APPL-11-003001 - The macOS system must issue or obtain public key certificates under an appropriate certificate policy from an approved service provider. | DISA STIG Apple macOS 11 v1r3 | Unix | |
APPL-11-003001 - The macOS system must issue or obtain public key certificates under an appropriate certificate policy from an approved service provider. | DISA STIG Apple macOS 11 v1r7 | Unix | |
APPL-12-003001 - The macOS system must issue or obtain public key certificates under an appropriate certificate policy from an approved service provider. | DISA STIG Apple macOS 12 v1r7 | Unix | |
APPL-12-003001 - The macOS system must issue or obtain public key certificates under an appropriate certificate policy from an approved service provider. | DISA STIG Apple macOS 12 v1r5 | Unix | |
APPL-13-003001 - The macOS system must issue or obtain public key certificates under an appropriate certificate policy from an approved service provider. | DISA STIG Apple macOS 13 v1r3 | Unix | |
APPL-13-003001 - The macOS system must issue or obtain public key certificates under an appropriate certificate policy from an approved service provider. | DISA STIG Apple macOS 13 v1r2 | Unix | |
DS00.2140_2008 - Domain Controller PKI certificates must be issued by the DoD PKI or an approved External Certificate Authority (ECA). | DISA Windows Server 2008 DC STIG v6r47 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
DS00.2140_2008_R2 - Domain Controller PKI certificates must be issued by the DoD PKI or an approved External Certificate Authority (ECA). | DISA Windows Server 2008 R2 DC STIG v1r34 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
DS00.2141_2008 - PKI certificates associated with user accounts must be issued by the DoD PKI or an approved External Certificate Authority (ECA) - UPN | DISA Windows Server 2008 DC STIG v6r47 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
DS00.2141_2008 - PKI certificates associated with user accounts must be issued by the DoD PKI or an approved External Certificate Authority (ECA). | DISA Windows Server 2008 DC STIG v6r47 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
DS00.2141_2008_R2 - PKI certificates associated with user accounts must be issued by the DoD PKI or an approved External Certificate Authority (ECA). | DISA Windows Server 2008 R2 DC STIG v1r34 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
DTOO265 - Outlook - Warning about invalid signatures must be enforced. | DISA STIG Office 2010 Outlook v1r13 | Windows | IDENTIFICATION AND AUTHENTICATION |
DTOO265 - Warning about invalid signatures must be enforced. | DISA STIG Microsoft Outlook 2013 v1r13 | Windows | IDENTIFICATION AND AUTHENTICATION |
DTOO267 - Outlook - Retrieving of CRL data must be set for online action. | DISA STIG Office 2010 Outlook v1r13 | Windows | IDENTIFICATION AND AUTHENTICATION |
DTOO267 - Retrieving of CRL data must be set for online action. | DISA STIG Microsoft Outlook 2016 v1r2 | Windows | IDENTIFICATION AND AUTHENTICATION |
GEN008000 - Certificates used to authenticate to the LDAP server must be provided from DoD-approved external PKI - 'Not Applicable' | DISA STIG AIX 5.3 v1r2 | Unix | IDENTIFICATION AND AUTHENTICATION |
GEN008000 - If the system is using LDAP for authentication or account information, certificates used to authenticate to the LDAP server must be provided from DoD PKI or a DoD-approved external PKI - 'tls_cert' | DISA STIG for Oracle Linux 5 v1r14 | Unix | IDENTIFICATION AND AUTHENTICATION |
GEN008020 - If the system is using LDAP for authentication or account information, the LDAP TLS connection must require the server provide a certificate with a valid trust path to a trusted CA. | DISA STIG for Oracle Linux 5 v1r14 | Unix | IDENTIFICATION AND AUTHENTICATION |
GEN008020 - The LDAP TLS connection must require a certificate and this certificate has a valid path to a trusted CA - 'client Key Label' | DISA STIG AIX 5.3 v1r2 | Unix | IDENTIFICATION AND AUTHENTICATION |
GEN008020 - The LDAP TLS connection must require a certificate and this certificate has a valid path to a trusted CA - 'ldapsslkeyf exists' | DISA STIG AIX 5.3 v1r2 | Unix | IDENTIFICATION AND AUTHENTICATION |
GEN008040 - If the system is using LDAP for authentication or account information, the system must verify the LDAP servers certificate has not been revoked. | DISA STIG for Oracle Linux 5 v1r14 | Unix | IDENTIFICATION AND AUTHENTICATION |
MD4X-00-000600 - If passwords are used for authentication, MongoDB must transmit only encrypted representations of passwords - CAFile | DISA STIG MongoDB Enterprise Advanced 4.x v1r2 OS | Unix | |
MD4X-00-000600 - If passwords are used for authentication, MongoDB must transmit only encrypted representations of passwords - certificateKeyFile | DISA STIG MongoDB Enterprise Advanced 4.x v1r2 OS | Unix | |
MD4X-00-000600 - If passwords are used for authentication, MongoDB must transmit only encrypted representations of passwords. - allowConnectionsWithoutCertificates | DISA STIG MongoDB Enterprise Advanced 4.x v1r1 OS | Unix | |
MD4X-00-000600 - If passwords are used for authentication, MongoDB must transmit only encrypted representations of passwords. - allowInvalidCertificates | DISA STIG MongoDB Enterprise Advanced 4.x v1r1 OS | Unix | |
MD4X-00-000600 - If passwords are used for authentication, MongoDB must transmit only encrypted representations of passwords. - CAFile | DISA STIG MongoDB Enterprise Advanced 4.x v1r1 OS | Unix | |
MD4X-00-000600 - If passwords are used for authentication, MongoDB must transmit only encrypted representations of passwords. - certificateKeyFile | DISA STIG MongoDB Enterprise Advanced 4.x v1r1 OS | Unix | |
