Item Search

NameAudit NamePluginCategory
1.90 APPL-14-002062CIS Apple macOS 14 (Sonoma) STIG v1.0.0 CAT IUnix

SYSTEM AND COMMUNICATIONS PROTECTION

AIOS-17-999999 - All Apple iOS/iPadOS 17 installations must be removed.MobileIron - DISA Apple iOS/iPadOS 17 v2r2MDM

CONFIGURATION MANAGEMENT

ALMA-09-042700 - All AlmaLinux OS 9 networked systems must have the OpenSSH client installed.DISA CloudLinux AlmaLinux OS 9 STIG v1r3Unix

SYSTEM AND COMMUNICATIONS PROTECTION

ARST-ND-000470 - The Arista network device must use FIPS 140-2 approved algorithms for authentication to a cryptographic module.DISA STIG Arista MLS EOS 4.x NDM v2r2Arista

IDENTIFICATION AND AUTHENTICATION

ARST-RT-000340 - The Arista router must be configured to restrict traffic destined to itself.DISA STIG Arista MLS EOS 4.x Router v2r2Arista

SYSTEM AND COMMUNICATIONS PROTECTION

ARST-RT-000760 - The PE router providing MPLS Virtual Private Wire Service (VPWS) must be configured to have the appropriate virtual circuit identification (VC ID) for each attachment circuit.DISA STIG Arista MLS EOS 4.x Router v2r2Arista

CONTINGENCY PLANNING

CD12-00-008000 - PostgreSQL must implement NIST FIPS 140-2 or 140-3 validated cryptographic modules to generate and validate cryptographic hashes.DISA STIG Crunchy Data PostgreSQL OS v3r1Unix

SYSTEM AND COMMUNICATIONS PROTECTION

CD12-00-008200 - PostgreSQL must implement NIST FIPS 140-2 or 140-3 validated cryptographic modules to protect unclassified information requiring confidentiality and cryptographic protection, in accordance with the data owner's requirements.DISA STIG Crunchy Data PostgreSQL OS v3r1Unix

SYSTEM AND COMMUNICATIONS PROTECTION

CNTR-K8-000320 - The Kubernetes API server must have the insecure port flag disabled.DISA STIG Kubernetes v2r4Unix

ACCESS CONTROL

CNTR-K8-000380 - The Kubernetes kubelet must enable explicit authorization.DISA STIG Kubernetes v2r4Unix

ACCESS CONTROL

CNTR-K8-002011 - Kubernetes must have a Pod Security Admission control file configured.DISA STIG Kubernetes v2r4Unix

ACCESS CONTROL

EPAS-00-004800 - When using command-line tools such as psql, users must use a logon method that does not expose the password.EnterpriseDB PostgreSQL Advanced Server DB v2r1PostgreSQLDB

IDENTIFICATION AND AUTHENTICATION

GEN001100 - Root passwords must never be passed over a network in clear text form - 'root has logged in over a network'DISA STIG AIX 5.3 v1r2Unix

IDENTIFICATION AND AUTHENTICATION

GEN003850 - The telnet daemon must not be running.DISA STIG AIX 5.3 v1r2Unix

IDENTIFICATION AND AUTHENTICATION

GOOG-09-999999 - All Google Android 9 installations must be removed.AirWatch - DISA Google Android 9.x v2r1MDM

CONFIGURATION MANAGEMENT

GOOG-11-010800 - Google Android 11 devices must have the latest available Google Android 11 operating system installed.MobileIron - DISA Google Android 11 COPE v2r1MDM

CONFIGURATION MANAGEMENT

GOOG-011-999999 - All Google Android 11 installations must be removed.AirWatch - DISA Google Android 11 COBO v2r1MDM

CONFIGURATION MANAGEMENT

GOOG-011-999999 - All Google Android 11 installations must be removed.MobileIron - DISA Google Android 11 COPE v2r1MDM

