| DISA_STIG_Amazon_Linux_2023_v1r2.audit from DISA Amazon Linux 2023 STIG v1r2 | DISA Amazon Linux 2023 STIG v1r2 | Unix | |
| DISA_STIG_Apache_Server-2.2_Unix_v1r11_Middleware.audit from DISA Apache 2.2 Unix STIG v1r11 | DISA STIG Apache Server 2.2 Unix v1r11 Middleware | Unix | |
| DISA_STIG_Cisco_ASA_NDM_v2r4.audit from DISA Cisco ASA NDM v2r4 STIG | DISA STIG Cisco ASA NDM v2r4 | Cisco | |
| DISA_STIG_Crunchy_Data_PostgreSQL_v3r1_OS_Linux.audit from DISA Crunchy Data PostgreSQL v3r1 STIG | DISA STIG Crunchy Data PostgreSQL OS v3r1 | Unix | |
| DISA_STIG_IBM_DB2_v10.5_LUW_v2r1_OS_Linux.audit from DISA IBM DB2 V10.5 LUW v2r1 STIG | DISA STIG IBM DB2 v10.5 LUW v2r1 OS Linux | Unix | |
| DISA_STIG_Microsoft_Word_2013_v1r7.audit from DISA Microsoft Word 2013 v1r7 STIG | DISA STIG Microsoft Word 2013 v1r7 | Windows | |
| DISA_STIG_Oracle_Database_11.2g_v2r5_OS_Linux.audit from DISA Oracle Database 11.2g v2r5 STIG | DISA STIG Oracle 11.2g v2r5 Linux | Unix | |
| DISA_STIG_Oracle_Database_12c_v3r5_Database.audit from DISA Oracle Database 12c v3r5 STIG | DISA Oracle Database 12c STIG v3r5 OracleDB | OracleDB | |
| DISA_STIG_Oracle_Database_12c_v3r5_OS_Linux.audit from DISA Oracle Database 12c v3r5 STIG | DISA Oracle Database 12c STIG v3r5 Unix | Unix | |
| DISA_STIG_Oracle_MySQL_8.0_v2r2_Database.audit from DISA Oracle MySQL 8.0 v2r2 STIG | DISA Oracle MySQL 8.0 v2r2 DB | MySQLDB | |
| SLES-12-010010 - Vendor-packaged SUSE operating system security patches and updates must be installed and up to date. | DISA SLES 12 STIG v3r4 | Unix | SYSTEM AND INFORMATION INTEGRITY |
| SLES-12-010030 - The SUSE operating system must display the Standard Mandatory DoD Notice and Consent Banner before granting access via local console. | DISA SLES 12 STIG v3r4 | Unix | ACCESS CONTROL |
| SLES-12-010070 - The SUSE operating system must utilize vlock to allow for session locking. | DISA SLES 12 STIG v3r4 | Unix | ACCESS CONTROL |
| SLES-12-010120 - The SUSE operating system must limit the number of concurrent sessions to 10 for all accounts and/or account types. | DISA SLES 12 STIG v3r4 | Unix | ACCESS CONTROL |
| SLES-12-010130 - The SUSE operating system must lock an account after three consecutive invalid access attempts. | DISA SLES 12 STIG v3r4 | Unix | ACCESS CONTROL |
| SLES-12-010140 - The SUSE operating system must enforce a delay of at least four (4) seconds between logon prompts following a failed logon attempt. | DISA SLES 12 STIG v3r4 | Unix | CONFIGURATION MANAGEMENT |
| SLES-12-010180 - The SUSE operating system must enforce passwords that contain at least one special character. | DISA SLES 12 STIG v3r4 | Unix | IDENTIFICATION AND AUTHENTICATION |
| SLES-12-010190 - The SUSE operating system must require the change of at least eight (8) of the total number of characters when passwords are changed. | DISA SLES 12 STIG v3r4 | Unix | IDENTIFICATION AND AUTHENTICATION |
| SLES-12-010221 - The SUSE operating system must not have accounts configured with blank or null passwords. | DISA SLES 12 STIG v3r4 | Unix | CONFIGURATION MANAGEMENT |
| SLES-12-010230 - The SUSE operating system must configure the Linux Pluggable Authentication Modules (PAM) to only store encrypted representations of passwords. | DISA SLES 12 STIG v3r4 | Unix | IDENTIFICATION AND AUTHENTICATION |
| SLES-12-010410 - There must be no shosts.equiv files on the SUSE operating system. | DISA SLES 12 STIG v3r4 | Unix | CONFIGURATION MANAGEMENT |
| SLES-12-010580 - The SUSE operating system must disable the USB mass storage kernel module. | DISA SLES 12 STIG v3r4 | Unix | IDENTIFICATION AND AUTHENTICATION |
| SLES-12-010590 - The SUSE operating system must disable the file system automounter. | DISA SLES 12 STIG v3r4 | Unix | CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION |
| SLES-12-010610 - The SUSE operating system must disable the x86 Ctrl-Alt-Delete key sequence. | DISA SLES 12 STIG v3r4 | Unix | CONFIGURATION MANAGEMENT |
| SLES-12-010611 - The SUSE operating system must disable the x86 Ctrl-Alt-Delete key sequence for Graphical User Interfaces. | DISA SLES 12 STIG v3r4 | Unix | CONFIGURATION MANAGEMENT |
| SLES-12-010630 - The SUSE operating system must not have unnecessary accounts. | DISA SLES 12 STIG v3r4 | Unix | CONFIGURATION MANAGEMENT |
| SLES-12-010770 - All SUSE operating system local interactive user initialization files executable search paths must contain only paths that resolve to the users home directory. | DISA SLES 12 STIG v3r4 | Unix | CONFIGURATION MANAGEMENT |
