - MongoDB must limit privileges to change software modules, to include stored procedures, functions and triggers, and links to software external to MongoDB.DISA STIG MongoDB Enterprise Advanced 4.x v1r3 DBMongoDB

CONFIGURATION MANAGEMENT

MD4X-00-002400 - The role(s)/group(s) used to modify database structure (including but not necessarily limited to tables, indexes, storage, etc.) and logic modules (stored procedures, functions, triggers, links to software external to MongoDB, etc.) must be restricted to authorized users.DISA STIG MongoDB Enterprise Advanced 4.x v1r3 DBMongoDB

CONFIGURATION MANAGEMENT

MYS8-00-008300 - The MySQL Database Server 8.0 must limit privileges to change software modules, to include stored procedures, functions and triggers, and links to software external to the MySQL Database Server 8.0.DISA Oracle MySQL 8.0 v1r5 DBMySQLDB

CONFIGURATION MANAGEMENT

MYS8-00-008400 - The MySQL Database Server 8.0 software installation account must be restricted to authorized users.DISA Oracle MySQL 8.0 v1r5 DBMySQLDB

CONFIGURATION MANAGEMENT

MYS8-00-008500 - Database software, including MySQL Database Server 8.0 configuration files, must be stored in dedicated directories, or DASD pools (remove), separate from the host OS and other applications.DISA Oracle MySQL 8.0 v1r5 DBMySQLDB

CONFIGURATION MANAGEMENT

MYS8-00-008700 - The role(s)/group(s) used to modify database structure (including but not necessarily limited to tables, indexes, storage, etc.) and logic modules (stored procedures, functions, triggers, links to software external to the MySQL Database Server 8.0, etc.) must be restricted to authorized users.DISA Oracle MySQL 8.0 v1r5 DBMySQLDB

CONFIGURATION MANAGEMENT

OL08-00-010310 - OL 8 system commands must be owned by root.DISA Oracle Linux 8 STIG v1r9Unix

CONFIGURATION MANAGEMENT

OL08-00-010331 - OL 8 library directories must have mode 755 or less permissive.DISA Oracle Linux 8 STIG v1r9Unix

CONFIGURATION MANAGEMENT

OL08-00-010341 - OL 8 library directories must be owned by root.DISA Oracle Linux 8 STIG v1r9Unix

CONFIGURATION MANAGEMENT

OL08-00-010351 - OL 8 library directories must be group-owned by root or a system account.DISA Oracle Linux 8 STIG v1r9Unix

CONFIGURATION MANAGEMENT

RHEL-08-010300 - RHEL 8 system commands must have mode 755 or less permissive.DISA Red Hat Enterprise Linux 8 STIG v1r14Unix

CONFIGURATION MANAGEMENT

RHEL-08-010310 - RHEL 8 system commands must be owned by root.DISA Red Hat Enterprise Linux 8 STIG v1r14Unix

CONFIGURATION MANAGEMENT

RHEL-08-010320 - RHEL 8 system commands must be group-owned by root or a system account.DISA Red Hat Enterprise Linux 8 STIG v1r14Unix

CONFIGURATION MANAGEMENT

RHEL-08-010341 - RHEL 8 library directories must be owned by root.DISA Red Hat Enterprise Linux 8 STIG v1r14Unix

CONFIGURATION MANAGEMENT

RHEL-08-010351 - RHEL 8 library directories must be group-owned by root or a system account.DISA Red Hat Enterprise Linux 8 STIG v1r14Unix

CONFIGURATION MANAGEMENT

RHEL-09-232010 - RHEL 9 system commands must have mode 755 or less permissive.DISA Red Hat Enterprise Linux 9 STIG v1r3Unix

CONFIGURATION MANAGEMENT

RHEL-09-232190 - RHEL 9 system commands must be owned by root.DISA Red Hat Enterprise Linux 9 STIG v1r3Unix

CONFIGURATION MANAGEMENT

SLES-12-010871 - The SUSE operating system library files must have mode 0755 or less permissive.DISA SLES 12 STIG v2r13Unix

CONFIGURATION MANAGEMENT

SLES-12-010873 - The SUSE operating system library files must be owned by root.DISA SLES 12 STIG v2r13Unix

CONFIGURATION MANAGEMENT

SLES-12-010875 - The SUSE operating system library files must be group-owned by root.DISA SLES 12 STIG v2r13Unix

