Item Search

NameAudit NamePluginCategory
1.156 RHEL-09-232240CIS Red Hat Enterprise Linux 9 STIG v1.0.0 CAT IIUnix

SYSTEM AND COMMUNICATIONS PROTECTION

AIOS-15-003000 - Apple iOS/iPadOS 15 must not allow backup to remote systems (iCloud).MobileIron - DISA Apple iOS/iPadOS 14 v1r4MDM

SYSTEM AND COMMUNICATIONS PROTECTION

AIOS-15-003300 - Apple iOS/iPadOS 15 must not allow backup to remote systems (iCloud Keychain).AirWatch - DISA Apple iOS/iPadOS 14 v1r4MDM

SYSTEM AND COMMUNICATIONS PROTECTION

AIOS-15-003400 - Apple iOS/iPadOS 15 must not allow backup to remote systems (My Photo Stream).MobileIron - DISA Apple iOS/iPadOS 14 v1r4MDM

SYSTEM AND COMMUNICATIONS PROTECTION

AIOS-15-003700 - Apple iOS/iPadOS 15 must not allow backup to remote systems (enterprise books).MobileIron - DISA Apple iOS/iPadOS 14 v1r4MDM

SYSTEM AND COMMUNICATIONS PROTECTION

AIOS-15-009200 - Apple iOS/iPadOS 15 must be configured to not allow backup of [all applications, configuration data] to locally connected systems.AirWatch - DISA Apple iOS/iPadOS 14 v1r4MDM

SYSTEM AND COMMUNICATIONS PROTECTION

AIOS-17-003000 - Apple iOS/iPadOS 17 must not allow backup to remote systems (iCloud) - iCloud.MobileIron - DISA Apple iOS/iPadOS 17 v2r2MDM

SYSTEM AND COMMUNICATIONS PROTECTION

AIOS-17-009200 - Apple iOS/iPadOS 17 must be configured to not allow backup of [all applications, configuration data] to locally connected systems.AirWatch - DISA Apple iOS/iPadOS 17 v2r2MDM

SYSTEM AND COMMUNICATIONS PROTECTION

AIOS-17-709200 - Apple iOS/iPadOS 17 must be configured to not allow backup of [all applications, configuration data] to locally connected systems.AirWatch - DISA Apple iOS/iPadOS 17 BYOAD v1r2MDM

SYSTEM AND COMMUNICATIONS PROTECTION

AIOS-18-003000 - Apple iOS/iPadOS 18 must not allow backup to remote systems (iCloud) - iCloud.AirWatch - DISA Apple iOS/iPadOS 18 v1r4MDM

SYSTEM AND COMMUNICATIONS PROTECTION

AIOS-18-003200 - Apple iOS/iPadOS 18 must not allow backup to remote systems (iCloud document and data synchronization) - iCloud document and data synchronization.MobileIron - DISA Apple iOS/iPadOS 18 v1r4MDM

SYSTEM AND COMMUNICATIONS PROTECTION

AIOS-18-009200 - Apple iOS/iPadOS 18 must be configured to not allow backup of [all applications, configuration data] to locally connected systems.MobileIron - DISA Apple iOS/iPadOS 18 v1r4MDM

SYSTEM AND COMMUNICATIONS PROTECTION

AIOS-18-013300 - Apple iOS/iPadOS 18 must disable 'Allow USB drive access in Files app' if the authorizing official (AO) has not approved the use of DOD-approved USB storage drives with iOS/iPadOS devices - Allow USB drive access in Files app if the Authorizing Official (AO) has not approved the use of DoD-approved USB storage drives with iOS/iPadOS devices.MobileIron - DISA Apple iOS/iPadOS 18 v1r4MDM

SYSTEM AND COMMUNICATIONS PROTECTION

GOOG-12-008500 - Google Android 12 must be configured to not allow backup of [all applications, configuration data] to locally connected systems.AirWatch - DISA Google Android 12 COBO v1r2MDM

SYSTEM AND COMMUNICATIONS PROTECTION

GOOG-13-008500 - Google Android 13 must be configured to not allow backup of [all applications, configuration data] to locally connected systems.AirWatch - DISA Google Android 13 COBO v2r2MDM

SYSTEM AND COMMUNICATIONS PROTECTION

GOOG-13-008600 - Google Android 13 must be configured to not allow backup of [all applications, configuration data] to remote systems.AirWatch - DISA Google Android 13 COBO v2r2MDM

