4.012 - Minimum password age does not meet minimum requirements. | DISA Windows Vista STIG v6r41 | Windows | IDENTIFICATION AND AUTHENTICATION |
AIX7-00-002140 - The AIX /etc/hosts file must be owned by root. | DISA STIG AIX 7.x v3r1 | Unix | CONFIGURATION MANAGEMENT |
AIX7-00-002143 - AIX cron and crontab directories must have a mode of 0640 or less permissive. | DISA STIG AIX 7.x v3r1 | Unix | CONFIGURATION MANAGEMENT |
AIX7-00-002145 - The AIX /etc/syslog.conf file must be group-owned by system. | DISA STIG AIX 7.x v3r1 | Unix | CONFIGURATION MANAGEMENT |
AIX7-00-002147 - The AIX /var/spool/cron/atjobs directory must be owned by root or bin. | DISA STIG AIX 7.x v3r1 | Unix | CONFIGURATION MANAGEMENT |
CNTR-K8-000310 - The Kubernetes Controller Manager must have secure binding. | DISA STIG Kubernetes v2r2 | Unix | ACCESS CONTROL |
CNTR-K8-000930 - The Kubernetes Scheduler must enforce ports, protocols, and services (PPS) that adhere to the Ports, Protocols, and Services Management Category Assurance List (PPSM CAL). | DISA STIG Kubernetes v2r2 | Unix | CONFIGURATION MANAGEMENT |
CNTR-K8-000940 - The Kubernetes Controllers must enforce ports, protocols, and services (PPS) that adhere to the Ports, Protocols, and Services Management Category Assurance List (PPSM CAL). | DISA STIG Kubernetes v2r2 | Unix | CONFIGURATION MANAGEMENT |
CNTR-K8-001400 - The Kubernetes API server must use approved cipher suites. | DISA STIG Kubernetes v2r2 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
CNTR-K8-001420 - Kubernetes Kubelet must have the SSL Certificate Authority set. | DISA STIG Kubernetes v2r2 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
CNTR-K8-001460 - Kubernetes Kubelet must enable tlsPrivateKeyFile for client authentication to secure service. | DISA STIG Kubernetes v2r2 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
CNTR-K8-001500 - Kubernetes etcd must have a certificate for communication. | DISA STIG Kubernetes v2r2 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
CNTR-K8-003150 - The Kubernetes Kube Proxy kubeconfig must be owned by root. | DISA STIG Kubernetes v2r2 | Unix | CONFIGURATION MANAGEMENT |
CNTR-K8-003210 - The Kubernetes kubeadm.conf must be owned by root. | DISA STIG Kubernetes v2r2 | Unix | CONFIGURATION MANAGEMENT |
CNTR-K8-003220 - The Kubernetes kubeadm.conf must have file permissions set to 644 or more restrictive. | DISA STIG Kubernetes v2r2 | Unix | CONFIGURATION MANAGEMENT |
CNTR-K8-003230 - The Kubernetes kubelet config must have file permissions set to 644 or more restrictive. | DISA STIG Kubernetes v2r2 | Unix | CONFIGURATION MANAGEMENT |
CNTR-K8-003240 - The Kubernetes kubelet config must be owned by root. | DISA STIG Kubernetes v2r2 | Unix | CONFIGURATION MANAGEMENT |
CNTR-K8-003280 - Kubernetes API Server audit logs must be enabled. | DISA STIG Kubernetes v2r2 | Unix | CONFIGURATION MANAGEMENT |
CNTR-K8-003290 - The Kubernetes API Server must be set to audit log max size. | DISA STIG Kubernetes v2r2 | Unix | CONFIGURATION MANAGEMENT |
CNTR-K8-003340 - The Kubernetes PKI keys must have file permissions set to 600 or more restrictive. | DISA STIG Kubernetes v2r2 | Unix | CONFIGURATION MANAGEMENT |
Configuring an automatic logout for idle sessions - TMSH | Tenable F5 BIG-IP Best Practice Audit | F5 | ACCESS CONTROL |
Configuring CIDR Network Addresses for the BIG-IP packet filter - enabled | Tenable F5 BIG-IP Best Practice Audit | F5 | ACCESS CONTROL |
DTBI365 - Checking for server certificate revocation must be enforced. | DISA STIG Microsoft Internet Explorer 9 v1r15 | Windows | IDENTIFICATION AND AUTHENTICATION |
EDGE-00-000005 - InPrivate mode must be disabled. | DISA STIG Edge v2r2 | Windows | AUDIT AND ACCOUNTABILITY |
EDGE-00-000021 - Importing of saved passwords must be disabled. | DISA STIG Edge v2r2 | Windows | CONFIGURATION MANAGEMENT |
EDGE-00-000059 - The Share Experience feature must be disabled. | DISA STIG Edge v2r2 | Windows | CONFIGURATION MANAGEMENT |
Mitigating risk from SSH brute force login attacks - Monitor login attempts | Tenable F5 BIG-IP Best Practice Audit | F5 | ACCESS CONTROL |
Modifying the list of ciphers and MAC and key exchange algorithms used by the SSH service on the BIG-IP system or BIG-IQ system | Tenable F5 BIG-IP Best Practice Audit | F5 | ACCESS CONTROL |
MYS8-00-001200 - The audit information produced by the MySQL Database Server 8.0 must be protected from unauthorized read access. | DISA Oracle MySQL 8.0 v2r2 OS Linux | Unix | AUDIT AND ACCOUNTABILITY |
MYS8-00-001800 - The MySQL Database Server 8.0 must be able to generate audit records when privileges/permissions are retrieved. | DISA Oracle MySQL 8.0 v2r2 DB | MySQLDB | AUDIT AND ACCOUNTABILITY |
