Item Search

NameAudit NamePluginCategory
F5BI-AP-000230 - The F5 BIG-IP appliance must be configured to set a 'Maximum Session Timeout' value of 8 hours or less - Maximum Session Timeout value of 8 hours or less.DISA F5 BIG-IP Access Policy Manager STIG v2r4F5

IDENTIFICATION AND AUTHENTICATION

F5BI-AP-000234 - The F5 BIG-IP appliance must not use the On-Demand Cert Auth VPE agent as part of the APM Policy Profiles.DISA F5 BIG-IP Access Policy Manager STIG v2r4F5

SYSTEM AND COMMUNICATIONS PROTECTION

F5BI-AP-000240 - The F5 BIG-IP appliance must enforce approved authorizations for logical access to resources by explicitly configuring assigned resources with an authorization list.DISA F5 BIG-IP Access Policy Manager STIG v2r4F5

ACCESS CONTROL

F5BI-DM-000291 - The F5 BIG-IP appliance providing user access control intermediary services must display the Standard Mandatory DOD-approved Notice and Consent Banner before granting access to SSH.DISA F5 BIG-IP Device Management STIG v2r4F5

ACCESS CONTROL

GOOG-15-006300 - Google Android 15 must be configured to lock the display after 15 minutes (or less) of inactivity - or less of inactivity.MobileIron - DISA Google Android 15 COBO v1r2MDM

ACCESS CONTROL

GOOG-15-006300 - Google Android 15 must be configured to lock the display after 15 minutes (or less) of inactivity - or less of inactivity.AirWatch - DISA Google Android 15 COPE v1r2MDM

ACCESS CONTROL

GOOG-15-006300 - Google Android 15 must be configured to lock the display after 15 minutes (or less) of inactivity - or less of inactivity.MobileIron - DISA Google Android 15 COPE v1r2MDM

ACCESS CONTROL

GOOG-15-006400 - Google Android 15 must be configured to not allow more than 10 consecutive failed authentication attempts.MobileIron - DISA Google Android 15 COBO v1r2MDM

ACCESS CONTROL

GOOG-15-006700 - Google Android 15 allow list must be configured to not include applications with the following characteristics:MobileIron - DISA Google Android 15 COPE v1r2MDM

IDENTIFICATION AND AUTHENTICATION

GOOG-15-006750 - Google Android 15 allow list must be configured to not include artificial intelligence (AI) applications that process device data in the cloud, including Google Gemini.AirWatch - DISA Google Android 15 COBO v1r2MDM

IDENTIFICATION AND AUTHENTICATION

GOOG-15-006750 - Google Android 15 allow list must be configured to not include artificial intelligence (AI) applications that process device data in the cloud, including Google Gemini.AirWatch - DISA Google Android 15 COPE v1r2MDM

IDENTIFICATION AND AUTHENTICATION

GOOG-15-009500 - Google Android 15 must be configured to disable ad hoc wireless client-to-client connection capability.MobileIron - DISA Google Android 15 COPE v1r2MDM

SYSTEM AND COMMUNICATIONS PROTECTION

GOOG-15-010200 - The Google Android 15 work profile must be configured to enforce the system application disable list.MobileIron - DISA Google Android 15 COBO v1r2MDM

CONFIGURATION MANAGEMENT

GOOG-15-010500 - The Google Android 15 work profile must be configured to disable the autofill services.AirWatch - DISA Google Android 15 COBO v1r2MDM

CONFIGURATION MANAGEMENT

GOOG-15-010600 - Google Android 15 must be configured to disallow configuration of date and time.AirWatch - DISA Google Android 15 COBO v1r2MDM

CONFIGURATION MANAGEMENT

GOOG-15-010600 - Google Android 15 must be configured to disallow configuration of date and time.MobileIron - DISA Google Android 15 COBO v1r2MDM

CONFIGURATION MANAGEMENT

MADB-10-000700 - MariaDB must be able to generate audit records when privileges/permissions are retrieved.DISA MariaDB Enterprise 10.x v2r3 DBMySQLDB

AUDIT AND ACCOUNTABILITY

MADB-10-002300 - MariaDB must protect its audit features from unauthorized access.DISA MariaDB Enterprise 10.x v2r3 DBMySQLDB

AUDIT AND ACCOUNTABILITY

MADB-10-003400 - Access to external executables must be disabled or restricted.DISA MariaDB Enterprise 10.x v2r3 DBMySQLDB

CONFIGURATION MANAGEMENT

MADB-10-004600 - MariaDB must separate user functionality (including user interface services) from database management functionality.DISA MariaDB Enterprise 10.x v2r3 DBMySQLDB

SYSTEM AND COMMUNICATIONS PROTECTION

MADB-10-005600 - Access to database files must be limited to relevant processes and to authorized, administrative users.DISA MariaDB Enterprise 10.x v2r3 DBMySQLDB

SYSTEM AND COMMUNICATIONS PROTECTION

MADB-10-005700 - MariaDB must check the validity of all data inputs except those specifically identified by the organization.DISA MariaDB Enterprise 10.x v2r3 DBMySQLDB

SYSTEM AND INFORMATION INTEGRITY

MADB-10-006400 - MariaDB must associate organization-defined types of security labels having organization-defined security label values with information in storage.DISA MariaDB Enterprise 10.x v2r3 DBMySQLDB

ACCESS CONTROL

MADB-10-010200 - MariaDB must generate audit records when security objects are modified.DISA MariaDB Enterprise 10.x v2r3 DBMySQLDB

AUDIT AND ACCOUNTABILITY

MADB-10-010300 - MariaDB must generate audit records when unsuccessful attempts to modify security objects occur.DISA MariaDB Enterprise 10.x v2r3 DBMySQLDB

