Item Search

NameAudit NamePluginCategory
ALMA-09-002000 - AlmaLinux OS 9 must be able to directly initiate a session lock for all connection types using smart card when the smart card is removed.DISA CloudLinux AlmaLinux OS 9 STIG v1r2Unix

ACCESS CONTROL

ALMA-09-007500 - AlmaLinux OS 9 must automatically lock an account when three unsuccessful logon attempts occur.DISA CloudLinux AlmaLinux OS 9 STIG v1r2Unix

ACCESS CONTROL

ALMA-09-007720 - AlmaLinux OS 9 must automatically lock an account when three unsuccessful logon attempts occur during a 15-minute time period.DISA CloudLinux AlmaLinux OS 9 STIG v1r2Unix

ACCESS CONTROL

ALMA-09-011240 - AlmaLinux OS 9 must disable core dumps for all users.DISA CloudLinux AlmaLinux OS 9 STIG v1r2Unix

CONFIGURATION MANAGEMENT

ALMA-09-011570 - AlmaLinux OS 9 must disable core dump backtraces.DISA CloudLinux AlmaLinux OS 9 STIG v1r2Unix

CONFIGURATION MANAGEMENT

ALMA-09-012670 - AlmaLinux OS 9 /etc/group- file must be group owned by root.DISA CloudLinux AlmaLinux OS 9 STIG v1r2Unix

CONFIGURATION MANAGEMENT

ALMA-09-013550 - AlmaLinux OS 9 must disable the ability of systemd to spawn an interactive boot process.DISA CloudLinux AlmaLinux OS 9 STIG v1r2Unix

CONFIGURATION MANAGEMENT

ALMA-09-013990 - AlmaLinux OS 9 /etc/gshadow file must be group-owned by root.DISA CloudLinux AlmaLinux OS 9 STIG v1r2Unix

CONFIGURATION MANAGEMENT

ALMA-09-014540 - All AlmaLinux OS 9 local interactive user accounts must be assigned a home directory upon creation.DISA CloudLinux AlmaLinux OS 9 STIG v1r2Unix

CONFIGURATION MANAGEMENT

ALMA-09-016080 - AlmaLinux OS 9 /etc/passwd- file must be owned by root.DISA CloudLinux AlmaLinux OS 9 STIG v1r2Unix

CONFIGURATION MANAGEMENT

ALMA-09-045890 - AlmaLinux OS 9 must allow only the information system security manager (ISSM) (or individuals or roles appointed by the ISSM) to select which auditable events are to be audited.DISA CloudLinux AlmaLinux OS 9 STIG v1r2Unix

AUDIT AND ACCOUNTABILITY

ALMA-09-053810 - AlmaLinux OS 9 System Administrator (SA) and/or information system security officer (ISSO) (at a minimum) must be alerted of an audit processing failure event.DISA CloudLinux AlmaLinux OS 9 STIG v1r2Unix

AUDIT AND ACCOUNTABILITY

ALMA-09-054250 - AlmaLinux OS 9 must take appropriate action when a critical audit processing failure occurs.DISA CloudLinux AlmaLinux OS 9 STIG v1r2Unix

AUDIT AND ACCOUNTABILITY

ALMA-09-054470 - AlmaLinux OS 9 audit system must take appropriate action when the audit files have reached maximum size.DISA CloudLinux AlmaLinux OS 9 STIG v1r2Unix

AUDIT AND ACCOUNTABILITY

GOOG-13-006100 - Google Android 13 must be configured to not allow passwords that include more than four repeating or sequential characters - AlphanumericMobileIron - DISA Google Android 13 COBO v2r2MDM

CONFIGURATION MANAGEMENT

GOOG-13-006100 - Google Android 13 must be configured to not allow passwords that include more than four repeating or sequential characters - AlphanumericMobileIron - DISA Google Android 13 COPE v2r2MDM

