Item Search

NameAudit NamePluginCategory
CISC-RT-000240 - The Cisco perimeter router must be configured to deny network traffic by default and allow network traffic by exception.DISA STIG Cisco IOS XE Router RTR v3r2Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

CISC-RT-000240 - The Cisco perimeter router must be configured to deny network traffic by default and allow network traffic by exception.DISA STIG Cisco IOS-XR Router RTR v3r2Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

CISC-RT-000290 - The Cisco perimeter router must be configured to not be a Border Gateway Protocol (BGP) peer to an alternate gateway service provider.DISA STIG Cisco IOS XE Router RTR v3r2Cisco

ACCESS CONTROL

DISA_Canonical_Ubuntu_22.04_LTS_STIG_v2r3.audit from DISA Canonical Ubuntu 22.04 LTS STIG v2r3DISA Canonical Ubuntu 22.04 LTS STIG v2r3Unix
DISA_STIG_Apache_Site-2.2_Unix_v1r11.audit from DISA Apache 2.2 Unix STIG v1r11DISA STIG Apache Site 2.2 Unix v1r11Unix
DISA_STIG_Apple_OS_X_10.13_v2r5.audit from DISA Apple OS X 10.13 v2r5 STIGDISA STIG Apple Mac OSX 10.13 v2r5Unix
DISA_STIG_EDB_PostgreSQL_Advanced_Server_v9.6_v2r3_OS_Linux.audit from DISA EDB Postgres Advanced Server v9.6 v2r3 STIGEDB PostgreSQL Advanced Server OS Linux Audit v2r3Unix
DISA_STIG_Microsoft_Dot_Net_Framework_4.0_v2r4.audit from DISA Microsoft DotNet Framework 4.0 v2r4 STIGDISA STIG for Microsoft Dot Net Framework 4.0 v2r4Windows
DISA_STIG_Microsoft_Office_System_2016_v2r4.audit from DISA Microsoft Office System 2016 v2r4 STIGDISA Microsoft Office System 2016 STIG v2r4Windows
DISA_STIG_Microsoft_Sharepoint_Designer_2013_v1r3.audit from DISA STIG Microsoft Sharepoint Designer 2013 v1r3DISA STIG Microsoft Sharepoint Designer 2013 v1r3Windows
DISA_STIG_VMware_vSphere_6.7_ESXi_Bare_Metal_Host_v1r3.audit from DISA VMware vSphere 6.7 ESXi v1r3 STIGDISA STIG VMware vSphere 6.7 ESXi OS v1r3Unix
DISA_STIG_VMware_vSphere_6.7_PostgreSQL_v1r2.audit from DISA VMware vSphere 6.7 PostgreSQL v1r2 STIGDISA STIG VMware vSphere 6.7 PostgreSQL v1r2Unix
DISA_STIG_VMware_vSphere_7.0_ESXi_Bare_Metal_Host_v1r4.audit from DISA VMware vSphere 7.0 ESXi v1r4 STIGDISA STIG VMware vSphere 7.0 ESXi OS v1r4Unix
JUNI-ND-000120 - The Juniper router must be configured to automatically audit account removal actions.DISA STIG Juniper Router NDM v3r2Juniper

ACCESS CONTROL

JUNI-ND-000150 - The Juniper router must be configured to enforce the limit of three consecutive invalid logon attempts after which time lock out the user account from accessing the device for 15 minutes.DISA STIG Juniper Router NDM v3r2Juniper

ACCESS CONTROL

JUNI-ND-000210 - The Juniper router must be configured to protect against an individual falsely denying having performed organization-defined actions to be covered by non-repudiation.DISA STIG Juniper Router NDM v3r2Juniper

AUDIT AND ACCOUNTABILITY

JUNI-ND-000330 - The Juniper router must be configured to generate audit records containing the full-text recording of privileged commands.DISA STIG Juniper Router NDM v3r2Juniper

AUDIT AND ACCOUNTABILITY

JUNI-ND-000390 - The Juniper router must be configured to protect audit information from unauthorized deletion.DISA STIG Juniper Router NDM v3r2Juniper