MYS8-00-002400 - The MySQL Database Server 8.0 must generate audit records when privileges/permissions are added. | DISA Oracle MySQL 8.0 v2r2 DB | MySQLDB | AUDIT AND ACCOUNTABILITY |
MYS8-00-002500 - The MySQL Database Server 8.0 must generate audit records when unsuccessful attempts to add privileges/permissions occur. | DISA Oracle MySQL 8.0 v2r2 DB | MySQLDB | AUDIT AND ACCOUNTABILITY |
MYS8-00-003000 - The MySQL Database Server 8.0 must generate audit records when categories of information (e.g., classification levels/security levels) are modified. | DISA Oracle MySQL 8.0 v2r2 DB | MySQLDB | AUDIT AND ACCOUNTABILITY |
MYS8-00-004000 - The MySQL Database Server 8.0 must generate audit records for all privileged activities or other system-level access. | DISA Oracle MySQL 8.0 v2r2 DB | MySQLDB | AUDIT AND ACCOUNTABILITY |
MYS8-00-004300 - The MySQL Database Server 8.0 must generate audit records when concurrent logons/connections by the same user from different workstations. | DISA Oracle MySQL 8.0 v2r2 DB | MySQLDB | AUDIT AND ACCOUNTABILITY |
MYS8-00-005500 - The MySQL Database Server 8.0 must be configured in accordance with the security configuration settings based on DoD security configuration and implementation guidance, including STIGs, NSA configuration guides, CTOs, DTMs, and IAVMs. | DISA Oracle MySQL 8.0 v2r2 DB | MySQLDB | CONFIGURATION MANAGEMENT |
MYS8-00-005800 - Unused database components which are integrated in the MySQL Database Server 8.0 and cannot be uninstalled must be disabled. | DISA Oracle MySQL 8.0 v2r2 DB | MySQLDB | CONFIGURATION MANAGEMENT |
MYS8-00-006500 - The MySQL Database Server 8.0 must isolate security functions from non-security functions. | DISA Oracle MySQL 8.0 v2r2 DB | MySQLDB | SYSTEM AND COMMUNICATIONS PROTECTION |
MYS8-00-006600 - Database contents must be protected from unauthorized and unintended information transfer by enforcement of a data-transfer policy. | DISA Oracle MySQL 8.0 v2r2 DB | MySQLDB | SYSTEM AND COMMUNICATIONS PROTECTION |
MYS8-00-006800 - Access to database files must be limited to relevant processes and to authorized, administrative users. | DISA Oracle MySQL 8.0 v2r2 DB | MySQLDB | SYSTEM AND COMMUNICATIONS PROTECTION |
MYS8-00-008100 - The MySQL Database Server 8.0 must protect its audit configuration from unauthorized modification. | DISA Oracle MySQL 8.0 v2r2 DB | MySQLDB | AUDIT AND ACCOUNTABILITY |
MYS8-00-008200 - The MySQL Database Server 8.0 must protect its audit features from unauthorized removal. | DISA Oracle MySQL 8.0 v2r2 DB | MySQLDB | AUDIT AND ACCOUNTABILITY |
MYS8-00-009600 - The MySQL Database Server 8.0 must allocate audit record storage capacity in accordance with organization-defined audit record storage requirements. | DISA Oracle MySQL 8.0 v2r2 DB | MySQLDB | AUDIT AND ACCOUNTABILITY |
MYS8-00-011500 - The MySQL Database Server 8.0 must use NSA-approved cryptography to protect classified information in accordance with the data owner's requirements. | DISA Oracle MySQL 8.0 v2r2 DB | MySQLDB | SYSTEM AND COMMUNICATIONS PROTECTION |
SHPT-00-000007 - SharePoint must support the requirement to initiate a session lock after an organizationally defined time period of system or application inactivity has transpired. | DISA STIG SharePoint 2010 v1r9 | Windows | ACCESS CONTROL |
SHPT-00-000193 - The SharePoint setup user domain account must be configured with the minimum privileges in Active Directory. | DISA STIG SharePoint 2010 v1r9 | Windows | ACCESS CONTROL |
SHPT-00-000240 - SharePoint must retain the notification message or banner on the screen until users take explicit actions to log on to or further access. | DISA STIG SharePoint 2010 v1r9 | Windows | ACCESS CONTROL |
SHPT-00-000315 - SharePoint must allow designated organizational personnel to select which auditable events are to be audited by specific components of the system. | DISA STIG SharePoint 2010 v1r9 | Windows | AUDIT AND ACCOUNTABILITY |
SHPT-00-000475 - To support the requirements and principles of least functionality; SharePoint must support the organizational requirement to provide only essential capabilities. | DISA STIG SharePoint 2010 v1r9 | Windows | CONFIGURATION MANAGEMENT |
SHPT-00-000645 - SharePoint must terminate the network connection associated with a communications session at the end of the session or after an organizationally defined time period of inactivity - 'FormDigestSettings.Enabled = True' | DISA STIG SharePoint 2010 v1r9 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |