Item Search

NameAudit NamePluginCategory
CD12-00-002100 - PostgreSQL must allocate audit record storage capacity in accordance with organization-defined audit record storage requirements.DISA STIG Crunchy Data PostgreSQL OS v3r1Unix

AUDIT AND ACCOUNTABILITY

CD12-00-002600 - PostgreSQL must allow only the Information System Security Manager (ISSM), or individuals or roles appointed by the ISSM, to select which auditable events are to be audited.DISA STIG Crunchy Data PostgreSQL OS v3r1Unix

AUDIT AND ACCOUNTABILITY

CD12-00-004000 - PostgreSQL must isolate security functions from non-security functions.DISA STIG Crunchy Data PostgreSQL OS v3r1Unix

SYSTEM AND COMMUNICATIONS PROTECTION

CD12-00-004800 - PostgreSQL must generate audit records when unsuccessful attempts to modify security objects occur.DISA STIG Crunchy Data PostgreSQL DB v3r1PostgreSQLDB

AUDIT AND ACCOUNTABILITY

CD12-00-006200 - PostgreSQL must generate audit records when concurrent logons/connections by the same user from different workstations occur.DISA STIG Crunchy Data PostgreSQL DB v3r1PostgreSQLDB

AUDIT AND ACCOUNTABILITY

CD12-00-006500 - PostgreSQL must generate audit records when unsuccessful attempts to execute privileged activities or other system-level access occur.DISA STIG Crunchy Data PostgreSQL DB v3r1PostgreSQLDB

AUDIT AND ACCOUNTABILITY

CD12-00-006900 - PostgreSQL must generate audit records when unsuccessful attempts to add privileges/permissions occur.DISA STIG Crunchy Data PostgreSQL DB v3r1PostgreSQLDB

AUDIT AND ACCOUNTABILITY

CD12-00-007700 - PostgreSQL must generate time stamps, for audit records and application data, with a minimum granularity of one second.DISA STIG Crunchy Data PostgreSQL DB v3r1PostgreSQLDB

AUDIT AND ACCOUNTABILITY

CD12-00-007800 - PostgreSQL must produce audit records containing sufficient information to establish the identity of any user/subject or process associated with the event.DISA STIG Crunchy Data PostgreSQL DB v3r1PostgreSQLDB

AUDIT AND ACCOUNTABILITY

CD12-00-008800 - PostgreSQL must produce audit records containing sufficient information to establish the sources (origins) of the events.DISA STIG Crunchy Data PostgreSQL DB v3r1PostgreSQLDB

AUDIT AND ACCOUNTABILITY

CD12-00-009200 - Unused database components that are integrated in PostgreSQL and cannot be uninstalled must be disabled.DISA STIG Crunchy Data PostgreSQL OS v3r1Unix

CONFIGURATION MANAGEMENT

CD12-00-009700 - PostgreSQL must protect against a user falsely repudiating having performed organization-defined actions.DISA STIG Crunchy Data PostgreSQL DB v3r1PostgreSQLDB

AUDIT AND ACCOUNTABILITY

CD12-00-011500 - PostgreSQL must uniquely identify and authenticate organizational users (or processes acting on behalf of organizational users).DISA STIG Crunchy Data PostgreSQL OS v3r1Unix

IDENTIFICATION AND AUTHENTICATION

EPAS-00-000900 - The EDB Postgres Advanced Server must protect against a user falsely repudiating having performed organization-defined actions.EnterpriseDB PostgreSQL Advanced Server DB v2r1PostgreSQLDB

AUDIT AND ACCOUNTABILITY

EPAS-00-001000 - The EDB Postgres Advanced Server must provide audit record generation capability for DOD-defined auditable events within all EDB Postgres Advanced Server/database components.EnterpriseDB PostgreSQL Advanced Server DB v2r1PostgreSQLDB

AUDIT AND ACCOUNTABILITY

EPAS-00-001200 - The EDB Postgres Advanced Server must generate audit records when privileges/permissions are retrieved.EnterpriseDB PostgreSQL Advanced Server DB v2r1PostgreSQLDB

AUDIT AND ACCOUNTABILITY

EPAS-00-003800 - Unused database components, EDB Postgres Advanced Server software, and database objects must be removed.EnterpriseDB PostgreSQL Advanced Server OS Linux v2r1Unix

