Item Search

NameAudit NamePluginCategory
2.3.1.1 Ensure 'Accounts: Guest account status' is set to 'Disabled'CIS Microsoft Windows Server 2022 Stand-alone v2.0.0 L1 MSWindows

IDENTIFICATION AND AUTHENTICATION

2.3.1.1 Ensure 'Accounts: Guest account status' is set to 'Disabled' (MS only)CIS Microsoft Windows Server 2022 v5.0.0 L1 MSWindows

IDENTIFICATION AND AUTHENTICATION

2.3.1.2 (L1) Ensure 'Accounts: Guest account status' is set to 'Disabled'CIS Microsoft Windows 10 EMS Gateway v3.0.0 L1Windows

IDENTIFICATION AND AUTHENTICATION

2.3.1.2 (L1) Ensure 'Accounts: Guest account status' is set to 'Disabled'CIS Microsoft Windows 10 Stand-alone v4.0.0 L1 BLWindows

IDENTIFICATION AND AUTHENTICATION

2.3.1.2 (L1) Ensure 'Accounts: Guest account status' is set to 'Disabled' (MS only)CIS Azure Compute Microsoft Windows Server 2019 v1.0.0 L1 MSWindows

IDENTIFICATION AND AUTHENTICATION

2.3.1.2 (L1) Ensure 'Accounts: Guest account status' is set to 'Disabled' (MS only)CIS Microsoft Windows Server 2008 R2 Member Server Level 1 v3.3.1Windows

IDENTIFICATION AND AUTHENTICATION

AIOS-14-011000 - Apple iOS/iPadOS must implement the management setting: disable paired Apple Watch.MobileIron - DISA Apple iOS/iPadOS 14 v1r3MDM

ACCESS CONTROL, CONFIGURATION MANAGEMENT

CASA-ND-001410 - The Cisco ASA must be configured to send log data to at least two central log servers for the purpose of forwarding alerts to organization-defined personnel and/or the firewall administrator.DISA STIG Cisco ASA NDM v2r4Cisco

AUDIT AND ACCOUNTABILITY

GEN000590 - The system must use a FIPS 140-2 approved cryptographic hashing algorithm for generating account password hashes - CRYPT_DEFAULTDISA STIG Solaris 10 SPARC v2r4Unix

IDENTIFICATION AND AUTHENTICATION

GEN000595 - The password hashes stored on the system must have been generated using a FIPS 140-2 approved cryptographic hashing algorithm - /etc/passwdDISA STIG Solaris 10 SPARC v2r4Unix

IDENTIFICATION AND AUTHENTICATION

GEN000595 - The password hashes stored on the system must have been generated using a FIPS 140-2 approved cryptographic hashing algorithm - /etc/shadowDISA STIG Solaris 10 SPARC v2r4Unix

IDENTIFICATION AND AUTHENTICATION

OL6-00-000002 - The system must use a separate file system for /var.DISA STIG Oracle Linux 6 v2r7Unix

CONFIGURATION MANAGEMENT

OL6-00-000007 - The system must use a separate file system for user home directories.DISA STIG Oracle Linux 6 v2r7Unix

CONFIGURATION MANAGEMENT

OL6-00-000011 - System security patches and updates must be installed and up-to-date.DISA STIG Oracle Linux 6 v2r7Unix

SYSTEM AND INFORMATION INTEGRITY

OL6-00-000019 - There must be no .rhosts or hosts.equiv files on the system - '/etc/hosts.equiv'DISA STIG Oracle Linux 6 v2r7Unix

CONFIGURATION MANAGEMENT

OL6-00-000021 - The Oracle Linux operating system must not contain .shosts or shosts.equiv files.DISA STIG Oracle Linux 6 v2r7Unix

CONFIGURATION MANAGEMENT

OL6-00-000031 - The /etc/passwd file must not contain password hashes.DISA STIG Oracle Linux 6 v2r7Unix

CONFIGURATION MANAGEMENT

OL6-00-000034 - The /etc/shadow file must be group-owned by root.DISA STIG Oracle Linux 6 v2r7Unix

CONFIGURATION MANAGEMENT

OL6-00-000037 - The /etc/gshadow file must be group-owned by root.DISA STIG Oracle Linux 6 v2r7Unix

CONFIGURATION MANAGEMENT

OL6-00-000041 - The /etc/passwd file must have mode 0644 or less permissive.DISA STIG Oracle Linux 6 v2r7Unix

CONFIGURATION MANAGEMENT

OL6-00-000044 - The /etc/group file must have mode 0644 or less permissive.DISA STIG Oracle Linux 6 v2r7Unix

CONFIGURATION MANAGEMENT

OL6-00-000045 - Library files must have mode 0755 or less permissive - '/lib'DISA STIG Oracle Linux 6 v2r7Unix

CONFIGURATION MANAGEMENT

OL6-00-000046 - Library files must be owned by a system account - '/lib'DISA STIG Oracle Linux 6 v2r7Unix

CONFIGURATION MANAGEMENT

OL6-00-000046 - Library files must be owned by a system account - '/usr/lib'DISA STIG Oracle Linux 6 v2r7Unix

CONFIGURATION MANAGEMENT

OL6-00-000046 - Library files must be owned by a system account - '/usr/lib64'DISA STIG Oracle Linux 6 v2r7Unix