AUDIT AND ACCOUNTABILITY

JUNI-ND-000490 - The Juniper router must be configured with only one local account to be used as the account of last resort in the event the authentication server is unavailable.DISA STIG Juniper Router NDM v3r2Juniper

ACCESS CONTROL

JUNI-ND-000590 - The Juniper router must be configured to enforce password complexity by requiring that at least one numeric character be used.DISA STIG Juniper Router NDM v3r2Juniper

IDENTIFICATION AND AUTHENTICATION

JUNI-ND-000870 - The Juniper router must be configured to automatically audit account enabling actions.DISA STIG Juniper Router NDM v3r2Juniper

ACCESS CONTROL

JUNI-ND-000990 - The Juniper router must be configured to generate an alert for all audit failure events.DISA STIG Juniper Router NDM v3r2Juniper

AUDIT AND ACCOUNTABILITY

JUNI-ND-001020 - The Juniper router must be configured to synchronize its clock with the primary and secondary time sources using redundant authoritative time sources.DISA STIG Juniper Router NDM v3r2Juniper

AUDIT AND ACCOUNTABILITY

JUNI-ND-001140 - The Juniper router must be configured to authenticate NTP sources using authentication that is cryptographically based.DISA STIG Juniper Router NDM v3r2Juniper

IDENTIFICATION AND AUTHENTICATION

JUNI-ND-001210 - The Juniper router must be configured to protect against known types of Denial of Service (DoS) attacks by employing organization-defined security safeguards - DoS attacks by employing organization-defined security safeguardsDISA STIG Juniper Router NDM v3r2Juniper

SYSTEM AND COMMUNICATIONS PROTECTION

JUNI-ND-001280 - The Juniper router must be configured to generate log records when concurrent logons from different workstations occur.DISA STIG Juniper Router NDM v3r2Juniper

AUDIT AND ACCOUNTABILITY

JUNI-ND-001300 - The Juniper router must be configured to off-load log records onto a different system than the system being audited.DISA STIG Juniper Router NDM v3r2Juniper

AUDIT AND ACCOUNTABILITY

JUNI-ND-001340 - The Juniper router must be configured to generate log records for a locally developed list of auditable events.DISA STIG Juniper Router NDM v3r2Juniper

AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT

JUNI-RT-000010 - The Juniper router must be configured to enforce approved authorizations for controlling the flow of information within the network based on organization-defined information flow control policies.DISA STIG Juniper Router RTR v3r2Juniper

ACCESS CONTROL

JUNI-RT-000020 - The Juniper router must be configured to implement message authentication for all control plane protocols - BGPDISA STIG Juniper Router RTR v3r2Juniper

ACCESS CONTROL, CONFIGURATION MANAGEMENT

JUNI-RT-000020 - The Juniper router must be configured to implement message authentication for all control plane protocols - IS-IS keyDISA STIG Juniper Router RTR v3r2Juniper

ACCESS CONTROL, CONFIGURATION MANAGEMENT

JUNI-RT-000020 - The Juniper router must be configured to implement message authentication for all control plane protocols - IS-IS typeDISA STIG Juniper Router RTR v3r2Juniper

ACCESS CONTROL, CONFIGURATION MANAGEMENT

JUNI-RT-000020 - The Juniper router must be configured to implement message authentication for all control plane protocols - LDPDISA STIG Juniper Router RTR v3r2Juniper

ACCESS CONTROL, CONFIGURATION MANAGEMENT

JUNI-RT-000050 - The Juniper router must be configured to authenticate all routing protocol messages using NIST-validated FIPS 140-2 message authentication code algorithm - OSPFDISA STIG Juniper Router RTR v3r2Juniper

IDENTIFICATION AND AUTHENTICATION

JUNI-RT-000060 - The Juniper router must be configured to have all inactive interfaces disabled.DISA STIG Juniper Router RTR v3r2Juniper

ACCESS CONTROL

JUNI-RT-000140 - The Juniper router must be configured to drop all fragmented Internet Control Message Protocol (ICMP) packets destined to itself.DISA STIG Juniper Router RTR v3r2Juniper

