Item Search

NameAudit NamePluginCategory
AIOS-01-100100 - Apple iOS must be configured to wipe all sensitive DoD data and PII data during a remote wipe command from the MDM server.MobileIron - DISA Apple iOS 10 v1r3MDM

CONFIGURATION MANAGEMENT

AIOS-10-080103 - Apple iOS must implement the management setting: not allow user to remove profiles that enforce DoD security requirements.AirWatch - DISA Apple iOS 10 v1r3MDM

CONFIGURATION MANAGEMENT

AIOS-14-000400 - The mobile operating system must be configured to not allow more than ten consecutive failed authentication attempts.AirWatch - DISA Apple iOS/iPadOS 14 v1r3MDM

ACCESS CONTROL

AIOS-14-009500 - Apple iOS/iPadOS must implement the management setting: Disable Allow Shared Albums.AirWatch - DISA Apple iOS/iPadOS 14 v1r3MDM

CONFIGURATION MANAGEMENT

AIOS-14-010100 - Apple iOS/iPadOS must implement the management setting: not share location data through iCloud.AirWatch - DISA Apple iOS/iPadOS 14 v1r3MDM

ACCESS CONTROL

AIOS-15-003500 - Apple iOS/iPadOS 15 must not allow backup to remote systems (iCloud Photo Sharing, also known as Shared Photo Streams).MobileIron - DISA Apple iOS/iPadOS 14 v1r4MDM

SYSTEM AND COMMUNICATIONS PROTECTION

AIOS-15-007400 - Apple iOS/iPadOS 15 allowlist must be configured to not include applications with the following characteristics: - back up MD data to non-DoD cloud servers (including user and application access to cloud backup services);- transmit MD diagnostic data to non-DoD servers; - allows synchronization of data or applications between devices associated with user; and - allows unencrypted (or encrypted but not FIPS 140-2 validated) data sharing with other MDs or printers.MobileIron - DISA Apple iOS/iPadOS 14 v1r4MDM

CONFIGURATION MANAGEMENT

AIOS-15-011400 - Apple iOS/iPadOS 15 must implement the management setting: not allow messages in an ActiveSync Exchange account to be forwarded or moved to other accounts in the Apple iOS/iPadOS 15 Mail app.AirWatch - DISA Apple iOS/iPadOS 14 v1r4MDM

CONFIGURATION MANAGEMENT

AIOS-15-011500 - Apple iOS/iPadOS 15 must implement the management setting: Treat AirDrop as an unmanaged destination.AirWatch - DISA Apple iOS/iPadOS 14 v1r4MDM

CONFIGURATION MANAGEMENT

AIOS-15-011500 - Apple iOS/iPadOS 15 must implement the management setting: Treat AirDrop as an unmanaged destination.MobileIron - DISA Apple iOS/iPadOS 14 v1r4MDM

CONFIGURATION MANAGEMENT

AIOS-15-011700 - Apple iOS/iPadOS 15 must implement the management setting: not share location data through iCloud.AirWatch - DISA Apple iOS/iPadOS 14 v1r4MDM

CONFIGURATION MANAGEMENT

AIOS-15-011900 - Apple iOS/iPadOS 15 users must complete required training.MobileIron - DISA Apple iOS/iPadOS 14 v1r4MDM

CONFIGURATION MANAGEMENT

AIOS-15-012200 - Apple iOS/iPadOS 15 must implement the management setting: enable USB Restricted Mode.AirWatch - DISA Apple iOS/iPadOS 14 v1r4MDM

CONFIGURATION MANAGEMENT

AIOS-15-012800 - Apple iOS/iPadOS 15 must disable allow setting up new nearby devices.MobileIron - DISA Apple iOS/iPadOS 14 v1r4MDM

CONFIGURATION MANAGEMENT

AIOS-15-014300 - Apple iOS/iPadOS 15 must disable 'Allow network drive access in Files access' - Allow network drive access in Files access.AirWatch - DISA Apple iOS/iPadOS 14 v1r4MDM

CONFIGURATION MANAGEMENT

AIOS-15-014400 - Apple iOS/iPadOS 15 must disable connections to Siri servers for the purpose of dictation.AirWatch - DISA Apple iOS/iPadOS 14 v1r4MDM

CONFIGURATION MANAGEMENT

AIOS-15-014500 - Apple iOS/iPadOS 15 must disable connections to Siri servers for the purpose of translation.AirWatch - DISA Apple iOS/iPadOS 14 v1r4MDM