SYSTEM AND COMMUNICATIONS PROTECTION

GOOG-13-008600 - Google Android 13 must be configured to not allow backup of [all applications, configuration data] to remote systems.AirWatch - DISA Google Android 13 COPE v2r2MDM

SYSTEM AND COMMUNICATIONS PROTECTION

GOOG-13-008600 - Google Android 13 must be configured to not allow backup of [all applications, configuration data] to remote systems.MobileIron - DISA Google Android 13 COPE v2r2MDM

SYSTEM AND COMMUNICATIONS PROTECTION

GOOG-13-012400 - Google Android 13 must allow only the Administrator (MDM) to perform the following management function: Disable Phone Hub.MobileIron - DISA Google Android 13 COBO v2r2MDM

SYSTEM AND COMMUNICATIONS PROTECTION

GOOG-13-012400 - Google Android 13 must allow only the Administrator (MDM) to perform the following management function: Disable Phone Hub.AirWatch - DISA Google Android 13 COPE v2r2MDM

SYSTEM AND COMMUNICATIONS PROTECTION

GOOG-13-012400 - Google Android 13 must allow only the Administrator (MDM) to perform the following management function: Disable Phone Hub.MobileIron - DISA Google Android 13 COPE v2r2MDM

SYSTEM AND COMMUNICATIONS PROTECTION

GOOG-13-708600 - Google Android 13 must be configured to not allow backup of all work profile applications to remote systems.MobileIron - DISA Google Android 13 BYOD v1r2MDM

SYSTEM AND COMMUNICATIONS PROTECTION

GOOG-14-008500 - Google Android 14 must be configured to not allow backup of [all applications, configuration data] to locally connected systems.AirWatch - DISA Google Android 14 COBO v2r2MDM

SYSTEM AND COMMUNICATIONS PROTECTION

GOOG-14-008500 - Google Android 14 must be configured to not allow backup of [all applications, configuration data] to locally connected systems.MobileIron - DISA Google Android 14 COPE v2r2MDM

SYSTEM AND COMMUNICATIONS PROTECTION

GOOG-14-008600 - Google Android 14 must be configured to not allow backup of [all applications, configuration data] to remote systems.AirWatch - DISA Google Android 14 COPE v2r2MDM

SYSTEM AND COMMUNICATIONS PROTECTION

GOOG-14-012400 - Google Android 14 must allow only the administrator (MDM) to perform the following management function: Disable Phone Hub - MDM to perform the following management function: Disable Phone Hub.AirWatch - DISA Google Android 14 COBO v2r2MDM

SYSTEM AND COMMUNICATIONS PROTECTION

GOOG-15-008500 - Google Android 15 must be configured to not allow backup of [all applications, configuration data] to locally connected systems.AirWatch - DISA Google Android 15 COBO v1r2MDM

SYSTEM AND COMMUNICATIONS PROTECTION

GOOG-15-008500 - Google Android 15 must be configured to not allow backup of [all applications, configuration data] to locally connected systems.MobileIron - DISA Google Android 15 COPE v1r2MDM

SYSTEM AND COMMUNICATIONS PROTECTION

GOOG-15-012400 - Google Android 15 must allow only the administrator (MDM) to perform the following management function: Disable Phone Hub - MDM to perform the following management function: Disable Phone Hub.MobileIron - DISA Google Android 15 COPE v1r2MDM

SYSTEM AND COMMUNICATIONS PROTECTION

GOOG-15-012400 - Google Android 15 must allow only the administrator (MDM) to perform the following management function: Disable Phone Hub - MDM to perform the following management function: Disable Phone Hub.AirWatch - DISA Google Android 15 COBO v1r2MDM

SYSTEM AND COMMUNICATIONS PROTECTION

HONW-13-008500 - Honeywell Android 13 must be configured to not allow backup of [all applications, configuration data] to locally connected systems.AirWatch - DISA Honeywell Android 13 COPE v1r1MDM

SYSTEM AND COMMUNICATIONS PROTECTION

HONW-13-008600 - Honeywell Android 13 must be configured to not allow backup of [all applications, configuration data] to remote systems.AirWatch - DISA Honeywell Android 13 COBO v1r1MDM

