| 1.2.1.6 Ensure cryptographic verification of vendor software packages | CIS Red Hat Enterprise Linux 8 STIG v2.0.0 STIG | Unix | CONFIGURATION MANAGEMENT |
| 1.4.5 Ensure a unique name is set as the superusers account (BIOS) | CIS Red Hat Enterprise Linux 8 STIG v2.0.0 STIG | Unix | ACCESS CONTROL |
| 1.5.12 Ensure kernel image loading is disabled | CIS Red Hat Enterprise Linux 8 STIG v2.0.0 STIG | Unix | CONFIGURATION MANAGEMENT |
| 1.6.11 Ensure the operating system implements certificate status checking for multifactor authentication | CIS Red Hat Enterprise Linux 8 STIG v2.0.0 STIG | Unix | IDENTIFICATION AND AUTHENTICATION |
| 1.8.17 Ensure the operating system prevents users from overriding the screensaver lock-enabled setting for the graphical user interface | CIS Red Hat Enterprise Linux 8 STIG v2.0.0 STIG | Unix | ACCESS CONTROL |
| 1.11 Ensure the mailx package is installed | CIS Red Hat Enterprise Linux 8 STIG v2.0.0 STIG | Unix | CONFIGURATION MANAGEMENT |
| 1.12 Ensure the operating system accepts PIV credentials | CIS Red Hat Enterprise Linux 8 STIG v2.0.0 STIG | Unix | IDENTIFICATION AND AUTHENTICATION |
| 1.99 RHEL-09-231160 | CIS Red Hat Enterprise Linux 9 STIG v1.0.0 CAT II | Unix | CONFIGURATION MANAGEMENT |
| 2.1.6 Ensure ftp server services are not in use | CIS Red Hat Enterprise Linux 8 STIG v2.0.0 L1 Workstation | Unix | CONFIGURATION MANAGEMENT |
| 2.1.32 Ensure the tuned package has not been installed on the system | CIS Red Hat Enterprise Linux 8 STIG v2.0.0 STIG | Unix | CONFIGURATION MANAGEMENT |
| 2.6.1 Ensure fapolicyd is installed | CIS Red Hat Enterprise Linux 8 STIG v2.0.0 STIG | Unix | CONFIGURATION MANAGEMENT |
| 5.1.26 Ensure sshd ClientAliveInterval is configured | CIS Red Hat Enterprise Linux 8 STIG v2.0.0 STIG | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
| 5.2.9 Ensure sudo timestamp_timeout is configured | CIS Red Hat Enterprise Linux 8 STIG v2.0.0 L1 Server | Unix | IDENTIFICATION AND AUTHENTICATION |
| 5.3.3.6.2 Ensure SSSD prohibits the use of cached authentications after one day | CIS Red Hat Enterprise Linux 8 STIG v2.0.0 STIG | Unix | IDENTIFICATION AND AUTHENTICATION |
| 5.4.3.8 Ensure the umask default for installed shells is "077" | CIS Red Hat Enterprise Linux 8 STIG v2.0.0 STIG | Unix | CONFIGURATION MANAGEMENT |
| 5.4.3.10 Ensure the operating system initiates a session lock after 15 minutes of inactivity | CIS Red Hat Enterprise Linux 8 STIG v2.0.0 STIG | Unix | ACCESS CONTROL |
| 6.2.2.10 Ensure rsyslog is configured to log cron events | CIS Red Hat Enterprise Linux 8 STIG v2.0.0 STIG | Unix | CONFIGURATION MANAGEMENT |
| 6.3.3.7 Ensure unsuccessful file access attempts are collected | CIS Red Hat Enterprise Linux 8 STIG v2.0.0 L2 Server | Unix | AUDIT AND ACCOUNTABILITY |
| 6.3.3.13 Ensure file deletion events by users are collected | CIS Red Hat Enterprise Linux 8 STIG v2.0.0 L2 Server | Unix | AUDIT AND ACCOUNTABILITY |
| 6.3.3.13 Ensure file deletion events by users are collected | CIS Red Hat Enterprise Linux 8 STIG v2.0.0 L2 Workstation | Unix | AUDIT AND ACCOUNTABILITY |
| 6.3.3.15 Ensure successful and unsuccessful attempts to use the chcon command are collected | CIS Red Hat Enterprise Linux 8 STIG v2.0.0 L2 Server | Unix | AUDIT AND ACCOUNTABILITY |
| 6.3.3.16 Ensure successful and unsuccessful attempts to use the setfacl command are collected | CIS Red Hat Enterprise Linux 8 STIG v2.0.0 L2 Server | Unix | AUDIT AND ACCOUNTABILITY |
| 6.3.3.16 Ensure successful and unsuccessful attempts to use the setfacl command are collected | CIS Red Hat Enterprise Linux 8 STIG v2.0.0 L2 Workstation | Unix | AUDIT AND ACCOUNTABILITY |
| 6.3.3.31 Ensure successful and unsuccessful attempts to use the setsebool command are collected | CIS Red Hat Enterprise Linux 8 STIG v2.0.0 STIG | Unix | AUDIT AND ACCOUNTABILITY |
| 6.3.3.38 Ensure successful and unsuccessful attempts to use the umount command are collected | CIS Red Hat Enterprise Linux 8 STIG v2.0.0 STIG | Unix | AUDIT AND ACCOUNTABILITY |
| 7.1.19 Ensure world-writable directories owner is configured | CIS Red Hat Enterprise Linux 8 STIG v2.0.0 STIG | Unix | CONFIGURATION MANAGEMENT |
| 7.1.21 Ensure local initialization files do not execute world-writable programs | CIS Red Hat Enterprise Linux 8 STIG v2.0.0 STIG | Unix | CONFIGURATION MANAGEMENT |
