Item Search

NameAudit NamePluginCategory
AIOS-18-006800 - Apple iOS/iPadOS 18 must be configured to lock the display after 15 minutes (or less) of inactivity - or less of inactivity.AirWatch - DISA Apple iOS/iPadOS 18 v1r4MDM

ACCESS CONTROL

AIOS-18-007400 - The Apple iOS/iPadOS 18 allow list must be configured to not include applications with the following characteristics: - Backs up MD data to non-DOD cloud servers (including user and application access to cloud backup services); - Transmits MD diagnostic data to non-DOD servers; - Allows synchronization of data or applications between devices associated with user; - Allows unencrypted (or encrypted but not FIPS 140-3 validated) data sharing with other MDs or printers; - Backs up its own data to a remote system; and - Uses artificial intelligence (AI), which processes data in the cloud (off device). Exception: Apple Intelligence Private Cloud Compute (PCC) - allows unencrypted (or encrypted but not FIPS 140-2 validated) data sharing with other MDs or printers.AirWatch - DISA Apple iOS/iPadOS 18 v1r4MDM

IDENTIFICATION AND AUTHENTICATION

AIOS-18-009200 - Apple iOS/iPadOS 18 must be configured to not allow backup of [all applications, configuration data] to locally connected systems.AirWatch - DISA Apple iOS/iPadOS 18 v1r4MDM

SYSTEM AND COMMUNICATIONS PROTECTION

AIOS-18-010700 - Apple iOS/iPadOS 18 must implement the management setting: encrypt backups/Encrypt local backup.AirWatch - DISA Apple iOS/iPadOS 18 v1r4MDM

CONFIGURATION MANAGEMENT

AIOS-18-012000 - A managed photo app must be used to take and store work-related photos.AirWatch - DISA Apple iOS/iPadOS 18 v1r4MDM

CONFIGURATION MANAGEMENT

AIOS-18-012500 - Apple iOS/iPadOS 18 must implement the management setting: disable AirDrop.AirWatch - DISA Apple iOS/iPadOS 18 v1r4MDM

CONFIGURATION MANAGEMENT

AIOS-18-012600 - Apple iOS/iPadOS 18 must implement the management setting: disable paired Apple Watch.AirWatch - DISA Apple iOS/iPadOS 18 v1r4MDM

CONFIGURATION MANAGEMENT

AIOS-18-012800 - Apple iOS/iPadOS 18 must disable 'Allow setting up new nearby devices' - Allow setting up new nearby devices.AirWatch - DISA Apple iOS/iPadOS 18 v1r4MDM

CONFIGURATION MANAGEMENT

AIOS-18-013200 - The Apple iOS/iPadOS 18 must be supervised by the MDM.AirWatch - DISA Apple iOS/iPadOS 18 v1r4MDM

CONFIGURATION MANAGEMENT

CNTR-K8-000270 - The Kubernetes API Server must enable Node,RBAC as the authorization mode.DISA STIG Kubernetes v2r3Unix

ACCESS CONTROL

CNTR-K8-000300 - The Kubernetes Scheduler must have secure binding.DISA STIG Kubernetes v2r3Unix

ACCESS CONTROL

CNTR-K8-000450 - Kubernetes DynamicAuditing must not be enabled - manifestDISA STIG Kubernetes v2r3Unix

ACCESS CONTROL

CNTR-K8-000460 - Kubernetes DynamicKubeletConfig must not be enabled - kubeletDISA STIG Kubernetes v2r3Unix

ACCESS CONTROL

CNTR-K8-001300 - Kubernetes Kubelet must not disable timeouts.DISA STIG Kubernetes v2r3Unix

SYSTEM AND COMMUNICATIONS PROTECTION

CNTR-K8-001360 - Kubernetes must separate user functionality.DISA STIG Kubernetes v2r3Unix

