1.2.1 Restrict Access to VTY Sessions | CIS Cisco NX-OS v1.2.0 L1 | Cisco | ACCESS CONTROL, CONFIGURATION MANAGEMENT, MAINTENANCE, SYSTEM AND INFORMATION INTEGRITY |
1.2.6 Set the Maximum Number of VTY Sessions | CIS Cisco NX-OS v1.2.0 L1 | Cisco | CONFIGURATION MANAGEMENT, MAINTENANCE |
1.2.7 Disable the Telnet Feature | CIS Cisco NX-OS v1.2.0 L1 | Cisco | CONFIGURATION MANAGEMENT, MAINTENANCE |
4.6.3.7 Ensure sshd HostbasedAuthentication is disabled | CIS IBM AIX 7 v1.1.0 L1 | Unix | CONFIGURATION MANAGEMENT, MAINTENANCE |
4.6.3.8 Ensure sshd IgnoreRhosts is enabled | CIS IBM AIX 7 v1.1.0 L1 | Unix | CONFIGURATION MANAGEMENT, MAINTENANCE |
ARST-ND-000700 - The Arista network device must be configured to implement cryptographic mechanisms using a FIPS 140-2 approved algorithm to protect the confidentiality of remote maintenance sessions. | DISA STIG Arista MLS EOS 4.2x NDM v2r1 | Arista | MAINTENANCE |
Big Sur - Configure the System to Separate User and System Functionality - separate | NIST macOS Big Sur v1.4.0 - 800-53r4 High | Unix | MAINTENANCE, SYSTEM AND COMMUNICATIONS PROTECTION |
Big Sur - Configure the System to Separate User and System Functionality - separate | NIST macOS Big Sur v1.4.0 - 800-53r4 Moderate | Unix | MAINTENANCE, SYSTEM AND COMMUNICATIONS PROTECTION |
Big Sur - Configure the System to Separate User and System Functionality - separate | NIST macOS Big Sur v1.4.0 - CNSSI 1253 | Unix | MAINTENANCE, SYSTEM AND COMMUNICATIONS PROTECTION |
Big Sur - Configure the System to Separate User and System Functionality - separate | NIST macOS Big Sur v1.4.0 - 800-53r5 Moderate | Unix | MAINTENANCE, SYSTEM AND COMMUNICATIONS PROTECTION |
Big Sur - Configure the System to Separate User and System Functionality - separate | NIST macOS Big Sur v1.4.0 - 800-171 | Unix | MAINTENANCE, SYSTEM AND COMMUNICATIONS PROTECTION |
Big Sur - Configure the System to Separate User and System Functionality - separate | NIST macOS Big Sur v1.4.0 - 800-53r5 High | Unix | MAINTENANCE, SYSTEM AND COMMUNICATIONS PROTECTION |
Big Sur - Configure the System to Separate User and System Functionality - separate | NIST macOS Big Sur v1.4.0 - All Profiles | Unix | MAINTENANCE, SYSTEM AND COMMUNICATIONS PROTECTION |
Big Sur - Ensure System Volume is Read Only | NIST macOS Big Sur v1.4.0 - 800-53r4 High | Unix | MAINTENANCE, SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY |
Big Sur - Ensure System Volume is Read Only | NIST macOS Big Sur v1.4.0 - 800-53r4 Moderate | Unix | MAINTENANCE, SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY |
Big Sur - Ensure System Volume is Read Only | NIST macOS Big Sur v1.4.0 - 800-53r5 Moderate | Unix | MAINTENANCE, SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY |
Big Sur - Ensure System Volume is Read Only | NIST macOS Big Sur v1.4.0 - All Profiles | Unix | MAINTENANCE, SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY |
Big Sur - Ensure System Volume is Read Only | NIST macOS Big Sur v1.4.0 - 800-53r5 High | Unix | MAINTENANCE, SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY |
CASA-ND-001140 - The Cisco ASA must be configured to use FIPS-validated Keyed-Hash Message Authentication Code (HMAC) to protect the integrity of non-local maintenance and diagnostic communications. | DISA STIG Cisco ASA NDM v2r2 | Cisco | MAINTENANCE |
CASA-ND-001150 - The Cisco ASA must be configured to implement cryptographic mechanisms using a FIPS 140-2 approved algorithm to protect the confidentiality of remote maintenance sessions. | DISA STIG Cisco ASA NDM v2r2 | Cisco | MAINTENANCE |
Catalina - Configure SSHD to Use Secure Key Exchange Algorithms | NIST macOS Catalina v1.5.0 - All Profiles | Unix | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, MAINTENANCE |
Catalina - Configure the System to Separate User and System Functionality - separate | NIST macOS Catalina v1.5.0 - 800-171 | Unix | MAINTENANCE, SYSTEM AND COMMUNICATIONS PROTECTION |
Catalina - Configure the System to Separate User and System Functionality - separate | NIST macOS Catalina v1.5.0 - 800-53r4 High | Unix | MAINTENANCE, SYSTEM AND COMMUNICATIONS PROTECTION |
Catalina - Configure the System to Separate User and System Functionality - separate | NIST macOS Catalina v1.5.0 - 800-53r4 Moderate | Unix | MAINTENANCE, SYSTEM AND COMMUNICATIONS PROTECTION |
Catalina - Configure the System to Separate User and System Functionality - separate | NIST macOS Catalina v1.5.0 - 800-53r5 Moderate | Unix | MAINTENANCE, SYSTEM AND COMMUNICATIONS PROTECTION |
