3.077 - The system is not configured to use FIPS compliant algorithms for encryption, hashing, and signing. | DISA Windows 7 STIG v1r32 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
3.077 - The system is not configured to use FIPS compliant Algorithms for Encryption, Hashing, and Signing. | DISA Windows Server 2008 MS STIG v6r46 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
3.077 - The system is not configured to use FIPS compliant Algorithms for Encryption, Hashing, and Signing. | DISA Windows Server 2008 DC STIG v6r47 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
3.077 - The system is not configured to use FIPS compliant Algorithms for Encryption, Hashing, and Signing. | DISA Windows Vista STIG v6r41 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
3.077 - The system will be configured to use FIPS-compliant algorithms for encryption, hashing, and signing. | DISA Windows Server 2008 R2 DC STIG v1r34 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
3.077 - The system will be configured to use FIPS-compliant algorithms for encryption, hashing, and signing. | DISA Windows Server 2008 R2 MS STIG v1r33 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
APPL-11-003001 - The macOS system must issue or obtain public key certificates under an appropriate certificate policy from an approved service provider. | DISA STIG Apple macOS 11 v1r3 | Unix | |
APPL-11-003001 - The macOS system must issue or obtain public key certificates under an appropriate certificate policy from an approved service provider. | DISA STIG Apple macOS 11 v1r7 | Unix | |
APPL-11-003001 - The macOS system must issue or obtain public key certificates under an appropriate certificate policy from an approved service provider. | DISA STIG Apple macOS 11 v1r1 | Unix | |
APPL-11-003001 - The macOS system must issue or obtain public key certificates under an appropriate certificate policy from an approved service provider. | DISA STIG Apple macOS 11 v1r6 | Unix | |
APPL-12-003001 - The macOS system must issue or obtain public key certificates under an appropriate certificate policy from an approved service provider. | DISA STIG Apple macOS 12 v1r7 | Unix | |
APPL-12-003001 - The macOS system must issue or obtain public key certificates under an appropriate certificate policy from an approved service provider. | DISA STIG Apple macOS 12 V1R2 | Unix | |
APPL-12-003001 - The macOS system must issue or obtain public key certificates under an appropriate certificate policy from an approved service provider. | DISA STIG Apple macOS 12 v1r5 | Unix | |
APPL-12-003001 - The macOS system must issue or obtain public key certificates under an appropriate certificate policy from an approved service provider. | DISA STIG Apple macOS 12 v1r3 | Unix | |
APPL-12-003001 - The macOS system must issue or obtain public key certificates under an appropriate certificate policy from an approved service provider. | DISA STIG Apple macOS 12 v1r4 | Unix | |
APPL-13-003001 - The macOS system must issue or obtain public key certificates under an appropriate certificate policy from an approved service provider. | DISA STIG Apple macOS 13 v1r2 | Unix | |
APPL-13-003001 - The macOS system must issue or obtain public key certificates under an appropriate certificate policy from an approved service provider. | DISA STIG Apple macOS 13 v1r3 | Unix | |
APPL-13-003001 - The macOS system must issue or obtain public key certificates under an appropriate certificate policy from an approved service provider. | DISA STIG Apple macOS 13 v1r1 | Unix | |
CASA-VN-000340 - The Cisco ASA VPN gateway must use cryptographic algorithms approved by NSA to protect NSS when transporting classified traffic across an unclassified network - integrity | DISA STIG Cisco ASA VPN v1r2 | Cisco | |
CASA-VN-000760 - The Cisco ASA VPN remote access server must be configured to use an approved High Assurance Commercial Solution for Classified (CSfC) cryptographic algorithm for remote access to a classified network - prf | DISA STIG Cisco ASA VPN v1r2 | Cisco | |
DS00.3281_2008 - Separate, NSA-approved (Type 1) cryptography must be used to protect the directory data-in-transit for directory service implementations at a classified confidentiality level when replication data traverses a network cleared to a lower level than the data. | DISA Windows Server 2008 DC STIG v6r47 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
DTBC-0056 - Chrome must be configured to allow only TLS. | DISA STIG Google Chrome v2r8 | Windows | |
DTBC-0056 - Chrome must be configured to allow only TLS. | DISA STIG Google Chrome v2r2 | Windows | |
DTBC-0056 - Chrome must be configured to allow only TLS. | DISA STIG Google Chrome v2r4 | Windows | |
DTBI014-IE11 - Turn off Encryption Support must be enabled. | DISA STIG IE 11 v1r18 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
DTBI014-IE11 - Turn off Encryption Support must be enabled. | DISA STIG IE 11 v1r19 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
DTBI1100-IE11 - Allow Fallback to SSL 3.0 (Internet Explorer) must be disabled. | DISA STIG IE 11 v1r19 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