CONFIGURATION MANAGEMENT

OL6-00-000047 - All system command files must have mode 755 or less permissive - '/usr/bin'DISA STIG Oracle Linux 6 v2r7Unix

CONFIGURATION MANAGEMENT

OL6-00-000051 - Users must not be able to change passwords more than once every 24 hours.DISA STIG Oracle Linux 6 v2r7Unix

IDENTIFICATION AND AUTHENTICATION

OL6-00-000055 - System and application account passwords must be changed at least annually.DISA STIG Oracle Linux 6 v2r7Unix

IDENTIFICATION AND AUTHENTICATION

OL6-00-000056 - The system must require passwords to contain at least one numeric character - password-authDISA STIG Oracle Linux 6 v2r7Unix

IDENTIFICATION AND AUTHENTICATION

OL6-00-000058 - The system must require passwords to contain at least one special character - password-authDISA STIG Oracle Linux 6 v2r7Unix

IDENTIFICATION AND AUTHENTICATION

OL6-00-000058 - The system must require passwords to contain at least one special character - system-authDISA STIG Oracle Linux 6 v2r7Unix

IDENTIFICATION AND AUTHENTICATION

OL6-00-000066 - The system boot loader configuration file(s) must be group-owned by root.DISA STIG Oracle Linux 6 v2r7Unix

CONFIGURATION MANAGEMENT

OL6-00-000070 - The system must not permit interactive boot.DISA STIG Oracle Linux 6 v2r7Unix

ACCESS CONTROL

OL6-00-000071 - The system must be configured so all network connections associated with a communication session are terminated at the end of the session or after 15 minutes of inactivity from the user at a command prompt, except to fulfill documented and validated mission requirements.DISA STIG Oracle Linux 6 v2r7Unix

ACCESS CONTROL

OL6-00-000078 - The system must implement virtual address space randomization.DISA STIG Oracle Linux 6 v2r7Unix

CONFIGURATION MANAGEMENT

OL6-00-000106 - The operating system must connect to external networks or information systems only through managed IPv6 interfaces consisting of boundary protection devices arranged in accordance with an organizational security architecture.DISA STIG Oracle Linux 6 v2r7Unix

CONFIGURATION MANAGEMENT

OL6-00-000117 - The operating system must prevent public IPv4 access into an organizations internal networks, except as appropriately mediated by managed interfaces employing boundary protection devices.DISA STIG Oracle Linux 6 v2r7Unix

CONFIGURATION MANAGEMENT

OL6-00-000133 - All rsyslog-generated log files must be owned by root.DISA STIG Oracle Linux 6 v2r7Unix

SYSTEM AND INFORMATION INTEGRITY

OL6-00-000154 - The operating system must produce audit records containing sufficient information to establish what type of events occurred - CHKCONFIGDISA STIG Oracle Linux 6 v2r7Unix

AUDIT AND ACCOUNTABILITY

OL6-00-000154 - The operating system must produce audit records containing sufficient information to establish what type of events occurred - PROCESS_CHECKDISA STIG Oracle Linux 6 v2r7Unix

AUDIT AND ACCOUNTABILITY

OL6-00-000165 - The audit system must be configured to audit all attempts to alter system time through adjtimex - b32DISA STIG Oracle Linux 6 v2r7Unix

AUDIT AND ACCOUNTABILITY

OL6-00-000167 - The audit system must be configured to audit all attempts to alter system time through settimeofday - b64DISA STIG Oracle Linux 6 v2r7Unix

AUDIT AND ACCOUNTABILITY

OL6-00-000169 - The audit system must be configured to audit all attempts to alter system time through stime - b32DISA STIG Oracle Linux 6 v2r7Unix

AUDIT AND ACCOUNTABILITY

OL6-00-000173 - The audit system must be configured to audit all attempts to alter system time through /etc/localtime.DISA STIG Oracle Linux 6 v2r7Unix

AUDIT AND ACCOUNTABILITY

OL6-00-000175 - The operating system must automatically audit account modification - '/etc/shadow'DISA STIG Oracle Linux 6 v2r7Unix

ACCESS CONTROL

OL6-00-000182 - The audit system must be configured to audit modifications to the systems network configuration - '/etc/hosts'DISA STIG Oracle Linux 6 v2r7Unix

CONFIGURATION MANAGEMENT

OL6-00-000182 - The audit system must be configured to audit modifications to the systems network configuration - b32 audit_network_modificationsDISA STIG Oracle Linux 6 v2r7Unix

CONFIGURATION MANAGEMENT

OL6-00-000183 - The audit system must be configured to audit modifications to the systems Mandatory Access Control (MAC) configuration (SELinux) - SELinuxDISA STIG Oracle Linux 6 v2r7Unix

CONFIGURATION MANAGEMENT

OL6-00-000184 - The audit system must be configured to audit all discretionary access control permission modifications using chmod, fchmod, and fchmodat - b32 auid=0DISA STIG Oracle Linux 6 v2r7Unix

AUDIT AND ACCOUNTABILITY

OL6-00-000184 - The audit system must be configured to audit all discretionary access control permission modifications using chmod, fchmod, and fchmodat - b64 auid>=500DISA STIG Oracle Linux 6 v2r7Unix

AUDIT AND ACCOUNTABILITY