AMLS-NM-200825 - Arista MLS must use FIPS-compliant mechanisms for authentication to a cryptographic module - entropy source | DISA STIG Arista MLS DCS-7000 Series NDM V1R2 | Arista | SYSTEM AND COMMUNICATIONS PROTECTION |
CISC-L2-000030 - The Cisco switch must authenticate all VLAN Trunk Protocol (VTP) messages with a hash function using the most secured cryptographic algorithm available. | DISA STIG Cisco NX-OS Switch L2S v2r1 | Cisco | IDENTIFICATION AND AUTHENTICATION |
CISC-RT-000050 - The Cisco switch must be configured to authenticate all routing protocol messages using NIST-validated FIPS 198-1 message authentication code algorithm. | DISA STIG Cisco IOS Switch RTR v1r1 | Cisco | IDENTIFICATION AND AUTHENTICATION |
DB2X-00-004600 - DB2 must use NIST FIPS 140-2 validated cryptographic modules for cryptographic operations - DB2COMM | DISA STIG IBM DB2 v10.5 LUW v1r4 OS Linux | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
DTOO257 - Outlook - S/Mime interoperability with external clients for message handling must be configured. | DISA STIG Office 2010 Outlook v1r13 | Windows | IDENTIFICATION AND AUTHENTICATION |
DTOO257 - S/Mime interoperability with external clients for message handling must be configured. | DISA STIG Microsoft Outlook 2013 v1r13 | Windows | IDENTIFICATION AND AUTHENTICATION |
DTOO257 - S/Mime interoperability with external clients for message handling must be configured. | DISA STIG Microsoft Outlook 2013 v1r12 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
DTOO257 - S/Mime interoperability with external clients for message handling must be configured. | DISA STIG Microsoft Outlook 2016 v1r2 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
DTOO260 - Message formats must be set to use SMime. | DISA STIG Microsoft Outlook 2013 v1r13 | Windows | IDENTIFICATION AND AUTHENTICATION |
DTOO260 - Message formats must be set to use SMime. | DISA STIG Microsoft Outlook 2016 v1r2 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
DTOO260 - Message formats must be set to use SMime. | DISA STIG Microsoft Outlook 2013 v1r12 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
DTOO260 - Outlook - Message formats must be set to use SMime. | DISA STIG Office 2010 Outlook v1r13 | Windows | IDENTIFICATION AND AUTHENTICATION |
DTOO262 - Outlook - Run in FIPS compliant mode must be enforced. | DISA STIG Office 2010 Outlook v1r13 | Windows | IDENTIFICATION AND AUTHENTICATION |
DTOO262 - Run in FIPS compliant mode must be enforced. | DISA STIG Microsoft Outlook 2016 v1r2 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
DTOO262 - Run in FIPS compliant mode must be enforced. | DISA STIG Microsoft Outlook 2013 v1r13 | Windows | IDENTIFICATION AND AUTHENTICATION |
DTOO262 - Run in FIPS compliant mode must be enforced. | DISA STIG Microsoft Outlook 2013 v1r12 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
GEN000590 - The system must use a FIPS 140-2 approved cryptographic hashing algorithm for generating account password hashes. | DISA STIG for Oracle Linux 5 v1r14 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
GEN000590 - The system must use a FIPS 140-2 approved cryptographic hashing algorithm for generating account password hashes. | DISA STIG AIX 6.1 v1r13 | Unix | IDENTIFICATION AND AUTHENTICATION |
GEN000590 - The system must use a FIPS 140-2 approved cryptographic hashing algorithm for generating account password hashes. | DISA STIG for Red Hat Enterprise Linux 5 v1r17 Audit | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
GEN000590 - The system must use a FIPS 140-2 approved cryptographic hashing algorithm for generating account password hashes. | DISA STIG AIX 5.3 v1r2 | Unix | IDENTIFICATION AND AUTHENTICATION |
GEN000590 - The system must use FIPS 140-2 approved algorithm for generating password hashes | DISA STIG HP-UX 11.31 v1r19 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
GEN000590 - The system must use FIPS 140-2 approved algorithm for generating password hashes - 'CRYPT_DEFAULT=6' | DISA STIG HP-UX 11.31 v1r19 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
MD4X-00-001300 - MongoDB must use NIST FIPS 140-2-validated cryptographic modules for cryptographic operations. | DISA STIG MongoDB Enterprise Advanced 4.x v1r1 OS | Unix | |