CONFIGURATION MANAGEMENT

EPAS-00-003900 - Unused database components which are integrated in the EDB Postgres Advanced Server and cannot be uninstalled must be disabled.EnterpriseDB PostgreSQL Advanced Server OS Linux v2r1Unix

CONFIGURATION MANAGEMENT

EPAS-00-006300 - The EDB Postgres Advanced Server and associated applications must reserve the use of dynamic code execution for situations that require it.EnterpriseDB PostgreSQL Advanced Server DB v2r1PostgreSQLDB

SYSTEM AND INFORMATION INTEGRITY

EPAS-00-006500 - The EDB Postgres Advanced Server must provide nonprivileged users with error messages that provide information necessary for corrective actions without revealing information that could be exploited by adversaries.EnterpriseDB PostgreSQL Advanced Server DB v2r1PostgreSQLDB

SYSTEM AND INFORMATION INTEGRITY

EPAS-00-006600 - The EDB Postgres Advanced Server must reveal detailed error messages only to the ISSO, ISSM, SA, and DBA.EnterpriseDB PostgreSQL Advanced Server DB v2r1PostgreSQLDB

SYSTEM AND INFORMATION INTEGRITY

EPAS-00-006900 - The EDB Postgres Advanced Server must associate organization-defined types of security labels having organization-defined security label values with information in storage.EnterpriseDB PostgreSQL Advanced Server DB v2r1PostgreSQLDB

ACCESS CONTROL

EPAS-00-007900 - The EDB Postgres Advanced Server must allocate audit record storage capacity in accordance with organization-defined audit record storage requirements.EnterpriseDB PostgreSQL Advanced Server DB v2r1PostgreSQLDB

AUDIT AND ACCOUNTABILITY

EPAS-00-008800 - The EDB Postgres Advanced Server must require users to reauthenticate when organization-defined circumstances or situations require reauthentication.EnterpriseDB PostgreSQL Advanced Server DB v2r1PostgreSQLDB

SYSTEM AND COMMUNICATIONS PROTECTION

EPAS-00-011000 - Audit records must be generated when categorized information (e.g., classification levels/security levels) is created.EnterpriseDB PostgreSQL Advanced Server DB v2r1PostgreSQLDB

AUDIT AND ACCOUNTABILITY

EPAS-00-011100 - Audit records must be generated when unsuccessful attempts to create categorized information (e.g., classification levels/security levels) occur.EnterpriseDB PostgreSQL Advanced Server DB v2r1PostgreSQLDB

AUDIT AND ACCOUNTABILITY

EPAS-00-011300 - The EDB Postgres Advanced Server must generate audit records when unsuccessful attempts to delete privileges/permissions occur.EnterpriseDB PostgreSQL Advanced Server DB v2r1PostgreSQLDB

AUDIT AND ACCOUNTABILITY

EPAS-00-011700 - Audit records must be generated when unsuccessful attempts to delete categorized information (e.g., classification levels/security levels) occur.EnterpriseDB PostgreSQL Advanced Server DB v2r1PostgreSQLDB

AUDIT AND ACCOUNTABILITY

EPAS-00-012000 - The EDB Postgres Advanced Server must generate audit records for all privileged activities or other system-level access.EnterpriseDB PostgreSQL Advanced Server DB v2r1PostgreSQLDB

AUDIT AND ACCOUNTABILITY

EPAS-00-012300 - The EDB Postgres Advanced Server must generate audit records when concurrent logons/connections by the same user from different workstations occur.EnterpriseDB PostgreSQL Advanced Server DB v2r1PostgreSQLDB

AUDIT AND ACCOUNTABILITY

EPAS-00-012400 - The EDB Postgres Advanced Server must be able to generate audit records when successful accesses to objects occur.EnterpriseDB PostgreSQL Advanced Server DB v2r1PostgreSQLDB

AUDIT AND ACCOUNTABILITY

FGFW-ND-000035 - The FortiGate device must allow full access to only those individuals or roles designated by the ISSM.DISA Fortigate Firewall NDM STIG v1r4FortiGate

ACCESS CONTROL

FGFW-ND-000060 - The FortiGate device must log all user activity.DISA Fortigate Firewall NDM STIG v1r4FortiGate

