DO0238-ORACLE11 - The directories assigned to the LOG_ARCHIVE_DEST* parameters should be protected from unauthorized access - 'LOG_MODE = NOARCHIVELOG' | DISA STIG Oracle 11 Instance v9r1 Database | OracleDB | CONTINGENCY PLANNING, SYSTEM AND COMMUNICATIONS PROTECTION |
GEN003640 - The root file system must employ journaling or another mechanism ensuring file system consistency | DISA STIG AIX 5.3 v1r2 | Unix | CONTINGENCY PLANNING |
GEN003640 - The root file system must employ journaling or another mechanism ensuring file system consistency | DISA STIG AIX 6.1 v1r14 | Unix | CONTINGENCY PLANNING |
GEN003640 - The root file system must employ journaling or another mechanism ensuring file system consistency - 'fs type' | DISA STIG for Oracle Linux 5 v2r1 | Unix | CONFIGURATION MANAGEMENT, CONTINGENCY PLANNING |
GEN003640 - The root file system must employ journaling or another mechanism ensuring file system consistency - 'nolog option' | DISA STIG for Oracle Linux 5 v2r1 | Unix | CONFIGURATION MANAGEMENT, CONTINGENCY PLANNING |
GEN003640 - The root file system must employ journaling or another mechanism that ensures file system consistency - 'fs type' | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | CONTINGENCY PLANNING |
GEN003640 - The root file system must employ journaling or another mechanism that ensures file system consistency - 'nolog option' | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | CONTINGENCY PLANNING |
GEN003650 - All local file systems must employ journaling or another mechanism ensuring file system consistency. | DISA STIG AIX 5.3 v1r2 | Unix | CONTINGENCY PLANNING |
GEN003650 - All local file systems must employ journaling or another mechanism ensuring file system consistency. | DISA STIG AIX 6.1 v1r14 | Unix | CONTINGENCY PLANNING |
GEN003650 - All local file systems must employ journaling or another mechanism ensuring file system consistency. | DISA STIG for Oracle Linux 5 v2r1 | Unix | CONFIGURATION MANAGEMENT, CONTINGENCY PLANNING |
GEN003650 - All local file systems must employ journaling or another mechanism that ensures file system consistency. | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | CONTINGENCY PLANNING |
MS.DEFENDER.4.5v1 - A list of apps that are restricted from accessing files protected by DLP policy SHOULD be defined. | CISA SCuBA Microsoft 365 Defender v1.5.0 | microsoft_azure | ACCESS CONTROL, SECURITY ASSESSMENT AND AUTHORIZATION, CONFIGURATION MANAGEMENT, CONTINGENCY PLANNING, IDENTIFICATION AND AUTHENTICATION, RISK ASSESSMENT, SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY |
MS.DEFENDER.4.6v1 - The custom policy SHOULD include an action to block access to sensitive | CISA SCuBA Microsoft 365 Defender v1.5.0 | microsoft_azure | ACCESS CONTROL, SECURITY ASSESSMENT AND AUTHORIZATION, CONFIGURATION MANAGEMENT, CONTINGENCY PLANNING, IDENTIFICATION AND AUTHENTICATION, RISK ASSESSMENT, SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY |
MS.SHAREPOINT.2.1v1 - File and folder default sharing scope SHALL be set to Specific people (only the people the user specifies). | CISA SCuBA Microsoft 365 SharePoint Online OneDrive v1.5.0 | microsoft_azure | ACCESS CONTROL, SECURITY ASSESSMENT AND AUTHORIZATION, CONFIGURATION MANAGEMENT, CONTINGENCY PLANNING, IDENTIFICATION AND AUTHENTICATION, RISK ASSESSMENT, SYSTEM AND SERVICES ACQUISITION, SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY |
MS.SHAREPOINT.2.2v1 - File and folder default sharing permissions SHALL be set to View. | CISA SCuBA Microsoft 365 SharePoint Online OneDrive v1.5.0 | microsoft_azure | ACCESS CONTROL, SECURITY ASSESSMENT AND AUTHORIZATION, CONFIGURATION MANAGEMENT, CONTINGENCY PLANNING, SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY |
MS.SHAREPOINT.3.2v1 - The allowable file and folder permissions for links SHALL be set to View only. | CISA SCuBA Microsoft 365 SharePoint Online OneDrive v1.5.0 | microsoft_azure | ACCESS CONTROL, SECURITY ASSESSMENT AND AUTHORIZATION, CONFIGURATION MANAGEMENT, CONTINGENCY PLANNING, SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY |
MS.SHAREPOINT.3.3v1 - Reauthentication days for people who use a verification code SHALL be set to 30 days or less. | CISA SCuBA Microsoft 365 SharePoint Online OneDrive v1.5.0 | microsoft_azure | ACCESS CONTROL, SECURITY ASSESSMENT AND AUTHORIZATION, CONFIGURATION MANAGEMENT, CONTINGENCY PLANNING, SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY |
SOL-11.1-080150 - The operating system must implement transaction recovery for transaction-based systems. | DISA STIG Solaris 11 X86 v3r1 | Unix | CONFIGURATION MANAGEMENT, CONTINGENCY PLANNING |
SQL2-00-017500 - SQL Server must recover to a known state that is verifiable. | DISA STIG SQL Server 2012 DB Instance Security v1r20 | MS_SQLDB | CONTINGENCY PLANNING |
SQL2-00-017510 - Appropriate staff must be alerted when the amount of storage space used by the SQL Server transaction log file(s) exceeds an organization-defined value - s exceeds an organization-defined value. | DISA STIG SQL Server 2012 Database Audit v1r20 | MS_SQLDB | CONTINGENCY PLANNING |