CONFIGURATION MANAGEMENT

AIOS-15-014600 - Apple iOS/iPadOS 15 must disable copy/paste of data from managed to unmanaged applications.MobileIron - DISA Apple iOS/iPadOS 14 v1r4MDM

CONFIGURATION MANAGEMENT

AIOS-16-003000 - Apple iOS/iPadOS 16 must not allow backup to remote systems (iCloud) - iCloud.MobileIron - DISA Apple iOS/iPadOS 16 v2r1MDM

SYSTEM AND COMMUNICATIONS PROTECTION

AIOS-16-007300 - Apple iOS/iPadOS 16 allow list must be configured to not include applications with the following characteristics: allow voice dialing when MD is locked.AirWatch - DISA Apple iOS/iPadOS 16 v2r1MDM

CONFIGURATION MANAGEMENT

AIOS-16-007400 - Apple iOS/iPadOS 16 allowlist must be configured to not include applications with the following characteristics: - Backs up MD data to non-DoD cloud servers (including user and application access to cloud backup services); - Transmits MD diagnostic data to non-DoD servers; - Allows synchronization of data or applications between devices associated with user; and - Allows unencrypted (or encrypted but not FIPS 140-2/FIPS 140-3 validated) data sharing with other MDs or printers - allows unencrypted (or encrypted but not FIPS 140-2 validated) data sharing with other MDs or printers.AirWatch - DISA Apple iOS/iPadOS 16 v2r1MDM

CONFIGURATION MANAGEMENT

AIOS-16-007400 - Apple iOS/iPadOS 16 allowlist must be configured to not include applications with the following characteristics: - Backs up MD data to non-DoD cloud servers (including user and application access to cloud backup services); - Transmits MD diagnostic data to non-DoD servers; - Allows synchronization of data or applications between devices associated with user; and - Allows unencrypted (or encrypted but not FIPS 140-2/FIPS 140-3 validated) data sharing with other MDs or printers - allows unencrypted (or encrypted but not FIPS 140-2 validated) data sharing with other MDs or printers.MobileIron - DISA Apple iOS/iPadOS 16 v2r1MDM

CONFIGURATION MANAGEMENT

AIOS-16-011100 - Apple iOS/iPadOS 16 must implement the management setting: Disable Allow Shared Albums.AirWatch - DISA Apple iOS/iPadOS 16 v2r1MDM

CONFIGURATION MANAGEMENT

AIOS-16-011300 - Apple iOS/iPadOS 16 must implement the management setting: use SSL for Exchange ActiveSync.MobileIron - DISA Apple iOS/iPadOS 16 v2r1MDM

IDENTIFICATION AND AUTHENTICATION

AIOS-16-013500 - Apple iOS must implement the management setting: Not allow a user to remove Apple iOS configuration profiles that enforce DoD security requirements.AirWatch - DISA Apple iOS/iPadOS 16 v2r1MDM

CONFIGURATION MANAGEMENT

AIOS-16-706600 - Apple iOS/iPadOS 16 must be configured to not allow passwords that include more than four repeating or sequential characters.MobileIron - DISA Apple iOS/iPadOS BYOAD 16 v1r1MDM

CONFIGURATION MANAGEMENT

AIOS-16-706800 - Apple iOS/iPadOS 16 must be configured to lock the display after 15 minutes (or less) of inactivity - or less of inactivity.MobileIron - DISA Apple iOS/iPadOS BYOAD 16 v1r1MDM

ACCESS CONTROL

AIOS-16-709200 - Apple iOS/iPadOS 16 must be configured to not allow backup of [all applications, configuration data] to locally connected systems.MobileIron - DISA Apple iOS/iPadOS BYOAD 16 v1r1MDM

SYSTEM AND COMMUNICATIONS PROTECTION

AIOS-17-003000 - Apple iOS/iPadOS 17 must not allow backup to remote systems (iCloud) - iCloud.AirWatch - DISA Apple iOS/iPadOS 17 v2r1MDM

SYSTEM AND COMMUNICATIONS PROTECTION

AIOS-17-003000 - Apple iOS/iPadOS 17 must not allow backup to remote systems (iCloud) - iCloud.MobileIron - DISA Apple iOS/iPadOS 17 v2r1MDM

SYSTEM AND COMMUNICATIONS PROTECTION

AIOS-17-006900 - Apple iOS/iPadOS 17 must be configured to not allow more than 10 consecutive failed authentication attempts.AirWatch - DISA Apple iOS/iPadOS 17 v2r1MDM