CONFIGURATION MANAGEMENT

GOOG-13-006200 - Google Android 13 must be configured to enable a screen-lock policy that will lock the display after a period of inactivity.MobileIron - DISA Google Android 13 COBO v2r2MDM

ACCESS CONTROL

GOOG-13-006300 - Google Android 13 must be configured to lock the display after 15 minutes (or less) of inactivity - or less of inactivity.MobileIron - DISA Google Android 13 COBO v2r2MDM

ACCESS CONTROL

GOOG-13-007400 - Google Android 13 must be configured to disable developer modes.AirWatch - DISA Google Android 13 COPE v2r2MDM

CONFIGURATION MANAGEMENT

GOOG-13-009900 - Google Android 13 must be configured to enforce that Wi-Fi Sharing is disabled.MobileIron - DISA Google Android 13 COPE v2r2MDM

CONFIGURATION MANAGEMENT

GOOG-13-010000 - Google Android 13 must have the DOD root and intermediate PKI certificates installed.AirWatch - DISA Google Android 13 COPE v2r2MDM

CONFIGURATION MANAGEMENT

GOOG-13-010000 - Google Android 13 must have the DOD root and intermediate PKI certificates installed.MobileIron - DISA Google Android 13 COPE v2r2MDM

CONFIGURATION MANAGEMENT

GOOG-13-010400 - The Google Android 13 work profile must be configured to disable automatic completion of work space internet browser text input.AirWatch - DISA Google Android 13 COPE v2r2MDM

CONFIGURATION MANAGEMENT

GOOG-14-006400 - Google Android 14 must be configured to not allow more than 10 consecutive failed authentication attempts.MobileIron - DISA Google Android 14 COBO v2r2MDM

ACCESS CONTROL

GOOG-14-006400 - Google Android 14 must be configured to not allow more than 10 consecutive failed authentication attempts.MobileIron - DISA Google Android 14 COPE v2r2MDM

ACCESS CONTROL

GOOG-14-009800 - Google Android 14 users must complete required training.AirWatch - DISA Google Android 14 COBO v2r2MDM

CONFIGURATION MANAGEMENT

GOOG-14-009800 - Google Android 14 users must complete required training.MobileIron - DISA Google Android 14 COPE v2r2MDM

CONFIGURATION MANAGEMENT

GOOG-14-009900 - Google Android 14 must be configured to enforce that Wi-Fi Sharing is disabled.MobileIron - DISA Google Android 14 COPE v2r2MDM

CONFIGURATION MANAGEMENT

GOOG-14-010000 - Google Android 14 must have the DOD root and intermediate PKI certificates installed.AirWatch - DISA Google Android 14 COPE v2r2MDM

CONFIGURATION MANAGEMENT

GOOG-14-010100 - The Google Android 14 work profile must be configured to prevent users from adding personal email accounts to the work email app.MobileIron - DISA Google Android 14 COPE v2r2MDM

CONFIGURATION MANAGEMENT

GOOG-14-010200 - The Google Android 14 work profile must be configured to enforce the system application disable list.AirWatch - DISA Google Android 14 COPE v2r2MDM

CONFIGURATION MANAGEMENT

GOOG-14-010400 - The Google Android 14 work profile must be configured to disable automatic completion of workspace internet browser text input.MobileIron - DISA Google Android 14 COPE v2r2MDM

CONFIGURATION MANAGEMENT

GOOG-14-010600 - Google Android 14 must be configured to disallow configuration of date and time.MobileIron - DISA Google Android 14 COPE v2r2MDM

CONFIGURATION MANAGEMENT

MADB-10-001700 - MariaDB must by default shut down upon audit failure, to include the unavailability of space for more audit log records; or must be configurable to shut down upon audit failure.DISA MariaDB Enterprise 10.x v2r3 DBMySQLDB