| 7.2.2 Ensure /etc/shadow password fields are not empty | CIS Red Hat Enterprise Linux 8 STIG v2.0.0 STIG | Unix | CONFIGURATION MANAGEMENT |
| DG0032-ORACLE11 - Audit records should be restricted to authorized individuals - 'AUD$ table access is restricted' | DISA STIG Oracle 11 Instance v9r1 Database | OracleDB | |
| DG0071-ORACLE11 - New passwords must be required to differ from old passwords by more than four characters - 'PASSWORD_VERIFY_FUNCTION is not set to NULL or DEFAULT' | DISA STIG Oracle 11 Instance v9r1 Database | OracleDB | |
| DG0078-ORACLE11 - Each database user, application or process should have an individually assigned account. | DISA STIG Oracle 11 Instance v9r1 Database | OracleDB | |
| DG0105-ORACLE11 - DBMS application user roles should not be assigned unauthorized privileges. | DISA STIG Oracle 11 Instance v9r1 Database | OracleDB | |
| DG0127-ORACLE11 - DBMS account passwords should not be set to easily guessed words or values - 'profile' | DISA STIG Oracle 11 Instance v9r1 Database | OracleDB | |
| DG0135-ORACLE11 - Users should be alerted upon login of previous successful connections or unsuccessful attempts to access their account. | DISA STIG Oracle 11 Instance v9r1 Database | OracleDB | |
| DG0159-ORACLE11 - Remote administrative access to the database should be monitored by the IAO or IAM. | DISA STIG Oracle 11 Installation v9r1 Windows | Windows | |
| DG0166-ORACLE11 - Asymmetric keys should use DoD PKI Certificates and be protected in accordance with NIST (unclassified data) or NSA (classified data) approved key management and processes. | DISA STIG Oracle 11 Instance v9r1 Database | OracleDB | |
| DG0186-ORACLE11 - The database should not be directly accessible from public or unauthorized networks. | DISA STIG Oracle 11 Installation v9r1 Windows | Windows | |
| DG0187-ORACLE11 - DBMS software libraries should be periodically backed up. | DISA STIG Oracle 11 Installation v9r1 Windows | Windows | |
| DG0198-ORACLE11 - Remote administration of the DBMS should be restricted to known, dedicated and encrypted network addresses and ports. | DISA STIG Oracle 11 Installation v9r1 Windows | Windows | |
| DO0155-ORACLE11 - Only authorized system accounts should have the SYSTEM tablespace specified as the default tablespace - 'Tablespace not set to SYSTEM' | DISA STIG Oracle 11 Instance v9r1 Database | OracleDB | |
| DO0210-ORACLE11 - Access to default accounts used to support replication should be restricted to authorized DBAs - 'sys.dba_repcatlog count = 0' | DISA STIG Oracle 11 Instance v9r1 Database | OracleDB | |
| DO0233-ORACLE11 - The /diag subdirectory under the directory assigned to the DIAGNOSTIC_DEST parameter must be protected from unauthorized access. | DISA STIG Oracle 11 Instance v9r1 Database | OracleDB | |
| DO0234-ORACLE11 - The directory assigned to the AUDIT_FILE_DEST parameter should be protected from unauthorized access - 'audit_trail value = TRUE, OS, XML or XML, EXTENDED' | DISA STIG Oracle 11 Instance v9r1 Database | OracleDB | |
| DO0238-ORACLE11 - The directories assigned to the LOG_ARCHIVE_DEST* parameters should be protected from unauthorized access - 'log_archive_dest_n parameter is configured' | DISA STIG Oracle 11 Instance v9r1 Database | OracleDB | |
| DO0250-ORACLE11 - Fixed user and public database links should be authorized for use - 'Database links are documented' | DISA STIG Oracle 11 Instance v9r1 Database | OracleDB | |
| DO0260-ORACLE11 - A minimum of two Oracle control files should be defined and configured to be stored on separate, archived physical disks or archived directories on a RAID device. | DISA STIG Oracle 11 Instance v9r1 Database | OracleDB | |
| DO3696-ORACLE11 - The Oracle RESOURCE_LIMIT parameter should be set to TRUE - 'resource_limit = true' | DISA STIG Oracle 11 Instance v9r1 Database | OracleDB | |
| DO5037-ORACLE11 - Oracle SQLNet and listener log files should not be accessible to unauthorized users - 'TRACE_LEVEL_SERVER' | DISA STIG Oracle 11 Installation v9r1 Windows | Windows | |
| WA000-WWA022 A22 - The KeepAlive directive must be enabled. | DISA STIG Apache Server 2.2 Unix v1r11 Middleware | Unix | |
| WA000-WWA024 A22 - The KeepAliveTimeout directive must be defined. | DISA STIG Apache Server 2.2 Unix v1r11 Middleware | Unix | |