Item Search

NameAudit NamePluginCategory
AIOS-13-011500 - Apple iOS/iPadOS must implement the management setting: use SSL for Exchange ActiveSync.MobileIron - DISA Apple iOS/iPadOS 13 v2r1MDM

IDENTIFICATION AND AUTHENTICATION

AIOS-16-014800 - Apple iOS/iPadOS 16 must be configured to disable Auto Unlock of the iPhone by an Apple Watch.MobileIron - DISA Apple iOS/iPadOS 16 v2r1MDM

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

AIOS-16-014800 - Apple iOS/iPadOS 16 must be configured to disable Auto Unlock of the iPhone by an Apple Watch.AirWatch - DISA Apple iOS/iPadOS 16 v2r1MDM

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

AIOS-17-014800 - Apple iOS/iPadOS 17 must be configured to disable 'Auto Unlock' of the iPhone by an Apple Watch - Auto Unlock of the iPhone by an Apple Watch.MobileIron - DISA Apple iOS/iPadOS 17 v2r1MDM

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

AIOS-18-014800 - Apple iOS/iPadOS 18 must be configured to disable 'Auto Unlock' of the iPhone by an Apple Watch - Auto Unlock of the iPhone by an Apple Watch.MobileIron - DISA Apple iOS/iPadOS 18 v1r1MDM

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

AOSX-14-001100 - The macOS system must require individuals to be authenticated with an individual authenticator prior to using a group authenticator.DISA STIG Apple Mac OSX 10.14 v2r6Unix

IDENTIFICATION AND AUTHENTICATION

AOSX-14-003025 - The macOS system must implement multifactor authentication for remote access to privileged accounts in such a way that one of the factors is provided by a device separate from the system gaining access.DISA STIG Apple Mac OSX 10.14 v2r6Unix

IDENTIFICATION AND AUTHENTICATION

AOSX-15-001100 - The macOS system must require individuals to be authenticated with an individual authenticator prior to using a group authenticator.DISA STIG Apple Mac OSX 10.15 v1r10Unix

IDENTIFICATION AND AUTHENTICATION

Big Sur - Disable SSH Server for Remote Access SessionsNIST macOS Big Sur v1.4.0 - 800-53r5 LowUnix

ACCESS CONTROL, CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION

Big Sur - Disable SSH Server for Remote Access SessionsNIST macOS Big Sur v1.4.0 - 800-53r5 ModerateUnix

ACCESS CONTROL, CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION

Big Sur - Disable SSH Server for Remote Access SessionsNIST macOS Big Sur v1.4.0 - 800-171Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION

Big Sur - Disable SSH Server for Remote Access SessionsNIST macOS Big Sur v1.4.0 - 800-53r4 ModerateUnix

ACCESS CONTROL, CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION

Big Sur - Disable SSH Server for Remote Access SessionsNIST macOS Big Sur v1.4.0 - All ProfilesUnix

ACCESS CONTROL, CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION

Big Sur - Disable SSH Server for Remote Access SessionsNIST macOS Big Sur v1.4.0 - CNSSI 1253Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION

CISC-ND-000530 - The Cisco switch must be configured to implement replay-resistant authentication mechanisms for network access to privileged accounts.DISA Cisco NX OS Switch NDM STIG v3r3Cisco

IDENTIFICATION AND AUTHENTICATION

ESXI-65-000012 - The ESXi host SSH daemon must ignore .rhosts files.DISA STIG VMware vSphere ESXi OS 6.5 v2r4Unix

IDENTIFICATION AND AUTHENTICATION

ESXI-65-100037 - The ESXi host must require individuals to be authenticated with an individual authenticator prior to using a group authenticator by using Active Directory for local user authentication.DISA STIG VMware vSphere ESXi 6.5 v2r4VMware

IDENTIFICATION AND AUTHENTICATION

EX13-CA-000135 - Exchange Outlook Anywhere (OA) clients must use NTLM authentication to access email.DISA Microsoft Exchange 2013 Client Access Server STIG v2r2Windows