SYSTEM AND COMMUNICATIONS PROTECTION

CNTR-K8-001430 - Kubernetes Controller Manager must have the SSL Certificate Authority set.DISA STIG Kubernetes v2r3Unix

SYSTEM AND COMMUNICATIONS PROTECTION

CNTR-K8-001440 - Kubernetes API Server must have a certificate for communication.DISA STIG Kubernetes v2r3Unix

SYSTEM AND COMMUNICATIONS PROTECTION

CNTR-K8-001470 - Kubernetes Kubelet must enable tlsCertFile for client authentication to secure service.DISA STIG Kubernetes v2r3Unix

SYSTEM AND COMMUNICATIONS PROTECTION

CNTR-K8-001490 - Kubernetes etcd must have a key file for secure communication.DISA STIG Kubernetes v2r3Unix

SYSTEM AND COMMUNICATIONS PROTECTION

CNTR-K8-001500 - Kubernetes etcd must have a certificate for communication.DISA STIG Kubernetes v2r3Unix

SYSTEM AND COMMUNICATIONS PROTECTION

CNTR-K8-001510 - Kubernetes etcd must have the SSL Certificate Authority set.DISA STIG Kubernetes v2r3Unix

SYSTEM AND COMMUNICATIONS PROTECTION

CNTR-K8-001540 - Kubernetes etcd must have peer-cert-file set for secure communication.DISA STIG Kubernetes v2r3Unix

SYSTEM AND COMMUNICATIONS PROTECTION

CNTR-K8-003120 - The Kubernetes component etcd must be owned by etcd.DISA STIG Kubernetes v2r3Unix

CONFIGURATION MANAGEMENT

CNTR-K8-003140 - The Kubernetes Kube Proxy kubeconfig must have file permissions set to 644 or more restrictive.DISA STIG Kubernetes v2r3Unix

CONFIGURATION MANAGEMENT

CNTR-K8-003170 - The Kubernetes Kubelet certificate authority must be owned by root.DISA STIG Kubernetes v2r3Unix

CONFIGURATION MANAGEMENT

CNTR-K8-003300 - The Kubernetes API Server must be set to audit log maximum backup.DISA STIG Kubernetes v2r3Unix

CONFIGURATION MANAGEMENT

CNTR-K8-003330 - The Kubernetes PKI CRT must have file permissions set to 644 or more restrictive.DISA STIG Kubernetes v2r3Unix

CONFIGURATION MANAGEMENT

JUEX-NM-000150 - The Juniper EX switch must be configured to produce audit log records containing information to establish the source of events.DISA Juniper EX Series Network Device Management v2r3Juniper

AUDIT AND ACCOUNTABILITY

JUEX-NM-000190 - The Juniper EX switch must be configured to protect audit information from unauthorized modification.DISA Juniper EX Series Network Device Management v2r3Juniper

AUDIT AND ACCOUNTABILITY

JUEX-NM-000210 - The Juniper EX switch must be configured to protect audit tools from unauthorized access.DISA Juniper EX Series Network Device Management v2r3Juniper

AUDIT AND ACCOUNTABILITY

JUEX-NM-000440 - The Juniper EX switch must be configured to record time stamps for audit records that can be mapped to Coordinated Universal Time (UTC) or Greenwich Mean Time (GMT).DISA Juniper EX Series Network Device Management v2r3Juniper

AUDIT AND ACCOUNTABILITY

WN22-00-000200 - Windows Server 2022 accounts must require passwords.DISA Microsoft Windows Server 2022 STIG v2r4Windows

IDENTIFICATION AND AUTHENTICATION

WN22-00-000240 - Windows Server 2022 must have software certificate installation files removed.DISA Microsoft Windows Server 2022 STIG v2r4Windows

CONFIGURATION MANAGEMENT

WN22-00-000350 - Windows Server 2022 must not have Simple TCP/IP Services installed.DISA Microsoft Windows Server 2022 STIG v2r4Windows