CONFIGURATION MANAGEMENT

SLES-12-010877 - The SUSE operating system must have system commands set to a mode of 755 or less permissive.DISA SLES 12 STIG v2r13Unix

CONFIGURATION MANAGEMENT

SLES-12-010883 - The SUSE operating system must have directories that contain system commands group-owned by root.DISA SLES 12 STIG v2r13Unix

CONFIGURATION MANAGEMENT

SLES-15-010351 - The SUSE operating system library files must have mode 0755 or less permissive.DISA SLES 15 STIG v1r12Unix

CONFIGURATION MANAGEMENT

SLES-15-010352 - The SUSE operating system library directories must have mode 0755 or less permissive.DISA SLES 15 STIG v1r12Unix

CONFIGURATION MANAGEMENT

SLES-15-010354 - The SUSE operating system library directories must be owned by root.DISA SLES 15 STIG v1r12Unix

CONFIGURATION MANAGEMENT

SLES-15-010355 - The SUSE operating system library files must be group-owned by root.DISA SLES 15 STIG v1r12Unix

CONFIGURATION MANAGEMENT

SQL2-00-004400 - SQL Server must not grant users direct access to the View Any Database permission.DISA STIG SQL Server 2012 DB Instance Security v1r20MS_SQLDB

CONFIGURATION MANAGEMENT

SQL2-00-014900 - SQL Server must be monitored to discover unauthorized changes to functions.DISA STIG SQL Server 2012 Database Audit v1r20MS_SQLDB

CONFIGURATION MANAGEMENT

SQL2-00-015100 - SQL Server must be monitored to discover unauthorized changes to triggers.DISA STIG SQL Server 2012 Database Audit v1r20MS_SQLDB

CONFIGURATION MANAGEMENT

SQL2-00-015200 - SQL Server must be monitored to discover unauthorized changes to stored procedures.DISA STIG SQL Server 2012 Database Audit v1r20MS_SQLDB

CONFIGURATION MANAGEMENT

SQL2-00-015300 - SQL Server must monitor for security-relevant configuration settings to discover unauthorized changes.DISA STIG SQL Server 2012 DB Instance Security v1r20MS_SQLDB

CONFIGURATION MANAGEMENT

SQL2-00-015400 - SQL Server software installation account(s) must be restricted to authorized users.DISA STIG SQL Server 2012 Database OS Audit v1r20Windows

CONFIGURATION MANAGEMENT

SQL2-00-015600 - Database objects must be owned by accounts authorized for ownership.DISA STIG SQL Server 2012 Database Audit v1r20MS_SQLDB

CONFIGURATION MANAGEMENT

SQL2-00-015610 - In a database owned by [sa], or by any other login having administrative privileges at the instance level, the database property TRUSTWORTHY must be OFF.DISA STIG SQL Server 2012 Database Audit v1r20MS_SQLDB

CONFIGURATION MANAGEMENT

SQL2-00-015620 - In a database owned by a login not having administrative privileges at the instance level, the database property TRUSTWORTHY must be OFF unless required and authorized.DISA STIG SQL Server 2012 Database Audit v1r20MS_SQLDB

CONFIGURATION MANAGEMENT

SQL2-00-025300 - The OS must limit privileges to the SQL Server backup directories and files.DISA STIG SQL Server 2012 Database OS Audit v1r20Windows

CONFIGURATION MANAGEMENT

SQL4-00-014900 - SQL Server must be monitored to discover unauthorized changes to functions.DISA STIG SQL Server 2014 Database Audit v1r6MS_SQLDB

CONFIGURATION MANAGEMENT

UBTU-20-010457 - The Ubuntu operating system must have system commands owned by root or a system account.DISA STIG Ubuntu 20.04 LTS v1r12Unix

CONFIGURATION MANAGEMENT

UBTU-20-010458 - The Ubuntu operating system must have system commands group-owned by root or a system account.DISA STIG Ubuntu 20.04 LTS v1r12Unix

CONFIGURATION MANAGEMENT

VCPG-67-000008 - All VCDB tables must be owned by the 'vc' user account - vc user account.DISA STIG VMware vSphere 6.7 PostgreSQL v1r2Unix

CONFIGURATION MANAGEMENT