Item Search

NameAudit NamePluginCategory
MOTO-09-000200 - The Motorola Android Pie must be configured to not allow passwords that include more than two repeating or sequential characters - Minimum complex charactersMobileIron - DISA Motorola Android Pie.x COPE v1r2MDM

CONFIGURATION MANAGEMENT

MOTO-09-000300 - The Motorola Android Pie must be configured to enable a screen lock policy that will lock the display after a period of inactivity.MobileIron - DISA Motorola Android Pie.x COPE v1r2MDM

ACCESS CONTROL

MOTO-09-000400 - The Motorola Android Pie must be configured to lock the display after 15 minutes (or less) of inactivity - or less of inactivity.MobileIron - DISA Motorola Android Pie.x COPE v1r2MDM

ACCESS CONTROL

MOTO-09-009000 - Motorola Android Pie must have the DoD root and intermediate PKI certificates installed.MobileIron - DISA Motorola Android Pie.x COPE v1r2MDM

CONFIGURATION MANAGEMENT

MOTO-09-009200 - The Motorola Android Pie Work Profile must be configured to prevent users from adding personal email accounts to the work email app.AirWatch - DISA Motorola Android Pie.x COPE v1r2MDM

CONFIGURATION MANAGEMENT

MOTO-09-009200 - The Motorola Android Pie Work Profile must be configured to prevent users from adding personal email accounts to the work email app.MobileIron - DISA Motorola Android Pie.x COPE v1r2MDM

CONFIGURATION MANAGEMENT

MOTO-09-009400 - Motorola Android Pie work profile must be configured to enforce the system application disable list.AirWatch - DISA Motorola Android Pie.x COPE v1r2MDM

CONFIGURATION MANAGEMENT

MOTO-09-009800 - The Motorola Android Pie work profile must be configured to disable automatic completion of work space internet browser text input.AirWatch - DISA Motorola Android Pie.x COPE v1r2MDM

CONFIGURATION MANAGEMENT

MOTO-09-010000 - Motorola Android Pie Work Profile must be configured to disable the autofill services.AirWatch - DISA Motorola Android Pie.x COPE v1r2MDM

CONFIGURATION MANAGEMENT

MOTS-11-000200 - Motorola Solutions Android 11 must be configured to not allow passwords that include more than two repeating or sequential characters - CharactersAirWatch - DISA Motorola Solutions Android 11 COBO v1r3MDM

CONFIGURATION MANAGEMENT

MOTS-11-000200 - Motorola Solutions Android 11 must be configured to not allow passwords that include more than two repeating or sequential characters - TypeMobileIron - DISA Motorola Solutions Android 11 COBO v1r3MDM

CONFIGURATION MANAGEMENT

MOTS-11-000400 - Motorola Solutions Android 11 must be configured to lock the display after 15 minutes (or less) of inactivity.MobileIron - DISA Motorola Solutions Android 11 COBO v1r3MDM

ACCESS CONTROL

MOTS-11-002800 - Motorola Solutions Android 11 must be configured to disable developer modes.MobileIron - DISA Motorola Solutions Android 11 COBO v1r3MDM

CONFIGURATION MANAGEMENT

MOTS-11-010200 - Motorola Solutions Android 11 must be configured to disallow configuration of date and time.AirWatch - DISA Motorola Solutions Android 11 COBO v1r3MDM

CONFIGURATION MANAGEMENT

MYS8-00-000200 - MySQL Database Server 8.0 must limit the number of concurrent sessions to an organization-defined number per user for all accounts and/or account types.DISA Oracle MySQL 8.0 v2r2 DBMySQLDB

ACCESS CONTROL

MYS8-00-000300 - MySQL Database Server 8.0 must produce audit records containing sufficient information to establish what type of events occurred.DISA Oracle MySQL 8.0 v2r2 DBMySQLDB

AUDIT AND ACCOUNTABILITY

MYS8-00-000300 - MySQL Database Server 8.0 must produce audit records containing sufficient information to establish what type of events occurred.DISA Oracle MySQL 8.0 v2r2 OS LinuxUnix