DTOO227 - Outlook - Digital signatures must be allowed. | DISA STIG Office 2010 Outlook v1r13 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
DTOO227 - The ability to add signatures to email messages must be allowed. | DISA STIG Microsoft Outlook 2013 v1r12 | Windows | CONFIGURATION MANAGEMENT |
DTOO227 - The ability to add signatures to email messages must be allowed. | DISA STIG Microsoft Outlook 2013 v1r13 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
DTOO316 - Outlook - Outlook minimum encryption key length settings must be set. | DISA STIG Office 2010 Outlook v1r13 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
DTOO316 - Outlook minimum encryption key length settings must be set. | DISA STIG Microsoft Outlook 2013 v1r13 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
DTOO316 - Outlook minimum encryption key length settings must be set. | DISA STIG Microsoft Outlook 2013 v1r12 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
DTOO316 - Outlook minimum encryption key length settings must be set. | DISA STIG Microsoft Outlook 2016 v1r2 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
ESXI-06-100010 - The SSH daemon must be configured to only use FIPS 140-2 approved ciphers. | DISA STIG VMware vSphere 6.x ESXi v1r4 | VMware | |
MADB-10-012200 - MariaDB must implement NIST FIPS 140-2 validated cryptographic modules to generate and validate cryptographic hashes. - have_openssl | DISA MariaDB Enterprise 10.x v1r2 DB | MySQLDB | |
MADB-10-012300 - MariaDB must implement NIST FIPS 140-2 validated cryptographic modules to protect unclassified information requiring confidentiality and cryptographic protection, in accordance with the data owners requirements. - fips_enabled | DISA MariaDB Enterprise 10.x v1r2 OS Linux | Unix | |
MADB-10-012300 - MariaDB must implement NIST FIPS 140-2 validated cryptographic modules to protect unclassified information requiring confidentiality and cryptographic protection, in accordance with the data owners requirements. - have_openssl | DISA MariaDB Enterprise 10.x v1r2 DB | MySQLDB | |
MADB-10-012300 - MariaDB must implement NIST FIPS 140-2 validated cryptographic modules to protect unclassified information requiring confidentiality and cryptographic protection, in accordance with the data owners requirements. - libmysqlclient | DISA MariaDB Enterprise 10.x v1r2 DB | MySQLDB | |
MADB-10-012300 - MariaDB must implement NIST FIPS 140-2 validated cryptographic modules to protect unclassified information requiring confidentiality and cryptographic protection, in accordance with the data owners requirements. - openssl | DISA MariaDB Enterprise 10.x v1r2 OS Linux | Unix | |
MD4X-00-001300 - MongoDB must use NIST FIPS 140-2 or 140-3 validated cryptographic modules for cryptographic operations. | DISA STIG MongoDB Enterprise Advanced 4.x v1r2 OS | Unix | |
MD4X-00-001300 - MongoDB must use NIST FIPS 140-2-validated cryptographic modules for cryptographic operations. | DISA STIG MongoDB Enterprise Advanced 4.x v1r1 OS | Unix | |
MYS8-00-011500 - The MySQL Database Server 8.0 must use NSA-approved cryptography to protect classified information in accordance with the data owner's requirements - ssl_fips_mode | DISA Oracle MySQL 8.0 v1r3 DB | MySQLDB | |
MYS8-00-011600 - The MySQL Database Server 8.0 must implement NIST FIPS 140-2 or 140-3 validated cryptographic modules to provision digital signatures. | DISA Oracle MySQL 8.0 v1r3 DB | MySQLDB | |
MYS8-00-011600 - The MySQL Database Server 8.0 must implement NIST FIPS 140-2 or 140-3 validated cryptographic modules to provision digital signatures. | DISA Oracle MySQL 8.0 v1r4 DB | MySQLDB | |
MYS8-00-011700 - The MySQL Database Server 8.0 must implement NIST FIPS 140-2 or 140-3 validated cryptographic modules to generate and validate cryptographic hashes. | DISA Oracle MySQL 8.0 v1r4 DB | MySQLDB | |
MYS8-00-011800 - The MySQL Database Server 8.0 must implement NIST FIPS 140-2 or 140-3 validated cryptographic modules to protect unclassified information requiring confidentiality and cryptographic protection, in accordance with the data owner's requirements. | DISA Oracle MySQL 8.0 v1r4 DB | MySQLDB | |
SLES-15-010510 - FIPS 140-2 mode must be enabled on the SUSE operating system. | DISA SLES 15 STIG v1r9 | Unix | |
UBTU-20-010442 - The Ubuntu operating system must implement NIST FIPS-validated cryptography to protect classified information and for the following: To provision digital signatures, to generate cryptographic hashes, and to protect unclassified information requiring confidentiality and cryptographic protection in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, and standards. | DISA STIG Ubuntu 20.04 LTS v1r10 | Unix | |
WN22-DC-000140 - Windows Server 2022 must use separate, NSA-approved (Type 1) cryptography to protect the directory data in transit for directory service implementations at a classified confidentiality level when replication data traverses a network cleared to a lower level than the data. | DISA Windows Server 2022 STIG v1r3 | Windows | |