MD4X-00-000600 - If passwords are used for authentication, MongoDB must transmit only encrypted representations of passwords. - mode | DISA STIG MongoDB Enterprise Advanced 4.x v1r1 OS | Unix | |
O112-C2-015300 - The DBMS, when utilizing PKI-based authentication, must validate certificates by constructing a certification path with status information to an accepted trust anchor - SSL_CIPHER_SUITES | DISA STIG Oracle 11.2g v1r18 Linux | Unix | IDENTIFICATION AND AUTHENTICATION |
OL08-00-010090 - OL 8, for PKI-based authentication, must validate certificates by constructing a certification path (which includes status information) to an accepted trust anchor - which includes status information to an accepted trust anchor. | DISA Oracle Linux 8 STIG v1r8 | Unix | |
OL08-00-010090 - OL 8, for PKI-based authentication, must validate certificates by constructing a certification path (which includes status information) to an accepted trust anchor - which includes status information to an accepted trust anchor. | DISA Oracle Linux 8 STIG v1r6 | Unix | |
OL08-00-010090 - OL 8, for PKI-based authentication, must validate certificates by constructing a certification path (which includes status information) to an accepted trust anchor - which includes status information to an accepted trust anchor. | DISA Oracle Linux 8 STIG v1r7 | Unix | |
OL08-00-010090 - OL 8, for PKI-based authentication, must validate certificates by constructing a certification path (which includes status information) to an accepted trust anchor - which includes status information to an accepted trust anchor. | DISA Oracle Linux 8 STIG v1r4 | Unix | |
OL08-00-010090 - OL 8, for PKI-based authentication, must validate certificates by constructing a certification path (which includes status information) to an accepted trust anchor. | DISA Oracle Linux 8 STIG v1r1 | Unix | |
OL08-00-010090 - OL 8, for PKI-based authentication, must validate certificates by constructing a certification path (which includes status information) to an accepted trust anchor. | DISA Oracle Linux 8 STIG v1r2 | Unix | |
RHEL-09-631010 - RHEL 9, for PKI-based authentication, must validate certificates by constructing a certification path (which includes status information) to an accepted trust anchor. | DISA Red Hat Enterprise Linux 9 STIG v1r1 | Unix | |
RHEL-09-631010 - RHEL 9, for PKI-based authentication, must validate certificates by constructing a certification path (which includes status information) to an accepted trust anchor. | DISA Red Hat Enterprise Linux 9 STIG v1r2 | Unix | |
SLES-15-010170 - The SUSE operating system, for PKI-based authentication, must validate certificates by constructing a certification path (which includes status information) to an accepted trust anchor. | DISA SLES 15 STIG v1r10 | Unix | |
SLES-15-010170 - The SUSE operating system, for PKI-based authentication, must validate certificates by constructing a certification path (which includes status information) to an accepted trust anchor. | DISA SLES 15 STIG v1r11 | Unix | |
SLES-15-010170 - The SUSE operating system, for PKI-based authentication, must validate certificates by constructing a certification path (which includes status information) to an accepted trust anchor. | DISA SLES 15 STIG v1r6 | Unix | |
SLES-15-010170 - The SUSE operating system, for PKI-based authentication, must validate certificates by constructing a certification path (which includes status information) to an accepted trust anchor. | DISA SLES 15 STIG v1r9 | Unix | |
WN22-PK-000010 - Windows Server 2022 must have the DoD Root Certificate Authority (CA) certificates installed in the Trusted Root Store - Root CA 4 | DISA Windows Server 2022 STIG v1r3 | Windows | |
WN22-PK-000010 - Windows Server 2022 must have the DoD Root Certificate Authority (CA) certificates installed in the Trusted Root Store - Root CA 5 | DISA Windows Server 2022 STIG v1r1 | Windows | |
WN22-PK-000010 - Windows Server 2022 must have the DoD Root Certificate Authority (CA) certificates installed in the Trusted Root Store - Root CA 5 | DISA Windows Server 2022 STIG v1r3 | Windows | |
WN22-PK-000020 - Windows Server 2022 must have the DoD Interoperability Root Certificate Authority (CA) cross-certificates installed in the Untrusted Certificates Store on unclassified systems - DoD Root CA 3 | DISA Windows Server 2022 STIG v1r1 | Windows | |
WN22-PK-000020 - Windows Server 2022 must have the DoD Interoperability Root Certificate Authority (CA) cross-certificates installed in the Untrusted Certificates Store on unclassified systems - DoD Root CA 2 | DISA Windows Server 2022 STIG v1r3 | Windows | |
WN22-PK-000030 - Windows Server 2022 must have the US DoD CCEB Interoperability Root CA cross-certificates in the Untrusted Certificates Store on unclassified systems - 1/2 | DISA Windows Server 2022 STIG v1r1 | Windows | |
WN22-PK-000030 - Windows Server 2022 must have the US DoD CCEB Interoperability Root CA cross-certificates in the Untrusted Certificates Store on unclassified systems - 2/2 | DISA Windows Server 2022 STIG v1r4 | Windows | |
WN22-PK-000030 - Windows Server 2022 must have the US DoD CCEB Interoperability Root CA cross-certificates in the Untrusted Certificates Store on unclassified systems - 2/2 | DISA Windows Server 2022 STIG v1r1 | Windows | |
WN22-PK-000030 - Windows Server 2022 must have the US DoD CCEB Interoperability Root CA cross-certificates in the Untrusted Certificates Store on unclassified systems - 2/2 | DISA Windows Server 2022 STIG v1r3 | Windows | |