CONFIGURATION MANAGEMENT

WN22-00-000460 - Windows Server 2022 systems must have Unified Extensible Firmware Interface (UEFI) firmware and be configured to run in UEFI mode, not Legacy BIOS.DISA Microsoft Windows Server 2022 STIG v2r4Windows

CONFIGURATION MANAGEMENT

WN22-AU-000170 - Windows Server 2022 must be configured to audit Logon/Logoff - Group Membership successes.DISA Microsoft Windows Server 2022 STIG v2r4Windows

AUDIT AND ACCOUNTABILITY

WN22-CC-000100 - Windows Server 2022 must be configured to enable Remote host allows delegation of nonexportable credentials.DISA Microsoft Windows Server 2022 STIG v2r4Windows

CONFIGURATION MANAGEMENT

WN22-CC-000110 - Windows Server 2022 virtualization-based security must be enabled with the platform security level configured to Secure Boot or Secure Boot with DMA Protection.DISA Microsoft Windows Server 2022 STIG v2r4Windows

CONFIGURATION MANAGEMENT

WN22-CC-000290 - Windows Server 2022 System event log size must be configured to 32768 KB or greater.DISA Microsoft Windows Server 2022 STIG v2r4Windows

AUDIT AND ACCOUNTABILITY

WN22-CC-000330 - Windows Server 2022 File Explorer shell protocol must run in protected mode.DISA Microsoft Windows Server 2022 STIG v2r4Windows

CONFIGURATION MANAGEMENT

WN22-CC-000350 - Windows Server 2022 Remote Desktop Services must prevent drive redirection.DISA Microsoft Windows Server 2022 STIG v2r4Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WN22-DC-000340 - Windows Server 2022 Access this computer from the network user right must only be assigned to the Administrators, Authenticated Users, and Enterprise Domain Controllers groups on domain controllers.DISA Microsoft Windows Server 2022 STIG v2r4Windows

ACCESS CONTROL

WN22-DC-000360 - Windows Server 2022 Allow log on through Remote Desktop Services user right must only be assigned to the Administrators group on domain controllers.DISA Microsoft Windows Server 2022 STIG v2r4Windows

ACCESS CONTROL

WN22-DC-000370 - Windows Server 2022 Deny access to this computer from the network user right on domain controllers must be configured to prevent unauthenticated access.DISA Microsoft Windows Server 2022 STIG v2r4Windows

ACCESS CONTROL

WN22-DC-000400 - Windows Server 2022 Deny log on locally user right on domain controllers must be configured to prevent unauthenticated access.DISA Microsoft Windows Server 2022 STIG v2r4Windows

ACCESS CONTROL

WN22-MS-000030 - Windows Server 2022 local users on domain-joined member servers must not be enumerated.DISA Microsoft Windows Server 2022 STIG v2r4Windows

CONFIGURATION MANAGEMENT

WN22-MS-000080 - Windows Server 2022 Deny access to this computer from the network user right on domain-joined member servers must be configured to prevent access from highly privileged domain accounts and local accounts and from unauthenticated access on all systems.DISA Microsoft Windows Server 2022 STIG v2r4Windows

ACCESS CONTROL

WN22-SO-000010 - Windows Server 2022 must have the built-in guest account disabled.DISA Microsoft Windows Server 2022 STIG v2r4Windows

IDENTIFICATION AND AUTHENTICATION

WN22-SO-000380 - Windows Server 2022 User Account Control (UAC) approval mode for the built-in Administrator must be enabled.DISA Microsoft Windows Server 2022 STIG v2r4Windows

IDENTIFICATION AND AUTHENTICATION

WN22-SO-000450 - Windows Server 2022 User Account Control (UAC) must virtualize file and registry write failures to per-user locations.DISA Microsoft Windows Server 2022 STIG v2r4Windows

SYSTEM AND COMMUNICATIONS PROTECTION