IDENTIFICATION AND AUTHENTICATION

EX13-MB-000305 - Exchange Outlook Anywhere (OA) clients must use NTLM authentication to access email.DISA Microsoft Exchange 2013 Mailbox Server STIG v2r3Windows

IDENTIFICATION AND AUTHENTICATION

F5BI-AP-000075 - The BIG-IP APM module must be configured with a pre-established trust relationship and mechanisms with appropriate authorities (e.g., Active Directory or authentication, authorization, and accounting (AAA) server) that validate user account access authorizations and privileges when providing access control to virtual servers.DISA F5 BIG-IP Access Policy Manager STIG v2r4F5

IDENTIFICATION AND AUTHENTICATION

F5BI-AP-000077 - The BIG-IP APM module must restrict user authentication traffic to specific authentication server(s) when providing user authentication to virtual servers.DISA F5 BIG-IP Access Policy Manager STIG v2r4F5

IDENTIFICATION AND AUTHENTICATION

F5BI-AP-000193 - The BIG-IP APM module must be configured to require multifactor authentication for remote access with non-privileged accounts to virtual servers in such a way that one of the factors is provided by a device separate from the system gaining access.DISA F5 BIG-IP Access Policy Manager STIG v2r4F5

IDENTIFICATION AND AUTHENTICATION

F5BI-AP-000195 - The BIG-IP APM module must be configured to require multifactor authentication for remote access with privileged accounts to virtual servers in such a way that one of the factors is provided by a device separate from the system gaining access.DISA F5 BIG-IP Access Policy Manager STIG v2r4F5

IDENTIFICATION AND AUTHENTICATION

F5BI-DM-000101 - The BIG-IP appliance must be configured to ensure administrators are authenticated with an individual authenticator prior to using a group authenticator.DISA F5 BIG-IP Device Management STIG v2r4F5

IDENTIFICATION AND AUTHENTICATION

F5BI-LT-000079 - The BIG-IP Core implementation providing user authentication intermediary services must use multifactor authentication for network access to non-privileged accounts when granting access to virtual servers.DISA F5 BIG-IP Local Traffic Manager STIG v2r4F5

IDENTIFICATION AND AUTHENTICATION

F5BI-LT-000193 - A BIG-IP Core implementation providing user authentication intermediary services must be configured to require multifactor authentication for remote access to non-privileged accounts in such a way that one of the factors is provided by a device separate from the system gaining access.DISA F5 BIG-IP Local Traffic Manager STIG v2r4F5

IDENTIFICATION AND AUTHENTICATION

JUNI-ND-000530 - The Juniper router must be configured to implement replay-resistant authentication mechanisms for network access to privileged accounts.DISA STIG Juniper Router NDM v3r2Juniper

IDENTIFICATION AND AUTHENTICATION

MD3X-00-000310 - MongoDB must uniquely identify and authenticate organizational users (or processes acting on behalf of organizational users).DISA STIG MongoDB Enterprise Advanced 3.x v2r3 DBMongoDB

IDENTIFICATION AND AUTHENTICATION

O121-P2-012800 - The DBMS must uniquely identify and authenticate organizational users (or processes acting on behalf of organizational users).DISA STIG Oracle 12c v3r2 DatabaseOracleDB

IDENTIFICATION AND AUTHENTICATION

OL6-00-000028 - The system must prevent the root account from logging in from serial consoles.DISA STIG Oracle Linux 6 v2r7Unix

IDENTIFICATION AND AUTHENTICATION

OL6-00-000515 - The NFS server must not have the all_squash option enabled.DISA STIG Oracle Linux 6 v2r7Unix

IDENTIFICATION AND AUTHENTICATION

RHEL-06-000027 - The system must prevent the root account from logging in from virtual consoles.DISA Red Hat Enterprise Linux 6 STIG v2r2Unix

IDENTIFICATION AND AUTHENTICATION

RHEL-06-000239 - The SSH daemon must not allow authentication using an empty password.DISA Red Hat Enterprise Linux 6 STIG v2r2Unix