SYSTEM AND COMMUNICATIONS PROTECTION

JUNI-RT-000190 - The Juniper router must be configured to have Internet Control Message Protocol (ICMP) redirect messages disabled on all external interfaces.DISA STIG Juniper Router RTR v3r2Juniper

SYSTEM AND COMMUNICATIONS PROTECTION

JUNI-RT-000230 - The Juniper router must be configured to disable the auxiliary port unless it is connected to a secured modem providing encryption and authentication.DISA STIG Juniper Router RTR v3r2Juniper

ACCESS CONTROL

JUNI-RT-000320 - The Juniper perimeter router must be configured to filter traffic destined to the enclave in accordance with the guidelines contained in DoD Instruction 8551.1.DISA STIG Juniper Router RTR v3r2Juniper

SYSTEM AND COMMUNICATIONS PROTECTION

JUNI-RT-000430 - The Juniper out-of-band management (OOBM) gateway router must be configured to block any traffic destined to itself that is not sourced from the OOBM network or the NOC.DISA STIG Juniper Router RTR v3r2Juniper

SYSTEM AND COMMUNICATIONS PROTECTION

JUNI-RT-000510 - The Juniper BGP router must be configured to reject outbound route advertisements for any prefixes that do not belong to any customers or the local autonomous system (AS) - bgp exportDISA STIG Juniper Router RTR v3r2Juniper

ACCESS CONTROL

JUNI-RT-000535 - The Juniper BGP router must be configured to reject route advertisements from CE routers with an originating AS in the AS_PATH attribute that does not belong to that customer - as-pathDISA STIG Juniper Router RTR v3r2Juniper

ACCESS CONTROL

JUNI-RT-000550 - The Juniper BGP router must be configured to limit the prefix size on any inbound route advertisement to /24 or the least significant prefixes issued to the customer - prefix-length-rangeDISA STIG Juniper Router RTR v3r2Juniper

SYSTEM AND COMMUNICATIONS PROTECTION

JUNI-RT-000590 - The Juniper MPLS router with RSVP-TE enabled must be configured to enable refresh reduction features.DISA STIG Juniper Router RTR v3r2Juniper

SYSTEM AND COMMUNICATIONS PROTECTION

JUNI-RT-000600 - The Juniper MPLS router must be configured to have TTL Propagation disabled.DISA STIG Juniper Router RTR v3r2Juniper

CONFIGURATION MANAGEMENT

JUNI-RT-000690 - The Juniper PE router must be configured to implement Protocol Independent Multicast (PIM) snooping for each Virtual Private LAN Services (VPLS) bridge domain.DISA STIG Juniper Router RTR v3r2Juniper

SYSTEM AND COMMUNICATIONS PROTECTION

JUNI-RT-000790 - The Juniper multicast router must be configured to bind a Protocol Independent Multicast (PIM) neighbor filter to interfaces that have PIM enabled - policy-options prefixDISA STIG Juniper Router RTR v3r2Juniper

ACCESS CONTROL

JUNI-RT-000850 - The Juniper multicast Designated Router (DR) must be configured to filter the Internet Group Management Protocol (IGMP) and Multicast Listener Discovery (MLD) Report messages to allow hosts to join only multicast groups that have been approved by the organization - policy-optionsDISA STIG Juniper Router RTR v3r2Juniper

SYSTEM AND COMMUNICATIONS PROTECTION

JUNI-RT-000860 - The Juniper multicast Designated Router (DR) must be configured to filter the Internet Group Management Protocol (IGMP) and Multicast Listener Discovery (MLD) Report messages to allow hosts to join a multicast group only from sources that have been approved by the organization - protocols igmpDISA STIG Juniper Router RTR v3r2Juniper

SYSTEM AND COMMUNICATIONS PROTECTION

JUNI-RT-000940 - The Juniper Multicast Source Discovery Protocol (MSDP) router must be configured to use its loopback address as the source address when originating MSDP traffic.DISA STIG Juniper Router RTR v3r2Juniper

CONTINGENCY PLANNING