Catalina - Configure the System to Separate User and System Functionality - separate | NIST macOS Catalina v1.5.0 - All Profiles | Unix | MAINTENANCE, SYSTEM AND COMMUNICATIONS PROTECTION |
Catalina - Configure the System to Separate User and System Functionality - separate | NIST macOS Catalina v1.5.0 - CNSSI 1253 | Unix | MAINTENANCE, SYSTEM AND COMMUNICATIONS PROTECTION |
Catalina - Configure the System to Separate User and System Functionality - separate | NIST macOS Catalina v1.5.0 - 800-53r5 High | Unix | MAINTENANCE, SYSTEM AND COMMUNICATIONS PROTECTION |
Catalina - Ensure System Volume is Read Only | NIST macOS Catalina v1.5.0 - 800-53r4 High | Unix | MAINTENANCE, SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY |
Catalina - Ensure System Volume is Read Only | NIST macOS Catalina v1.5.0 - 800-53r4 Moderate | Unix | MAINTENANCE, SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY |
Catalina - Ensure System Volume is Read Only | NIST macOS Catalina v1.5.0 - All Profiles | Unix | MAINTENANCE, SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY |
Catalina - Ensure System Volume is Read Only | NIST macOS Catalina v1.5.0 - 800-53r5 High | Unix | MAINTENANCE, SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY |
Catalina - Ensure System Volume is Read Only | NIST macOS Catalina v1.5.0 - 800-53r5 Moderate | Unix | MAINTENANCE, SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY |
FGFW-ND-000260 - The FortiGate devices must use FIPS-validated Keyed-Hash Message Authentication Code (HMAC) to protect the integrity of nonlocal maintenance and diagnostic communications. | DISA Fortigate Firewall NDM STIG v1r4 | FortiGate | MAINTENANCE |
Monterey - Configure the System to Separate User and System Functionality - separate | NIST macOS Monterey v1.0.0 - 800-53r5 High | Unix | MAINTENANCE, SYSTEM AND COMMUNICATIONS PROTECTION |
Monterey - Configure the System to Separate User and System Functionality - separate | NIST macOS Monterey v1.0.0 - 800-171 | Unix | MAINTENANCE, SYSTEM AND COMMUNICATIONS PROTECTION |
Monterey - Configure the System to Separate User and System Functionality - separate | NIST macOS Monterey v1.0.0 - CNSSI 1253 | Unix | MAINTENANCE, SYSTEM AND COMMUNICATIONS PROTECTION |
Monterey - Configure the System to Separate User and System Functionality - separate | NIST macOS Monterey v1.0.0 - 800-53r4 Moderate | Unix | MAINTENANCE, SYSTEM AND COMMUNICATIONS PROTECTION |
Monterey - Configure the System to Separate User and System Functionality - separate | NIST macOS Monterey v1.0.0 - All Profiles | Unix | MAINTENANCE, SYSTEM AND COMMUNICATIONS PROTECTION |
Monterey - Configure the System to Separate User and System Functionality - separate | NIST macOS Monterey v1.0.0 - 800-53r4 High | Unix | MAINTENANCE, SYSTEM AND COMMUNICATIONS PROTECTION |
Monterey - Configure the System to Separate User and System Functionality - separate | NIST macOS Monterey v1.0.0 - 800-53r5 Moderate | Unix | MAINTENANCE, SYSTEM AND COMMUNICATIONS PROTECTION |
Monterey - Ensure System Volume is Read Only | NIST macOS Monterey v1.0.0 - 800-53r4 High | Unix | MAINTENANCE, SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY |
Monterey - Ensure System Volume is Read Only | NIST macOS Monterey v1.0.0 - 800-53r4 Moderate | Unix | MAINTENANCE, SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY |
Monterey - Ensure System Volume is Read Only | NIST macOS Monterey v1.0.0 - 800-53r5 Moderate | Unix | MAINTENANCE, SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY |
Monterey - Ensure System Volume is Read Only | NIST macOS Monterey v1.0.0 - All Profiles | Unix | MAINTENANCE, SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY |
Monterey - Ensure System Volume is Read Only | NIST macOS Monterey v1.0.0 - 800-53r5 High | Unix | MAINTENANCE, SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY |
Monterey - Verify remote disconnection of sessions | NIST macOS Monterey v1.0.0 - All Profiles | Unix | MAINTENANCE |
SYMP-NM-000290 - The Symantec ProxySG Web Management Console and SSH sessions must implement cryptographic mechanisms to protect the confidentiality of nonlocal maintenance and diagnostic communications. | DISA Symantec ProxySG Benchmark NDM v1r2 | BlueCoat | MAINTENANCE |
SYMP-NM-000300 - The Symantec ProxySG must use FIPS-validated Keyed-Hash Message Authentication Code (HMAC) to protect the integrity of nonlocal maintenance and diagnostic communications. | DISA Symantec ProxySG Benchmark NDM v1r2 | BlueCoat | MAINTENANCE |
WN11-CC-000335 - The Windows Remote Management (WinRM) client must not allow unencrypted traffic. | DISA Microsoft Windows 11 STIG v2r4 | Windows | MAINTENANCE |