Item Search

NameAudit NamePluginCategory
APPL-13-002060 - The macOS system must only allow applications with a valid digital signature to run.DISA STIG Apple macOS 13 v1r5Unix

CONFIGURATION MANAGEMENT

APPL-13-002068 - The macOS system must set permissions on user home directories to prevent users from having access to read or modify another user's files.DISA STIG Apple macOS 13 v1r5Unix

CONFIGURATION MANAGEMENT

APPL-13-003052 - The macOS system must be configured so that the sudo command requires smart card authentication.DISA STIG Apple macOS 13 v1r5Unix

CONFIGURATION MANAGEMENT

APPL-14-003013 The macOS system must enable firmware password.DISA Apple macOS 14 (Sonoma) STIG v2r3Unix

CONFIGURATION MANAGEMENT

APPL-14-005110 The macOS system must enforce enrollment in mobile device management.DISA Apple macOS 14 (Sonoma) STIG v2r3Unix

CONFIGURATION MANAGEMENT

APPL-15-005120 - The macOS system must enable Recovery Lock.DISA Apple macOS 15 (Sequoia) STIG v1r3Unix

CONFIGURATION MANAGEMENT

OL08-00-040341 - The OL 8 SSH daemon must prevent remote hosts from connecting to the proxy display.DISA Oracle Linux 8 STIG v2r4Unix

CONFIGURATION MANAGEMENT

RHEL-08-010010 - RHEL 8 vendor packaged system security patches and updates must be installed and up to date.DISA Red Hat Enterprise Linux 8 STIG v2r3Unix

CONFIGURATION MANAGEMENT

RHEL-08-010121 - The RHEL 8 operating system must not have accounts configured with blank or null passwords.DISA Red Hat Enterprise Linux 8 STIG v2r3Unix

CONFIGURATION MANAGEMENT

RHEL-08-010292 - RHEL 8 must ensure the SSH server uses strong entropy.DISA Red Hat Enterprise Linux 8 STIG v2r3Unix

CONFIGURATION MANAGEMENT

RHEL-08-010379 - RHEL 8 must specify the default "include" directory for the /etc/sudoers file.DISA Red Hat Enterprise Linux 8 STIG v2r3Unix

CONFIGURATION MANAGEMENT

RHEL-08-010480 - The RHEL 8 SSH public host key files must have mode 0644 or less permissive.DISA Red Hat Enterprise Linux 8 STIG v2r3Unix

CONFIGURATION MANAGEMENT

RHEL-08-010490 - The RHEL 8 SSH private host key files must have mode 0640 or less permissive.DISA Red Hat Enterprise Linux 8 STIG v2r3Unix

CONFIGURATION MANAGEMENT

RHEL-08-010521 - The RHEL 8 SSH daemon must not allow Kerberos authentication, except to fulfill documented and validated mission requirements.DISA Red Hat Enterprise Linux 8 STIG v2r3Unix

CONFIGURATION MANAGEMENT

RHEL-08-010542 - RHEL 8 must use a separate file system for the system audit data path.DISA Red Hat Enterprise Linux 8 STIG v2r3Unix

CONFIGURATION MANAGEMENT

RHEL-08-010543 - A separate RHEL 8 filesystem must be used for the /tmp directory.DISA Red Hat Enterprise Linux 8 STIG v2r3Unix

CONFIGURATION MANAGEMENT

RHEL-08-010580 - RHEL 8 must prevent special devices on non-root local partitions.DISA Red Hat Enterprise Linux 8 STIG v2r3Unix

CONFIGURATION MANAGEMENT

RHEL-08-010731 - All RHEL 8 local interactive user home directory files must have mode 0750 or less permissive.DISA Red Hat Enterprise Linux 8 STIG v2r3Unix

CONFIGURATION MANAGEMENT

RHEL-08-010740 - All RHEL 8 local interactive user home directories must be group-owned by the home directory owner's primary group.DISA Red Hat Enterprise Linux 8 STIG v2r3Unix

CONFIGURATION MANAGEMENT

RHEL-08-010820 - Unattended or automatic logon via the RHEL 8 graphical user interface must not be allowed.DISA Red Hat Enterprise Linux 8 STIG v2r3Unix

CONFIGURATION MANAGEMENT

RHEL-08-020032 - RHEL 8 must disable the user list at logon for graphical user interfaces.DISA Red Hat Enterprise Linux 8 STIG v2r3Unix

CONFIGURATION MANAGEMENT

RHEL-08-020100 - RHEL 8 must ensure the password complexity module is enabled in the password-auth file.DISA Red Hat Enterprise Linux 8 STIG v2r3Unix

CONFIGURATION MANAGEMENT

RHEL-08-020320 - RHEL 8 must not have unnecessary accounts.DISA Red Hat Enterprise Linux 8 STIG v2r3Unix

CONFIGURATION MANAGEMENT

RHEL-08-020330 - RHEL 8 must not allow accounts configured with blank or null passwords.DISA Red Hat Enterprise Linux 8 STIG v2r3Unix

CONFIGURATION MANAGEMENT

RHEL-08-020332 - RHEL 8 must not allow blank or null passwords in the password-auth file.DISA Red Hat Enterprise Linux 8 STIG v2r3Unix

CONFIGURATION MANAGEMENT

RHEL-08-030010 - Cron logging must be implemented in RHEL 8.DISA Red Hat Enterprise Linux 8 STIG v2r3Unix