CONFIGURATION MANAGEMENT

GOOG-12-010800 - Android 12 devices must have the latest available Google Android 12 operating system installed.MobileIron - DISA Google Android 12 COBO v1r2MDM

CONFIGURATION MANAGEMENT

HONW-09-008400 - On all Honeywell Mobility Edge Android Pie devices, cryptography must be configured to be in FIPS 140-2 validated mode.AirWatch - DISA Honeywell Android 9.x COPE v1r2MDM

CONFIGURATION MANAGEMENT

HONW-09-010900 - Honeywell Mobility Edge Android Pie devices must have a NIAP validated Honeywell Mobility Edge Android Pie devices operating system installed.MobileIron - DISA Honeywell Android 9.x COPE v1r2MDM

CONFIGURATION MANAGEMENT

HONW-09-999999 - All Honeywell Android 9 installations must be removed.AirWatch - DISA Honeywell Android 9.x COPE v1r2MDM

CONFIGURATION MANAGEMENT

HONW-13-009600 - All mobile Honeywell cryptography must be configured to be in FIPS 140-3 validated mode.AirWatch - DISA Honeywell Android 13 COBO v1r1MDM

SYSTEM AND COMMUNICATIONS PROTECTION

HONW-13-009600 - All mobile Honeywell cryptography must be configured to be in FIPS 140-3 validated mode.AirWatch - DISA Honeywell Android 13 COPE v1r1MDM

SYSTEM AND COMMUNICATIONS PROTECTION

MD4X-00-003800 - MongoDB must protect the confidentiality and integrity of all information at rest.DISA STIG MongoDB Enterprise Advanced 4.x v1r4 OSUnix

SYSTEM AND COMMUNICATIONS PROTECTION

MOTO-09-999999 - All Motorola Android 9 installations must be removed.AirWatch - DISA Motorola Android Pie.x COBO v1r2MDM

CONFIGURATION MANAGEMENT

MOTO-09-999999 - All Motorola Android 9 installations must be removed.MobileIron - DISA Motorola Android Pie.x COBO v1r2MDM

CONFIGURATION MANAGEMENT

MSFT-11-010800 - Microsoft Android 11 devices must have the latest available Microsoft Android 11 operating system installed.AirWatch - DISA Microsoft Android 11 COBO v1r2MDM

CONFIGURATION MANAGEMENT

OL07-00-010291 - The Oracle Linux operating system must not have accounts configured with blank or null passwords.DISA Oracle Linux 7 STIG v3r3Unix

CONFIGURATION MANAGEMENT

OL09-00-000135 - OL 9 must not have a Trivial File Transfer Protocol (TFTP) server package installed.DISA Oracle Linux 9 STIG v1r2Unix

CONFIGURATION MANAGEMENT

PHTN-40-000182 The Photon operating system must implement NIST FIPS-validated cryptography for the following: to provision digital signatures, to generate cryptographic hashes, and to protect unclassified information requiring confidentiality and cryptographic protection in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, and standards.DISA VMware vSphere 8.0 vCenter Appliance Photon OS 4.0 STIG v2r1Unix

SYSTEM AND COMMUNICATIONS PROTECTION

RHEL-09-271040 - RHEL 9 must not allow unattended or automatic logon via the graphical user interface.DISA Red Hat Enterprise Linux 9 STIG v2r4Unix

CONFIGURATION MANAGEMENT

RHEL-09-611025 - RHEL 9 must not allow blank or null passwords.DISA Red Hat Enterprise Linux 9 STIG v2r4Unix

CONFIGURATION MANAGEMENT

SLES-12-010221 - The SUSE operating system must not have accounts configured with blank or null passwords.DISA SLES 12 STIG v3r3Unix

CONFIGURATION MANAGEMENT

SLES-15-010200 - SUSE operating systems with Unified Extensible Firmware Interface (UEFI) implemented must require authentication upon booting into single-user mode and maintenance.DISA SUSE Linux Enterprise Server 15 STIG v2r5Unix