| SLES-12-010810 - SUSE operating system file systems that are being imported via Network File System (NFS) must be mounted to prevent files with the setuid and setgid bit set from being executed. | DISA SLES 12 STIG v3r4 | Unix | CONFIGURATION MANAGEMENT |
| SLES-12-010870 - The SUSE operating system must use a separate file system for the system audit data path. | DISA SLES 12 STIG v3r4 | Unix | CONFIGURATION MANAGEMENT |
| SLES-12-010871 - The SUSE operating system library files must have mode 0755 or less permissive. | DISA SLES 12 STIG v3r4 | Unix | CONFIGURATION MANAGEMENT |
| SLES-12-010873 - The SUSE operating system library files must be owned by root. | DISA SLES 12 STIG v3r4 | Unix | CONFIGURATION MANAGEMENT |
| SLES-12-010874 - The SUSE operating system library directories must be owned by root. | DISA SLES 12 STIG v3r4 | Unix | CONFIGURATION MANAGEMENT |
| SLES-12-010910 - The SUSE operating system must be configured to not overwrite Pluggable Authentication Modules (PAM) configuration on package changes. | DISA SLES 12 STIG v3r4 | Unix | CONFIGURATION MANAGEMENT |
| SLES-12-020060 - The SUSE operating system audit system must take appropriate action when the audit storage volume is full. | DISA SLES 12 STIG v3r4 | Unix | AUDIT AND ACCOUNTABILITY |
| SLES-12-020100 - The audit system must take appropriate action when the network cannot be used to off-load audit records. | DISA SLES 12 STIG v3r4 | Unix | AUDIT AND ACCOUNTABILITY |
| SLES-12-020230 - The SUSE operating system must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/opasswd. | DISA SLES 12 STIG v3r4 | Unix | ACCESS CONTROL, AUDIT AND ACCOUNTABILITY |
| SLES-12-020300 - The SUSE operating system must generate audit records for all uses of the umount command. | DISA SLES 12 STIG v3r4 | Unix | AUDIT AND ACCOUNTABILITY, MAINTENANCE |
| SLES-12-020320 - The SUSE operating system must generate audit records for all uses of the ssh-keysign command. | DISA SLES 12 STIG v3r4 | Unix | AUDIT AND ACCOUNTABILITY, MAINTENANCE |
| SLES-12-020420 - The SUSE operating system must generate audit records for all uses of the chown, fchown, fchownat, and lchown syscalls. | DISA SLES 12 STIG v3r4 | Unix | AUDIT AND ACCOUNTABILITY, MAINTENANCE |
| SLES-12-020590 - The SUSE operating system must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/gshadow. | DISA SLES 12 STIG v3r4 | Unix | ACCESS CONTROL, AUDIT AND ACCOUNTABILITY |
| SLES-12-020760 - The SUSE operating system must generate audit records for all modifications to the faillog file. | DISA SLES 12 STIG v3r4 | Unix | AUDIT AND ACCOUNTABILITY, MAINTENANCE |
| SLES-12-030050 - The SUSE operating system must display the Standard Mandatory DoD Notice and Consent Banner before granting access via SSH. | DISA SLES 12 STIG v3r4 | Unix | ACCESS CONTROL |
| SLES-12-030130 - The SUSE operating system must display the date and time of the last successful account logon upon an SSH logon. | DISA SLES 12 STIG v3r4 | Unix | ACCESS CONTROL |
| SLES-12-030150 - The SUSE operating system must not allow automatic logon via SSH. | DISA SLES 12 STIG v3r4 | Unix | CONFIGURATION MANAGEMENT |
| SLES-12-030261 - The SUSE operating system SSH daemon must prevent remote hosts from connecting to the proxy display. | DISA SLES 12 STIG v3r4 | Unix | CONFIGURATION MANAGEMENT |
| SLES-12-030270 - The SUSE operating system SSH server must be configured to use only FIPS-validated key exchange algorithms. | DISA SLES 12 STIG v3r4 | Unix | ACCESS CONTROL |
| SLES-12-030330 - Address space layout randomization (ASLR) must be implemented by the SUSE operating system to protect memory from unauthorized code execution. | DISA SLES 12 STIG v3r4 | Unix | SYSTEM AND INFORMATION INTEGRITY |
| SLES-12-030400 - The SUSE operating system must not allow interfaces to accept Internet Protocol version 4 (IPv4) Internet Control Message Protocol (ICMP) redirect messages by default. | DISA SLES 12 STIG v3r4 | Unix | CONFIGURATION MANAGEMENT |
| SLES-12-030440 - The SUSE operating system must not have network interfaces in promiscuous mode unless approved and documented. | DISA SLES 12 STIG v3r4 | Unix | CONFIGURATION MANAGEMENT |
| SLES-12-030500 - The SUSE operating system must have the packages required for multifactor authentication to be installed. | DISA SLES 12 STIG v3r4 | Unix | IDENTIFICATION AND AUTHENTICATION |