CONFIGURATION MANAGEMENT

RHEL-08-040170 - The x86 Ctrl-Alt-Delete key sequence must be disabled on RHEL 8.DISA Red Hat Enterprise Linux 8 STIG v2r3Unix

CONFIGURATION MANAGEMENT

RHEL-08-040210 - RHEL 8 must prevent IPv6 Internet Control Message Protocol (ICMP) redirect messages from being accepted.DISA Red Hat Enterprise Linux 8 STIG v2r3Unix

CONFIGURATION MANAGEMENT

RHEL-08-040220 - RHEL 8 must not send Internet Control Message Protocol (ICMP) redirects.DISA Red Hat Enterprise Linux 8 STIG v2r3Unix

CONFIGURATION MANAGEMENT

RHEL-08-040230 - RHEL 8 must not respond to Internet Control Message Protocol (ICMP) echoes sent to a broadcast address.DISA Red Hat Enterprise Linux 8 STIG v2r3Unix

CONFIGURATION MANAGEMENT

RHEL-08-040260 - RHEL 8 must not enable IPv6 packet forwarding unless the system is a router.DISA Red Hat Enterprise Linux 8 STIG v2r3Unix

CONFIGURATION MANAGEMENT

RHEL-08-040279 - RHEL 8 must ignore IPv4 Internet Control Message Protocol (ICMP) redirect messages.DISA Red Hat Enterprise Linux 8 STIG v2r3Unix

CONFIGURATION MANAGEMENT

SLES-15-020091 - The SUSE operating system must not have unnecessary account capabilities.DISA SUSE Linux Enterprise Server 15 STIG v2r4Unix

CONFIGURATION MANAGEMENT

SLES-15-040020 - There must be no .shosts files on the SUSE operating system.DISA SUSE Linux Enterprise Server 15 STIG v2r4Unix

CONFIGURATION MANAGEMENT

SLES-15-040050 - The SUSE operating system file integrity tool must be configured to verify extended attributes.DISA SUSE Linux Enterprise Server 15 STIG v2r4Unix

CONFIGURATION MANAGEMENT

SLES-15-040061 - The SUSE operating system must disable the x86 Ctrl-Alt-Delete key sequence for Graphical User Interfaces.DISA SUSE Linux Enterprise Server 15 STIG v2r4Unix

CONFIGURATION MANAGEMENT

SLES-15-040070 - All SUSE operating system local interactive users must have a home directory assigned in the /etc/passwd file.DISA SUSE Linux Enterprise Server 15 STIG v2r4Unix

CONFIGURATION MANAGEMENT

SLES-15-040180 - All SUSE operating system world-writable directories must be group-owned by root, sys, bin, or an application group.DISA SUSE Linux Enterprise Server 15 STIG v2r4Unix

CONFIGURATION MANAGEMENT

SLES-15-040210 - The SUSE operating system must use a separate file system for /var.DISA SUSE Linux Enterprise Server 15 STIG v2r4Unix

CONFIGURATION MANAGEMENT

SLES-15-040240 - The SUSE operating system SSH daemon public host key files must have mode 0644 or less permissive.DISA SUSE Linux Enterprise Server 15 STIG v2r4Unix

CONFIGURATION MANAGEMENT

SLES-15-040300 - The SUSE operating system must not forward Internet Protocol version 4 (IPv4) source-routed packets.DISA SUSE Linux Enterprise Server 15 STIG v2r4Unix

CONFIGURATION MANAGEMENT

SLES-15-040310 - The SUSE operating system must not forward Internet Protocol version 6 (IPv6) source-routed packets.DISA SUSE Linux Enterprise Server 15 STIG v2r4Unix

CONFIGURATION MANAGEMENT

SLES-15-040350 - The SUSE operating system must not allow interfaces to accept Internet Protocol version 6 (IPv6) Internet Control Message Protocol (ICMP) redirect messages by default.DISA SUSE Linux Enterprise Server 15 STIG v2r4Unix

CONFIGURATION MANAGEMENT

SLES-15-040380 - The SUSE operating system must not be performing Internet Protocol version 4 (IPv4) packet forwarding unless the system is a router.DISA SUSE Linux Enterprise Server 15 STIG v2r4Unix

CONFIGURATION MANAGEMENT

SLES-15-040390 - The SUSE operating system must not have network interfaces in promiscuous mode unless approved and documented.DISA SUSE Linux Enterprise Server 15 STIG v2r4Unix

CONFIGURATION MANAGEMENT

SLES-15-040420 - The SUSE operating system default permissions must be defined in such a way that all authenticated users can only read and modify their own files.DISA SUSE Linux Enterprise Server 15 STIG v2r4Unix

CONFIGURATION MANAGEMENT

SLES-15-040440 - The SUSE operating system must not allow unattended or automatic logon via SSH.DISA SUSE Linux Enterprise Server 15 STIG v2r4Unix

CONFIGURATION MANAGEMENT

UBTU-24-100010 - Ubuntu 24.04 LTS must not have the "systemd-timesyncd" package installed.DISA Canonical Ubuntu 24.04 LTS STIG v1r1Unix

CONFIGURATION MANAGEMENT

UBTU-24-300023 - Ubuntu 24.04 LTS SSH daemon must prevent remote hosts from connecting to the proxy display.DISA Canonical Ubuntu 24.04 LTS STIG v1r1Unix

CONFIGURATION MANAGEMENT

UBTU-24-300024 - Ubuntu 24.04 LTS must display the date and time of the last successful account logon upon logon.DISA Canonical Ubuntu 24.04 LTS STIG v1r1Unix

CONFIGURATION MANAGEMENT