AUDIT AND ACCOUNTABILITY

MADB-10-001800 - MariaDB must be configurable to overwrite audit log records, oldest first (First-In-First-Out - FIFO), in the event of unavailability of space for more audit log records.DISA MariaDB Enterprise 10.x v2r3 DBMySQLDB

AUDIT AND ACCOUNTABILITY

MADB-10-002000 - The audit information produced by MariaDB must be protected from unauthorized read access.DISA MariaDB Enterprise 10.x v2r3 DBMySQLDB

AUDIT AND ACCOUNTABILITY

MADB-10-002200 - The audit information produced by MariaDB must be protected from unauthorized deletion.DISA MariaDB Enterprise 10.x v2r3 DBMySQLDB

AUDIT AND ACCOUNTABILITY

MADB-10-002400 - MariaDB must protect its audit configuration from unauthorized modification.DISA MariaDB Enterprise 10.x v2r3 DBMySQLDB

AUDIT AND ACCOUNTABILITY

MADB-10-003100 - Default demonstration and sample databases, database objects, and applications must be removed.DISA MariaDB Enterprise 10.x v2r3 DBMySQLDB

CONFIGURATION MANAGEMENT

MADB-10-004500 - The MariaDB must uniquely identify and authenticate nonorganizational users (or processes acting on behalf of nonorganizational users).DISA MariaDB Enterprise 10.x v2r3 DBMySQLDB

IDENTIFICATION AND AUTHENTICATION

MADB-10-005000 - MariaDB must fail to a secure state if system initialization fails, shutdown fails, or aborts fail.DISA MariaDB Enterprise 10.x v2r3 DBMySQLDB

SYSTEM AND COMMUNICATIONS PROTECTION

MADB-10-005100 - In the event of a system failure, MariaDB must preserve any information necessary to determine cause of failure and any information necessary to return to operations with least disruption to mission processes.DISA MariaDB Enterprise 10.x v2r3 DBMySQLDB

SYSTEM AND COMMUNICATIONS PROTECTION

MADB-10-005900 - MariaDB and associated applications, when making use of dynamic code execution, must scan input data for invalid values that may indicate a code injection attack.DISA MariaDB Enterprise 10.x v2r3 DBMySQLDB

SYSTEM AND INFORMATION INTEGRITY

MADB-10-006500 - MariaDB must associate organization-defined types of security labels having organization-defined security label values with information in process.DISA MariaDB Enterprise 10.x v2r3 DBMySQLDB

ACCESS CONTROL

MADB-10-007600 - MariaDB must record time stamps, in audit records and application data, that can be mapped to Coordinated Universal Time (UTC, formerly GMT).DISA MariaDB Enterprise 10.x v2r3 DBMySQLDB

AUDIT AND ACCOUNTABILITY

MADB-10-009500 - MariaDB must generate audit records when unsuccessful attempts to access security objects occur.DISA MariaDB Enterprise 10.x v2r3 DBMySQLDB

AUDIT AND ACCOUNTABILITY

MADB-10-010100 - MariaDB must generate audit records when unsuccessful attempts to modify privileges/permissions occur.DISA MariaDB Enterprise 10.x v2r3 DBMySQLDB

AUDIT AND ACCOUNTABILITY

MADB-10-011300 - MariaDB must generate audit records when unsuccessful logons or connection attempts occur.DISA MariaDB Enterprise 10.x v2r3 DBMySQLDB

AUDIT AND ACCOUNTABILITY

MADB-10-012200 - MariaDB must implement NIST FIPS 140-2 validated cryptographic modules to generate and validate cryptographic hashes.DISA MariaDB Enterprise 10.x v2r3 DBMySQLDB

SYSTEM AND COMMUNICATIONS PROTECTION

WN10-CC-000063 - Windows 10 systems must use either Group Policy or an approved Mobile Device Management (MDM) product to enforce STIG compliance.DISA Microsoft Windows 10 STIG v3r4Windows

CONFIGURATION MANAGEMENT