AUDIT AND ACCOUNTABILITY

MYS8-00-001200 - The audit information produced by the MySQL Database Server 8.0 must be protected from unauthorized read access.DISA Oracle MySQL 8.0 v2r2 OS LinuxUnix

AUDIT AND ACCOUNTABILITY

MYS8-00-001500 - The MySQL Database Server 8.0 must protect against a user falsely repudiating having performed organization-defined actions.DISA Oracle MySQL 8.0 v2r2 DBMySQLDB

AUDIT AND ACCOUNTABILITY

MYS8-00-002000 - The MySQL Database Server 8.0 must be able to generate audit records when security objects are accessed.DISA Oracle MySQL 8.0 v2r2 DBMySQLDB

AUDIT AND ACCOUNTABILITY

MYS8-00-002400 - The MySQL Database Server 8.0 must generate audit records when privileges/permissions are added.DISA Oracle MySQL 8.0 v2r2 DBMySQLDB

AUDIT AND ACCOUNTABILITY

MYS8-00-003100 - The MySQL Database Server 8.0 must generate audit records when unsuccessful attempts to modify categories of information (e.g., classification levels/security levels) occur.DISA Oracle MySQL 8.0 v2r2 DBMySQLDB

AUDIT AND ACCOUNTABILITY

MYS8-00-004100 - The MySQL Database Server 8.0 must generate audit records when unsuccessful attempts to execute privileged activities or other system-level access occur.DISA Oracle MySQL 8.0 v2r2 DBMySQLDB

AUDIT AND ACCOUNTABILITY

MYS8-00-004400 - The MySQL Database Server 8.0 must be able to generate audit records when successful accesses to objects occur.DISA Oracle MySQL 8.0 v2r2 DBMySQLDB

AUDIT AND ACCOUNTABILITY

MYS8-00-005500 - The MySQL Database Server 8.0 must be configured in accordance with the security configuration settings based on DoD security configuration and implementation guidance, including STIGs, NSA configuration guides, CTOs, DTMs, and IAVMs.DISA Oracle MySQL 8.0 v2r2 DBMySQLDB

CONFIGURATION MANAGEMENT

MYS8-00-005600 - Default demonstration and sample databases, database objects, and applications must be removed.DISA Oracle MySQL 8.0 v2r2 DBMySQLDB

CONFIGURATION MANAGEMENT

MYS8-00-005700 - Unused database components, MySQL Database Server 8.0 software, and database objects must be removed.DISA Oracle MySQL 8.0 v2r2 DBMySQLDB

CONFIGURATION MANAGEMENT

MYS8-00-006100 - The MySQL Database Server 8.0 must uniquely identify and authenticate organizational users (or processes acting on behalf of organizational users).DISA Oracle MySQL 8.0 v2r2 DBMySQLDB

IDENTIFICATION AND AUTHENTICATION

MYS8-00-006500 - The MySQL Database Server 8.0 must isolate security functions from non-security functions.DISA Oracle MySQL 8.0 v2r2 DBMySQLDB

SYSTEM AND COMMUNICATIONS PROTECTION

MYS8-00-006800 - Access to database files must be limited to relevant processes and to authorized, administrative users.DISA Oracle MySQL 8.0 v2r2 DBMySQLDB

SYSTEM AND COMMUNICATIONS PROTECTION

MYS8-00-007400 - The MySQL Database Server 8.0 and associated applications must reserve the use of dynamic code execution for situations that require it.DISA Oracle MySQL 8.0 v2r2 DBMySQLDB

SYSTEM AND INFORMATION INTEGRITY

MYS8-00-011100 - The MySQL Database Server 8.0 must automatically terminate a user session after organization-defined conditions or trigger events requiring session disconnect.DISA Oracle MySQL 8.0 v2r2 DBMySQLDB

ACCESS CONTROL

MYS8-00-012300 - Security-relevant software updates to the MySQL Database Server 8.0 must be installed within the time period directed by an authoritative source (e.g., IAVM, CTOs, DTMs, and STIGs).DISA Oracle MySQL 8.0 v2r2 DBMySQLDB