ACCESS CONTROL

SLES-15-020100 - The SUSE operating system root account must be the only account with unrestricted access to the system.DISA SUSE Linux Enterprise Server 15 STIG v2r5Unix

CONFIGURATION MANAGEMENT

SQL2-00-016500 - SQL Server must have the SQL Server Data Tools (SSDT) software component removed from SQL Server if SSDT is unused.DISA STIG SQL Server 2012 Database OS Audit v1r20Windows

CONFIGURATION MANAGEMENT

SYMP-AG-000070 - Symantec ProxySG must restrict or block harmful or suspicious communications traffic by controlling the flow of information between interconnected networks based on attribute- and content-based inspection of the source, destination, headers, and/or content of the communications traffic - SSLDISA Symantec ProxySG Benchmark ALG v1r3BlueCoat

ACCESS CONTROL

SYMP-AG-000070 - Symantec ProxySG must restrict or block harmful or suspicious communications traffic by controlling the flow of information between interconnected networks based on attribute- and content-based inspection of the source, destination, headers, and/or content of the communications traffic - Web AccessDISA Symantec ProxySG Benchmark ALG v1r3BlueCoat

ACCESS CONTROL

SYMP-AG-000340 - Symantec ProxySG providing user authentication intermediary services must restrict user authentication traffic to specific authentication servers - Domain existsDISA Symantec ProxySG Benchmark ALG v1r3BlueCoat

IDENTIFICATION AND AUTHENTICATION

SYMP-NM-000030 - Symantec ProxySG must configure Web Management Console access restrictions to authorized IP address/ranges.DISA Symantec ProxySG Benchmark NDM v1r2BlueCoat

ACCESS CONTROL

UBTU-20-010442 - The Ubuntu operating system must implement NIST FIPS-validated cryptography to protect classified information and for the following: To provision digital signatures, to generate cryptographic hashes, and to protect unclassified information requiring confidentiality and cryptographic protection in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, and standards.DISA Canonical Ubuntu 20.04 LTS STIG v2r3Unix

SYSTEM AND COMMUNICATIONS PROTECTION

UBTU-20-010459 - The Ubuntu operating system must disable the x86 Ctrl-Alt-Delete key sequence if a graphical user interface is installed.DISA Canonical Ubuntu 20.04 LTS STIG v2r3Unix

CONFIGURATION MANAGEMENT

UBTU-22-255025 - Ubuntu 22.04 LTS must not allow unattended or automatic login via SSH.DISA Canonical Ubuntu 22.04 LTS STIG v2r5Unix

CONFIGURATION MANAGEMENT

UBTU-22-255040 - Ubuntu 22.04 LTS must be configured so that remote X connections are disabled, unless to fulfill documented and validated mission requirements.DISA Canonical Ubuntu 22.04 LTS STIG v2r5Unix

CONFIGURATION MANAGEMENT

WN11-00-000040 - Windows 11 systems must be maintained at a supported servicing level.DISA Microsoft Windows 11 STIG v2r4Windows

CONFIGURATION MANAGEMENT

WN11-SO-000145 - Anonymous enumeration of SAM accounts must not be allowed.DISA Microsoft Windows 11 STIG v2r4Windows

CONFIGURATION MANAGEMENT

WN11-SO-000165 - Anonymous access to Named Pipes and Shares must be restricted.DISA Microsoft Windows 11 STIG v2r4Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WN16-DC-000401 - Windows Server 2016 must be configured for name-based strong mappings for certificates.DISA Microsoft Windows Server 2016 STIG v2r10Windows

ACCESS CONTROL

WN22-SO-000250 - Windows Server 2022 must restrict anonymous access to Named Pipes and Shares.DISA Microsoft Windows Server 2022 STIG v2r5Windows

SYSTEM AND COMMUNICATIONS PROTECTION