Item Search

NameAudit NamePluginCategory
APPL-11-003001 - The macOS system must issue or obtain public key certificates under an appropriate certificate policy from an approved service provider.DISA STIG Apple macOS 11 v1r3Unix
APPL-11-003001 - The macOS system must issue or obtain public key certificates under an appropriate certificate policy from an approved service provider.DISA STIG Apple macOS 11 v1r7Unix
APPL-12-003001 - The macOS system must issue or obtain public key certificates under an appropriate certificate policy from an approved service provider.DISA STIG Apple macOS 12 v1r7Unix
APPL-12-003001 - The macOS system must issue or obtain public key certificates under an appropriate certificate policy from an approved service provider.DISA STIG Apple macOS 12 v1r5Unix
APPL-13-003001 - The macOS system must issue or obtain public key certificates under an appropriate certificate policy from an approved service provider.DISA STIG Apple macOS 13 v1r3Unix
APPL-13-003001 - The macOS system must issue or obtain public key certificates under an appropriate certificate policy from an approved service provider.DISA STIG Apple macOS 13 v1r2Unix
DS00.2140_2008 - Domain Controller PKI certificates must be issued by the DoD PKI or an approved External Certificate Authority (ECA).DISA Windows Server 2008 DC STIG v6r47Windows

SYSTEM AND COMMUNICATIONS PROTECTION

DS00.2140_2008_R2 - Domain Controller PKI certificates must be issued by the DoD PKI or an approved External Certificate Authority (ECA).DISA Windows Server 2008 R2 DC STIG v1r34Windows

SYSTEM AND COMMUNICATIONS PROTECTION

DS00.2141_2008 - PKI certificates associated with user accounts must be issued by the DoD PKI or an approved External Certificate Authority (ECA) - UPNDISA Windows Server 2008 DC STIG v6r47Windows

SYSTEM AND COMMUNICATIONS PROTECTION

DS00.2141_2008 - PKI certificates associated with user accounts must be issued by the DoD PKI or an approved External Certificate Authority (ECA).DISA Windows Server 2008 DC STIG v6r47Windows

SYSTEM AND COMMUNICATIONS PROTECTION

DS00.2141_2008_R2 - PKI certificates associated with user accounts must be issued by the DoD PKI or an approved External Certificate Authority (ECA).DISA Windows Server 2008 R2 DC STIG v1r34Windows

SYSTEM AND COMMUNICATIONS PROTECTION

DTOO265 - Outlook - Warning about invalid signatures must be enforced.DISA STIG Office 2010 Outlook v1r13Windows

IDENTIFICATION AND AUTHENTICATION

DTOO265 - Warning about invalid signatures must be enforced.DISA STIG Microsoft Outlook 2013 v1r13Windows

IDENTIFICATION AND AUTHENTICATION

DTOO267 - Outlook - Retrieving of CRL data must be set for online action.DISA STIG Office 2010 Outlook v1r13Windows

IDENTIFICATION AND AUTHENTICATION

DTOO267 - Retrieving of CRL data must be set for online action.DISA STIG Microsoft Outlook 2016 v1r2Windows

IDENTIFICATION AND AUTHENTICATION

GEN008000 - Certificates used to authenticate to the LDAP server must be provided from DoD-approved external PKI - 'Not Applicable'DISA STIG AIX 5.3 v1r2Unix

IDENTIFICATION AND AUTHENTICATION

GEN008000 - If the system is using LDAP for authentication or account information, certificates used to authenticate to the LDAP server must be provided from DoD PKI or a DoD-approved external PKI - 'tls_cert'DISA STIG for Oracle Linux 5 v1r14Unix

IDENTIFICATION AND AUTHENTICATION

GEN008020 - If the system is using LDAP for authentication or account information, the LDAP TLS connection must require the server provide a certificate with a valid trust path to a trusted CA.DISA STIG for Oracle Linux 5 v1r14Unix

IDENTIFICATION AND AUTHENTICATION

GEN008020 - The LDAP TLS connection must require a certificate and this certificate has a valid path to a trusted CA - 'client Key Label'DISA STIG AIX 5.3 v1r2Unix

IDENTIFICATION AND AUTHENTICATION

GEN008020 - The LDAP TLS connection must require a certificate and this certificate has a valid path to a trusted CA - 'ldapsslkeyf exists'DISA STIG AIX 5.3 v1r2Unix

IDENTIFICATION AND AUTHENTICATION

GEN008040 - If the system is using LDAP for authentication or account information, the system must verify the LDAP servers certificate has not been revoked.DISA STIG for Oracle Linux 5 v1r14Unix

IDENTIFICATION AND AUTHENTICATION

MD4X-00-000600 - If passwords are used for authentication, MongoDB must transmit only encrypted representations of passwords - CAFileDISA STIG MongoDB Enterprise Advanced 4.x v1r2 OSUnix
MD4X-00-000600 - If passwords are used for authentication, MongoDB must transmit only encrypted representations of passwords - certificateKeyFileDISA STIG MongoDB Enterprise Advanced 4.x v1r2 OSUnix
MD4X-00-000600 - If passwords are used for authentication, MongoDB must transmit only encrypted representations of passwords. - allowConnectionsWithoutCertificatesDISA STIG MongoDB Enterprise Advanced 4.x v1r1 OSUnix
MD4X-00-000600 - If passwords are used for authentication, MongoDB must transmit only encrypted representations of passwords. - allowInvalidCertificatesDISA STIG MongoDB Enterprise Advanced 4.x v1r1 OSUnix
MD4X-00-000600 - If passwords are used for authentication, MongoDB must transmit only encrypted representations of passwords. - CAFileDISA STIG MongoDB Enterprise Advanced 4.x v1r1 OSUnix
MD4X-00-000600 - If passwords are used for authentication, MongoDB must transmit only encrypted representations of passwords. - certificateKeyFileDISA STIG MongoDB Enterprise Advanced 4.x v1r1 OSUnix
MD4X-00-000600 - If passwords are used for authentication, MongoDB must transmit only encrypted representations of passwords. - modeDISA STIG MongoDB Enterprise Advanced 4.x v1r1 OSUnix
O112-C2-015300 - The DBMS, when utilizing PKI-based authentication, must validate certificates by constructing a certification path with status information to an accepted trust anchor - SSL_CIPHER_SUITESDISA STIG Oracle 11.2g v1r18 LinuxUnix