AUDIT AND ACCOUNTABILITY

FGFW-ND-000070 - The FortiGate device must generate audit records when successful/unsuccessful attempts to delete administrator privileges occurDISA Fortigate Firewall NDM STIG v1r4FortiGate

AUDIT AND ACCOUNTABILITY

HONW-09-000200 - The Honeywell Mobility Edge Android Pie device must be configured to not allow passwords that include more than two repeating or sequential characters - Minimum complex charactersMobileIron - DISA Honeywell Android 9.x COPE v1r2MDM

CONFIGURATION MANAGEMENT

HONW-09-000200 - The Honeywell Mobility Edge Android Pie device must be configured to not allow passwords that include more than two repeating or sequential characters - NumbersAirWatch - DISA Honeywell Android 9.x COPE v1r2MDM

CONFIGURATION MANAGEMENT

HONW-09-000200 - The Honeywell Mobility Edge Android Pie device must be configured to not allow passwords that include more than two repeating or sequential characters - TypeMobileIron - DISA Honeywell Android 9.x COBO v1r2MDM

CONFIGURATION MANAGEMENT

HONW-09-000200 - The Honeywell Mobility Edge Android Pie device must be configured to not allow passwords that include more than two repeating or sequential characters - TypeMobileIron - DISA Honeywell Android 9.x COPE v1r2MDM

CONFIGURATION MANAGEMENT

HONW-09-000300 - The Honeywell Mobility Edge Android Pie device must be configured to enable a screen-lock policy that will lock the display after a period of inactivity.MobileIron - DISA Honeywell Android 9.x COPE v1r2MDM

ACCESS CONTROL

HONW-09-001600 - The Honeywell Mobility Edge Android Pie device must be configured to not display the following (work profile) notifications when the device is locked:AirWatch - DISA Honeywell Android 9.x COPE v1r2MDM

CONFIGURATION MANAGEMENT

HONW-09-002800 - The Honeywell Mobility Edge Android Pie device must be configured to disable developer modes.AirWatch - DISA Honeywell Android 9.x COBO v1r2MDM

CONFIGURATION MANAGEMENT

HONW-09-003500 - The Honeywell Mobility Edge Android Pie device must be configured to disable USB mass storage mode.MobileIron - DISA Honeywell Android 9.x COBO v1r2MDM

CONFIGURATION MANAGEMENT

HONW-09-003500 - The Honeywell Mobility Edge Android Pie device must be configured to disable USB mass storage mode.MobileIron - DISA Honeywell Android 9.x COPE v1r2MDM

CONFIGURATION MANAGEMENT

HONW-09-009000 - Honeywell Mobility Edge Android Pie devices must have the DoD root and intermediate PKI certificates installed.MobileIron - DISA Honeywell Android 9.x COPE v1r2MDM

CONFIGURATION MANAGEMENT

HONW-09-009400 - Honeywell Mobility Edge Android Pie devices work profile must be configured to enforce the system application disable list.MobileIron - DISA Honeywell Android 9.x COPE v1r2MDM

CONFIGURATION MANAGEMENT

HONW-09-009800 - Honeywell Mobility Edge Android Pie devices work profile must be configured to disable automatic completion of workspace internet browser text input.MobileIron - DISA Honeywell Android 9.x COBO v1r2MDM

CONFIGURATION MANAGEMENT

HONW-09-009800 - Honeywell Mobility Edge Android Pie devices work profile must be configured to disable automatic completion of workspace internet browser text input.MobileIron - DISA Honeywell Android 9.x COPE v1r2MDM

CONFIGURATION MANAGEMENT

HONW-09-010000 - Honeywell Mobility Edge Android Pie devices Work Profile must be configured to disable the autofill services.AirWatch - DISA Honeywell Android 9.x COPE v1r2MDM

CONFIGURATION MANAGEMENT

HONW-09-010000 - Honeywell Mobility Edge Android Pie devices Work Profile must be configured to disable the autofill services.MobileIron - DISA Honeywell Android 9.x COPE v1r2MDM

CONFIGURATION MANAGEMENT

JRE8-UX-000020 - Oracle JRE 8 deployment.config file must contain proper keys and values - deployment.system.config.mandatoryDISA STIG Oracle JRE 8 Unix v1r3Unix

CONFIGURATION MANAGEMENT