AUDIT AND ACCOUNTABILITY

MADB-10-010900 - MariaDB must generate audit records when unsuccessful attempts to delete security objects occur.DISA MariaDB Enterprise 10.x v2r3 DBMySQLDB

AUDIT AND ACCOUNTABILITY

MADB-10-011400 - MariaDB must generate audit records for all privileged activities or other system-level access.DISA MariaDB Enterprise 10.x v2r3 DBMySQLDB

AUDIT AND ACCOUNTABILITY

MADB-10-011600 - MariaDB must generate audit records showing starting and ending time for user access to the database(s).DISA MariaDB Enterprise 10.x v2r3 DBMySQLDB

AUDIT AND ACCOUNTABILITY

MADB-10-012100 - MariaDB must implement NIST FIPS 140-2 validated cryptographic modules to provision digital signatures.DISA MariaDB Enterprise 10.x v2r3 OS LinuxUnix

SYSTEM AND COMMUNICATIONS PROTECTION

MADB-10-012200 - MariaDB must implement NIST FIPS 140-2 validated cryptographic modules to generate and validate cryptographic hashes.DISA MariaDB Enterprise 10.x v2r3 OS LinuxUnix

SYSTEM AND COMMUNICATIONS PROTECTION

MADB-10-012300 - MariaDB must implement NIST FIPS 140-2 validated cryptographic modules to protect unclassified information requiring confidentiality and cryptographic protection, in accordance with the data owners requirements.DISA MariaDB Enterprise 10.x v2r3 OS LinuxUnix

SYSTEM AND COMMUNICATIONS PROTECTION

RHEL-09-255110 - The RHEL 9 SSH server configuration file must be owned by root.DISA Red Hat Enterprise Linux 9 STIG v2r4Unix

CONFIGURATION MANAGEMENT

RHEL-09-255160 - RHEL 9 SSH daemon must perform strict mode checking of home directory configuration files.DISA Red Hat Enterprise Linux 9 STIG v2r4Unix

CONFIGURATION MANAGEMENT

RHEL-09-271075 - RHEL 9 must initiate a session lock for graphical user interfaces when the screensaver is activated.DISA Red Hat Enterprise Linux 9 STIG v2r4Unix

ACCESS CONTROL

RHEL-09-271100 - RHEL 9 must prevent a user from overriding the disable-restart-buttons setting for the graphical user interface.DISA Red Hat Enterprise Linux 9 STIG v2r4Unix

CONFIGURATION MANAGEMENT

RHEL-09-271115 - RHEL 9 must disable the user list at logon for graphical user interfaces.DISA Red Hat Enterprise Linux 9 STIG v2r4Unix

CONFIGURATION MANAGEMENT

RHEL-09-411035 - RHEL 9 system accounts must not have an interactive login shell.DISA Red Hat Enterprise Linux 9 STIG v2r4Unix

CONFIGURATION MANAGEMENT

RHEL-09-411045 - All RHEL 9 interactive users must have a primary group that exists.DISA Red Hat Enterprise Linux 9 STIG v2r4Unix

IDENTIFICATION AND AUTHENTICATION

RHEL-09-411105 - RHEL 9 must ensure account lockouts persist.DISA Red Hat Enterprise Linux 9 STIG v2r4Unix

ACCESS CONTROL

RHEL-09-412045 - RHEL 9 must log username information when unsuccessful logon attempts occur.DISA Red Hat Enterprise Linux 9 STIG v2r4Unix

ACCESS CONTROL

RHEL-09-412055 - RHEL 9 must define default permissions for the bash shell.DISA Red Hat Enterprise Linux 9 STIG v2r4Unix

CONFIGURATION MANAGEMENT

RHEL-09-412080 - RHEL 9 must terminate idle user sessions.DISA Red Hat Enterprise Linux 9 STIG v2r4Unix

SYSTEM AND COMMUNICATIONS PROTECTION

RHEL-09-432030 - RHEL 9 must restrict privilege elevation to authorized personnel.DISA Red Hat Enterprise Linux 9 STIG v2r4Unix

CONFIGURATION MANAGEMENT

RHEL-09-611105 - RHEL 9 must prevent the use of dictionary words for passwords.DISA Red Hat Enterprise Linux 9 STIG v2r4Unix

CONFIGURATION MANAGEMENT

RHEL-09-611200 - RHEL 9 must require authentication to access single-user mode.DISA Red Hat Enterprise Linux 9 STIG v2r4Unix

ACCESS CONTROL

RHEL-09-652020 - The rsyslog service on RHEL 9 must be active.DISA Red Hat Enterprise Linux 9 STIG v2r4Unix

CONFIGURATION MANAGEMENT

RHEL-09-653105 - RHEL 9 must write audit records to disk.DISA Red Hat Enterprise Linux 9 STIG v2r4Unix

CONFIGURATION MANAGEMENT

RHEL-09-653125 - RHEL 9 must have mail aliases to notify the information system security officer (ISSO) and system administrator (SA) (at a minimum) in the event of an audit processing failure.DISA Red Hat Enterprise Linux 9 STIG v2r4Unix

AUDIT AND ACCOUNTABILITY

UBTU-18-010419 - The Ubuntu operating system SSH daemon must prevent remote hosts from connecting to the proxy display.DISA STIG Ubuntu 18.04 LTS v2r15Unix

CONFIGURATION MANAGEMENT

WN10-00-000107 - Copilot in Windows must be disabled for Windows 10.DISA Microsoft Windows 10 STIG v3r4Windows

CONFIGURATION MANAGEMENT