IDENTIFICATION AND AUTHENTICATION

OL08-00-010090 - OL 8, for PKI-based authentication, must validate certificates by constructing a certification path (which includes status information) to an accepted trust anchor - which includes status information to an accepted trust anchor.DISA Oracle Linux 8 STIG v1r8Unix
OL08-00-010090 - OL 8, for PKI-based authentication, must validate certificates by constructing a certification path (which includes status information) to an accepted trust anchor - which includes status information to an accepted trust anchor.DISA Oracle Linux 8 STIG v1r6Unix
OL08-00-010090 - OL 8, for PKI-based authentication, must validate certificates by constructing a certification path (which includes status information) to an accepted trust anchor - which includes status information to an accepted trust anchor.DISA Oracle Linux 8 STIG v1r7Unix
OL08-00-010090 - OL 8, for PKI-based authentication, must validate certificates by constructing a certification path (which includes status information) to an accepted trust anchor - which includes status information to an accepted trust anchor.DISA Oracle Linux 8 STIG v1r4Unix
OL08-00-010090 - OL 8, for PKI-based authentication, must validate certificates by constructing a certification path (which includes status information) to an accepted trust anchor.DISA Oracle Linux 8 STIG v1r1Unix
OL08-00-010090 - OL 8, for PKI-based authentication, must validate certificates by constructing a certification path (which includes status information) to an accepted trust anchor.DISA Oracle Linux 8 STIG v1r2Unix
RHEL-09-631010 - RHEL 9, for PKI-based authentication, must validate certificates by constructing a certification path (which includes status information) to an accepted trust anchor.DISA Red Hat Enterprise Linux 9 STIG v1r1Unix
RHEL-09-631010 - RHEL 9, for PKI-based authentication, must validate certificates by constructing a certification path (which includes status information) to an accepted trust anchor.DISA Red Hat Enterprise Linux 9 STIG v1r2Unix
SLES-15-010170 - The SUSE operating system, for PKI-based authentication, must validate certificates by constructing a certification path (which includes status information) to an accepted trust anchor.DISA SLES 15 STIG v1r10Unix
SLES-15-010170 - The SUSE operating system, for PKI-based authentication, must validate certificates by constructing a certification path (which includes status information) to an accepted trust anchor.DISA SLES 15 STIG v1r11Unix
SLES-15-010170 - The SUSE operating system, for PKI-based authentication, must validate certificates by constructing a certification path (which includes status information) to an accepted trust anchor.DISA SLES 15 STIG v1r6Unix
SLES-15-010170 - The SUSE operating system, for PKI-based authentication, must validate certificates by constructing a certification path (which includes status information) to an accepted trust anchor.DISA SLES 15 STIG v1r9Unix
WN22-PK-000010 - Windows Server 2022 must have the DoD Root Certificate Authority (CA) certificates installed in the Trusted Root Store - Root CA 4DISA Windows Server 2022 STIG v1r3Windows
WN22-PK-000010 - Windows Server 2022 must have the DoD Root Certificate Authority (CA) certificates installed in the Trusted Root Store - Root CA 5DISA Windows Server 2022 STIG v1r1Windows
WN22-PK-000010 - Windows Server 2022 must have the DoD Root Certificate Authority (CA) certificates installed in the Trusted Root Store - Root CA 5DISA Windows Server 2022 STIG v1r3Windows
WN22-PK-000020 - Windows Server 2022 must have the DoD Interoperability Root Certificate Authority (CA) cross-certificates installed in the Untrusted Certificates Store on unclassified systems - DoD Root CA 3DISA Windows Server 2022 STIG v1r1Windows
WN22-PK-000020 - Windows Server 2022 must have the DoD Interoperability Root Certificate Authority (CA) cross-certificates installed in the Untrusted Certificates Store on unclassified systems - DoD Root CA 2DISA Windows Server 2022 STIG v1r3Windows
WN22-PK-000030 - Windows Server 2022 must have the US DoD CCEB Interoperability Root CA cross-certificates in the Untrusted Certificates Store on unclassified systems - 1/2DISA Windows Server 2022 STIG v1r1Windows
WN22-PK-000030 - Windows Server 2022 must have the US DoD CCEB Interoperability Root CA cross-certificates in the Untrusted Certificates Store on unclassified systems - 2/2DISA Windows Server 2022 STIG v1r4Windows
WN22-PK-000030 - Windows Server 2022 must have the US DoD CCEB Interoperability Root CA cross-certificates in the Untrusted Certificates Store on unclassified systems - 2/2DISA Windows Server 2022 STIG v1r1Windows
WN22-PK-000030 - Windows Server 2022 must have the US DoD CCEB Interoperability Root CA cross-certificates in the Untrusted Certificates Store on unclassified systems - 2/2DISA Windows Server 2022 STIG v1r3Windows