SYSTEM AND COMMUNICATIONS PROTECTION

MADB-10-005400 - Database contents must be protected from unauthorized and unintended information transfer by enforcement of a data-transfer policy.DISA MariaDB Enterprise 10.x v2r4 DBMySQLDB

SYSTEM AND COMMUNICATIONS PROTECTION

MD7X-00-005500 MongoDB must prevent unauthorized and unintended information transfer via shared system resources.DISA MongoDB Enterprise Advanced 7.x STIG v1r1Unix

SYSTEM AND COMMUNICATIONS PROTECTION

MSFT-11-003900 - Microsoft Android 11 must be configured to not allow backup of all applications and configuration data to remote systems.AirWatch - DISA Microsoft Android 11 COPE v1r2MDM

SYSTEM AND COMMUNICATIONS PROTECTION

OL07-00-010375 - The Oracle Linux operating system must restrict access to the kernel message buffer.DISA Oracle Linux 7 STIG v3r3Unix

SYSTEM AND COMMUNICATIONS PROTECTION

OL08-00-010375 - OL 8 must restrict access to the kernel message buffer.DISA Oracle Linux 8 STIG v2r6Unix

SYSTEM AND COMMUNICATIONS PROTECTION

OL09-00-002510 - OL 9 must be configured so that a sticky bit must be set on all public directories.DISA Oracle Linux 9 STIG v1r3Unix

SYSTEM AND COMMUNICATIONS PROTECTION

PHTN-40-000067 The Photon operating system must restrict access to the kernel message buffer.DISA VMware vSphere 8.0 vCenter Appliance Photon OS 4.0 STIG v2r1Unix

SYSTEM AND COMMUNICATIONS PROTECTION

RHEL-07-010375 - The Red Hat Enterprise Linux operating system must restrict access to the kernel message buffer.DISA Red Hat Enterprise Linux 7 STIG v3r15Unix

SYSTEM AND COMMUNICATIONS PROTECTION

RHEL-08-010190 - A sticky bit must be set on all RHEL 8 public directories to prevent unauthorized and unintended information transferred via shared system resources.DISA Red Hat Enterprise Linux 8 STIG v2r5Unix

SYSTEM AND COMMUNICATIONS PROTECTION

RHEL-08-010376 - RHEL 8 must prevent kernel profiling by unprivileged users.DISA Red Hat Enterprise Linux 8 STIG v2r5Unix

SYSTEM AND COMMUNICATIONS PROTECTION

RHEL-09-232240 - All RHEL 9 world-writable directories must be owned by root, sys, bin, or an application user.DISA Red Hat Enterprise Linux 9 STIG v2r6Unix

SYSTEM AND COMMUNICATIONS PROTECTION

SLES-12-010375 - The SUSE operating system must restrict access to the kernel message buffer.DISA SLES 12 STIG v3r3Unix

SYSTEM AND COMMUNICATIONS PROTECTION

UBTU-20-010401 - The Ubuntu operating system must restrict access to the kernel message buffer.DISA Canonical Ubuntu 20.04 LTS STIG v2r4Unix

SYSTEM AND COMMUNICATIONS PROTECTION

UBTU-22-213010 - Ubuntu 22.04 LTS must restrict access to the kernel message buffer.DISA Canonical Ubuntu 22.04 LTS STIG v2r6Unix

SYSTEM AND COMMUNICATIONS PROTECTION

UBTU-22-232145 - Ubuntu 22.04 LTS must set a sticky bit on all public directories to prevent unauthorized and unintended information transferred via shared system resources.DISA Canonical Ubuntu 22.04 LTS STIG v2r6Unix

SYSTEM AND COMMUNICATIONS PROTECTION

UBTU-24-600150 - Ubuntu 24.04 LTS must set a sticky bit on all public directories to prevent unauthorized and unintended information transferred via shared system resources.DISA Canonical Ubuntu 24.04 LTS STIG v1r3Unix

SYSTEM AND COMMUNICATIONS PROTECTION

VCPG-67-000018 - Data from the vPostgres database must be protected from unauthorized transfer.DISA STIG VMware vSphere 6.7 PostgreSQL v1r2Unix

SYSTEM AND COMMUNICATIONS PROTECTION

WN11-CC-000155 - Solicited Remote Assistance must not be allowed.DISA Microsoft Windows 11 STIG v2r5Windows

SYSTEM AND COMMUNICATIONS PROTECTION