SYSTEM AND INFORMATION INTEGRITY

O19C-00-009300 - The Oracle SQL92_SECURITY parameter must be set to TRUE.DISA Oracle Database 19c STIG v1r3 OracleDBOracleDB

CONFIGURATION MANAGEMENT

O19C-00-010800 - The Oracle Database data files, transaction logs and audit files must be stored in dedicated directories or disk partitions separate from software or other application files.DISA Oracle Database 19c STIG v1r3 OracleDBOracleDB

CONFIGURATION MANAGEMENT

O19C-00-011200 - Network access to Oracle Database must be restricted to authorized personnel.DISA Oracle Database 19c STIG v1r3 WindowsWindows

CONFIGURATION MANAGEMENT

O19C-00-011700 - Network client connections must be restricted to supported versions.DISA Oracle Database 19c STIG v1r3 WindowsWindows

CONFIGURATION MANAGEMENT

O19C-00-015600 - Oracle Database must uniquely identify and authenticate nonorganizational users (or processes acting on behalf of nonorganizational users).DISA Oracle Database 19c STIG v1r3 OracleDBOracleDB

IDENTIFICATION AND AUTHENTICATION

O19C-00-017600 - Access to Oracle Database files must be limited to relevant processes and to authorized, administrative users.DISA Oracle Database 19c STIG v1r3 OracleDBOracleDB

SYSTEM AND COMMUNICATIONS PROTECTION

O19C-00-018000 - The database management system (DBMS) and associated applications must reserve the use of dynamic code execution for situations that require it.DISA Oracle Database 19c STIG v1r3 OracleDBOracleDB

SYSTEM AND INFORMATION INTEGRITY

O19C-00-018100 - The database management system (DBMS) and associated applications, when making use of dynamic code execution, must take steps against invalid values that may be used in a SQL injection attack, therefore resulting in steps to prevent a SQL injection attack.DISA Oracle Database 19c STIG v1r3 OracleDBOracleDB

SYSTEM AND INFORMATION INTEGRITY

OL6-00-000535 - The Oracle Linux operating system must restrict privilege elevation to authorized personnel - sudoers.dDISA STIG Oracle Linux 6 v2r7Unix

CONFIGURATION MANAGEMENT

OL07-00-010339 - The Oracle Linux operating system must specify the default 'include' directory for the /etc/sudoers file - include directory for the /etc/sudoers file.DISA Oracle Linux 7 STIG v3r5Unix

CONFIGURATION MANAGEMENT

OL07-00-010341 - The Oracle Linux operating system must restrict privilege elevation to authorized personnel.DISA Oracle Linux 7 STIG v3r5Unix

CONFIGURATION MANAGEMENT

OL07-00-010492 - Oracle Linux operating systems version 7.2 or newer booted with United Extensible Firmware Interface (UEFI) must have a unique name for the grub superusers account when booting into single-user mode and maintenance.DISA Oracle Linux 7 STIG v3r5Unix

ACCESS CONTROL

RHEL-07-010341 - The Red Hat Enterprise Linux operating system must restrict privilege elevation to authorized personnel.DISA Red Hat Enterprise Linux 7 STIG v3r15Unix

CONFIGURATION MANAGEMENT

SLES-15-010060 - The SUSE operating system file /etc/gdm/banner must contain the Standard Mandatory DoD Notice and Consent banner text.DISA SUSE Linux Enterprise Server 15 STIG v2r6Unix

ACCESS CONTROL

SLES-15-010120 - The SUSE operating system must initiate a session lock after a 15-minute period of inactivity for the graphical user interface (GUI).DISA SUSE Linux Enterprise Server 15 STIG v2r6Unix

ACCESS CONTROL

SLES-15-010130 - The SUSE operating system must initiate a session lock after a 10-minute period of inactivity.DISA SUSE Linux Enterprise Server 15 STIG v2r6Unix

ACCESS CONTROL

SLES-15-010340 - The SUSE operating system must generate error messages that provide information necessary for corrective actions without revealing information that could be exploited by adversaries.DISA SUSE Linux Enterprise Server 15 STIG v2r6Unix

SYSTEM AND INFORMATION INTEGRITY