OL08-00-010160 - The OL 8 'pam_unix.so' module must be configured in the password-auth file to use a FIPS 140-2 approved cryptographic hashing algorithm for system authentication. | DISA Oracle Linux 8 STIG v1r9 | Unix | IDENTIFICATION AND AUTHENTICATION |
OL08-00-010161 - OL 8 must prevent system daemons from using Kerberos for authentication. | DISA Oracle Linux 8 STIG v1r7 | Unix | |
RHEL-08-010162 - The krb5-workstation package must not be installed on RHEL 8. | DISA Red Hat Enterprise Linux 8 STIG v1r11 | Unix | |
RHEL-08-010162 - The krb5-workstation package must not be installed on RHEL 8. | DISA Red Hat Enterprise Linux 8 STIG v1r13 | Unix | |
RHEL-08-010162 - The krb5-workstation package must not be installed on RHEL 8. | DISA Red Hat Enterprise Linux 8 STIG v1r3 | Unix | |
RHEL-08-010163 - The krb5-server package must not be installed on RHEL 8. | DISA Red Hat Enterprise Linux 8 STIG v1r13 | Unix | |
RHEL-09-252065 - RHEL 9 libreswan package must be installed. | DISA Red Hat Enterprise Linux 9 STIG v1r1 | Unix | |
RHEL-09-611050 - RHEL 9 password-auth must be configured to use a sufficient number of hashing rounds. | DISA Red Hat Enterprise Linux 9 STIG v1r2 | Unix | |
RHEL-09-611050 - RHEL 9 password-auth must be configured to use a sufficient number of hashing rounds. | DISA Red Hat Enterprise Linux 9 STIG v1r1 | Unix | |
RHEL-09-611055 - RHEL 9 system-auth must be configured to use a sufficient number of hashing rounds. | DISA Red Hat Enterprise Linux 9 STIG v1r2 | Unix | |
RHEL-09-611150 - RHEL 9 shadow password suite must be configured to use a sufficient number of hashing rounds. | DISA Red Hat Enterprise Linux 9 STIG v1r1 | Unix | |
RHEL-09-652015 - RHEL 9 must have the packages required for encrypting offloaded audit logs installed. | DISA Red Hat Enterprise Linux 9 STIG v1r1 | Unix | |
RHEL-09-671015 - RHEL 9 must employ FIPS 140-3 approved cryptographic hashing algorithms for all stored passwords. | DISA Red Hat Enterprise Linux 9 STIG v1r2 | Unix | |
SLES-15-020180 - The SUSE operating system must employ FIPS 140-2-approved cryptographic hashing algorithms for all stored passwords. | DISA SLES 15 STIG v1r9 | Unix | |
SLES-15-020180 - The SUSE operating system must employ FIPS 140-2-approved cryptographic hashing algorithms for all stored passwords. | DISA SLES 15 STIG v1r11 | Unix | |
SLES-15-020180 - The SUSE operating system must employ FIPS 140-2-approved cryptographic hashing algorithms for all stored passwords. | DISA SLES 15 STIG v1r6 | Unix | |
SLES-15-020180 - The SUSE operating system must employ FIPS 140-2-approved cryptographic hashing algorithms for all stored passwords. | DISA SLES 15 STIG v1r10 | Unix | |
SLES-15-020190 - The SUSE operating system must employ FIPS 140-2-approved cryptographic hashing algorithms for all stored passwords - SHA_CRYPT_MIN_ROUNDS | DISA SLES 15 STIG v1r9 | Unix | |
SLES-15-020190 - The SUSE operating system must employ FIPS 140-2-approved cryptographic hashing algorithms for all stored passwords - SHA_CRYPT_MIN_ROUNDS | DISA SLES 15 STIG v1r6 | Unix | |
SLES-15-020190 - The SUSE operating system must employ FIPS 140-2-approved cryptographic hashing algorithms for all stored passwords. | DISA SLES 15 STIG v1r11 | Unix | |
SLES-15-020190 - The SUSE operating system must employ FIPS 140-2-approved cryptographic hashing algorithms for all stored passwords. | DISA SLES 15 STIG v1r10 | Unix | |
SPLK-CL-000430 - Splunk Enterprise must use TLS 1.2 and SHA-2 or higher cryptographic algorithms. - inputs.conf ecdhCurves | DISA STIG Splunk Enterprise 8.x for Linux v1r3 STIG OS | Unix | |
SPLK-CL-000430 - Splunk Enterprise must use TLS 1.2 and SHA-2 or higher cryptographic algorithms. - ldap.conf TLS_PROTOCOL_MIN | DISA STIG Splunk Enterprise 8.x for Linux v1r3 STIG OS | Unix | |
SPLK-CL-000430 - Splunk Enterprise must use TLS 1.2 and SHA-2 or higher cryptographic algorithms. - server.conf ciphersuite | DISA STIG Splunk Enterprise 8.x for Linux v1r3 STIG OS | Unix | |
SPLK-CL-000430 - Splunk Enterprise must use TLS 1.2 and SHA-2 or higher cryptographic algorithms. - web.conf sslVersions | DISA STIG Splunk Enterprise 8.x for Linux v1r3 STIG OS | Unix | |
SRG-OS-000120-ESXI5 - Password hashes stored on the system must be generated using FIPS 140-2 approved crypto hashing algorithm | DISA STIG VMWare ESXi Server 5 STIG v1r9 | VMware | |
WN11-CC-000052 - Windows 11 must be configured to prioritize ECC Curves with longer key lengths first. | DISA Windows 11 STIG v1r4 | Windows | |