IDENTIFICATION AND AUTHENTICATION

RHEL-06-000309 - The NFS server must not have the insecure file locking option enabled.DISA Red Hat Enterprise Linux 6 STIG v2r2Unix

IDENTIFICATION AND AUTHENTICATION

RHEL-06-000515 - The NFS server must not have the all_squash option enabled.DISA Red Hat Enterprise Linux 6 STIG v2r2Unix

IDENTIFICATION AND AUTHENTICATION

RHEL-07-020300 - The Red Hat Enterprise Linux operating system must be configured so that all Group Identifiers (GIDs) referenced in the /etc/passwd file are defined in the /etc/group file.DISA Red Hat Enterprise Linux 7 STIG v3r15Unix

IDENTIFICATION AND AUTHENTICATION

SOL-11.1-040230 - The operating system must require individuals to be authenticated with an individual authenticator prior to using a group authenticator.DISA STIG Solaris 11 X86 v3r1Unix

IDENTIFICATION AND AUTHENTICATION

SOL-11.1-040230 - The operating system must require individuals to be authenticated with an individual authenticator prior to using a group authenticator.DISA STIG Solaris 11 SPARC v3r1Unix

IDENTIFICATION AND AUTHENTICATION

SOL-11.1-070100 - Duplicate User IDs (UIDs) must not exist for users within the organization.DISA STIG Solaris 11 SPARC v3r1Unix

IDENTIFICATION AND AUTHENTICATION

SP13-00-000075 - SharePoint must use replay-resistant authentication mechanisms for network access to privileged accounts.DISA STIG SharePoint 2013 v2r4Windows

IDENTIFICATION AND AUTHENTICATION

SPLK-CL-000030 - Splunk Enterprise must have all local user accounts removed after implementing organizational level user management system, except for one emergency account of last resort.DISA STIG Splunk Enterprise 7.x for Windows v3r1 REST APISplunk

IDENTIFICATION AND AUTHENTICATION

SPLK-CL-000060 - Splunk Enterprise must use HTTPS/SSL for access to the user interface.DISA STIG Splunk Enterprise 7.x for Windows v3r1 REST APISplunk

IDENTIFICATION AND AUTHENTICATION

SQL4-00-018400 - SQL Server must uniquely identify and authenticate organizational users (or processes acting on behalf of organizational users) - or processes acting on behalf of organizational users.DISA STIG SQL Server 2014 Instance DB Audit v2r4MS_SQLDB

IDENTIFICATION AND AUTHENTICATION

UBTU-18-010432 - The Ubuntu operating system must accept Personal Identity Verification (PIV) credentials.DISA STIG Ubuntu 18.04 LTS v2r15Unix

IDENTIFICATION AND AUTHENTICATION

UBTU-18-010434 - The Ubuntu operating system must implement certificate status checking for multifactor authentication.DISA STIG Ubuntu 18.04 LTS v2r15Unix

IDENTIFICATION AND AUTHENTICATION

VCWN-65-000009 - The vCenter Server for Windows must use Active Directory authentication.DISA STIG VMware vSphere vCenter 6.5 v2r3VMware

IDENTIFICATION AND AUTHENTICATION

WBLC-05-000150 - Oracle WebLogic must uniquely identify and authenticate users (or processes acting on behalf of users).Oracle WebLogic Server 12c Linux v2r2Unix

IDENTIFICATION AND AUTHENTICATION

WBLC-05-000153 - Oracle WebLogic must authenticate users individually prior to using a group authenticator.Oracle WebLogic Server 12c Linux v2r2Unix

IDENTIFICATION AND AUTHENTICATION

WN10-SO-000251 - Windows 10 must use multifactor authentication for local and network access to privileged and nonprivileged accounts.DISA Microsoft Windows 10 STIG v3r4Windows

IDENTIFICATION AND AUTHENTICATION

WPAW-00-001600 - The Windows PAW must be configured to enforce two-factor authentication and use Active Directory for authentication management.DISA MS Windows Privileged Access Workstation v3r1Windows

IDENTIFICATION AND AUTHENTICATION