ACCESS CONTROL

AIOS-17-010200 - Apple iOS/iPadOS 17 must be configured to disable ad hoc wireless client-to-client connection capability.AirWatch - DISA Apple iOS/iPadOS 17 v2r1MDM

SYSTEM AND COMMUNICATIONS PROTECTION

AIOS-17-706900 - Apple iOS/iPadOS 17 must be configured to not allow more than 10 consecutive failed authentication attempts.MobileIron - DISA Apple iOS/iPadOS BYOAD 17 v1r1MDM

ACCESS CONTROL

AOSX-15-005051 - The macOS system must restrict the ability to utilize external writable media devices.DISA STIG Apple Mac OSX 10.15 v1r10Unix

CONFIGURATION MANAGEMENT

APPL-11-000002 - The macOS system must retain the session lock until the user reestablishes access using established identification and authentication procedures.DISA STIG Apple macOS 11 v1r5Unix

ACCESS CONTROL

APPL-12-005060 - The macOS system must be configured to prevent password proximity sharing requests from nearby Apple Devices.DISA STIG Apple macOS 12 v1r9Unix

CONFIGURATION MANAGEMENT

ARST-L2-000140 - The Arista MLS layer 2 Arista MLS switch must implement Rapid STP where VLANs span multiple switches with redundant links.DISA STIG Arista MLS EOS 4.2x L2S v2r1Arista

CONFIGURATION MANAGEMENT

ARST-L2-000210 - The Arista MLS layer 2 switch must have all user-facing or untrusted ports configured as access switch ports.DISA STIG Arista MLS EOS 4.2x L2S v2r1Arista

SYSTEM AND COMMUNICATIONS PROTECTION

ARST-RT-000030 - The Arista BGP router must be configured to reject inbound route advertisements for any prefixes belonging to the local autonomous system (AS).DISA STIG Arista MLS EOS 4.2x Router v2r1Arista

ACCESS CONTROL

ARST-RT-000050 - The Arista BGP router must be configured to reject outbound route advertisements for any prefixes that do not belong to any customers or the local autonomous system (AS).DISA STIG Arista MLS EOS 4.2x Router v2r1Arista

ACCESS CONTROL

ARST-RT-000200 - The out-of-band management (OOBM) Arista gateway router must be configured to not redistribute routes between the management network routing domain and the managed network routing domain.DISA STIG Arista MLS EOS 4.2x Router v2r1Arista

ACCESS CONTROL

ARST-RT-000410 - The Arista router must be configured with Unicast Reverse Path Forwarding (uRPF) loose mode enabled on all CE-facing interfaces.DISA STIG Arista MLS EOS 4.2x Router v2r1Arista

SYSTEM AND COMMUNICATIONS PROTECTION

ARST-RT-000650 - The Arista perimeter router must be configured to block all outbound management traffic.DISA STIG Arista MLS EOS 4.2x Router v2r1Arista

SYSTEM AND COMMUNICATIONS PROTECTION

ARST-RT-000720 - The MPLS router must be configured to have TTL propagation disabled.DISA STIG Arista MLS EOS 4.2x Router v2r1Arista

CONFIGURATION MANAGEMENT

CASA-FW-000020 - The Cisco ASA must immediately use updates made to policy enforcement mechanisms such as firewall rules, security policies, and security zones.DISA STIG Cisco ASA FW v2r1Cisco

ACCESS CONTROL

CASA-FW-000040 - The Cisco ASA must be configured to generate traffic log entries containing information to establish what type of events occurred - Log ParametersDISA STIG Cisco ASA FW v2r1Cisco

AUDIT AND ACCOUNTABILITY

CASA-FW-000040 - The Cisco ASA must be configured to generate traffic log entries containing information to establish what type of events occurred - Logging EnabledDISA STIG Cisco ASA FW v2r1Cisco

AUDIT AND ACCOUNTABILITY

CASA-FW-000090 - The Cisco ASA must be configured to queue log records locally in the event that the central audit server is down or not reachable - Buffer EnabledDISA STIG Cisco ASA FW v2r1Cisco

AUDIT AND ACCOUNTABILITY

CASA-FW-000130 - The Cisco ASA must be configured to disable or remove unnecessary network services and functions that are not used as part of its role in the architecture - HTTPDISA STIG Cisco ASA FW v2r1Cisco

CONFIGURATION MANAGEMENT

CASA-FW-000130 - The Cisco ASA must be configured to disable or remove unnecessary network services and functions that are not used as part of its role in the architecture - TelnetDISA STIG Cisco ASA FW v2r1Cisco

CONFIGURATION MANAGEMENT