Item Search

NameAudit NamePluginCategory
1.3 APPL-14-000003CIS Apple macOS 14 (Sonoma) STIG v1.0.0 CAT IIUnix

ACCESS CONTROL

1.17 APPL-14-000052CIS Apple macOS 14 (Sonoma) STIG v1.0.0 CAT IIUnix

SYSTEM AND COMMUNICATIONS PROTECTION

1.18 APPL-14-000053CIS Apple macOS 14 (Sonoma) STIG v1.0.0 CAT IIUnix

SYSTEM AND COMMUNICATIONS PROTECTION

1.22 APPL-14-000070CIS Apple macOS 14 (Sonoma) STIG v1.0.0 CAT IIUnix

ACCESS CONTROL

1.122 APPL-14-003013CIS Apple macOS 14 (Sonoma) STIG v1.0.0 CAT IIUnix

CONFIGURATION MANAGEMENT

1.141 APPL-14-005050CIS Apple macOS 14 (Sonoma) STIG v1.0.0 CAT IIUnix

CONFIGURATION MANAGEMENT

O19C-00-000100 - Oracle Database must limit the number of concurrent sessions for each system account to an organization-defined number of sessions.DISA Oracle Database 19c STIG v1r2 OracleDBOracleDB

ACCESS CONTROL

O19C-00-000200 - Oracle Database must protect against or limit the effects of organization-defined types of denial-of-service (DoS) attacks.DISA Oracle Database 19c STIG v1r2 WindowsWindows

ACCESS CONTROL

O19C-00-008400 - Oracle Database must be configured in accordance with the security configuration settings based on DOD security configuration and implementation guidance, including STIGs, NSA configuration guides, CTOs, DTMs, and IAVMs.DISA Oracle Database 19c STIG v1r2 OracleDBOracleDB

CONFIGURATION MANAGEMENT

O19C-00-008600 - Oracle instance names must not contain Oracle version numbers.DISA Oracle Database 19c STIG v1r2 OracleDBOracleDB

CONFIGURATION MANAGEMENT

O19C-00-010100 - Oracle application administration roles must be disabled if not required and authorized.DISA Oracle Database 19c STIG v1r2 OracleDBOracleDB

CONFIGURATION MANAGEMENT

O19C-00-010600 - Oracle Database production application and data directories must be protected from developers on shared production/development database management system (DBMS) host systems.DISA Oracle Database 19c STIG v1r2 OracleDBOracleDB

CONFIGURATION MANAGEMENT

O19C-00-011500 - The /diag subdirectory under the directory assigned to the DIAGNOSTIC_DEST parameter must be protected from unauthorized access.DISA Oracle Database 19c STIG v1r2 WindowsWindows

CONFIGURATION MANAGEMENT

O19C-00-011600 - Remote administration must be disabled for the Oracle connection manager.DISA Oracle Database 19c STIG v1r2 WindowsWindows

CONFIGURATION MANAGEMENT

O19C-00-011700 - Network client connections must be restricted to supported versions.DISA Oracle Database 19c STIG v1r2 WindowsWindows

CONFIGURATION MANAGEMENT

O19C-00-012000 - Oracle Database must provide a mechanism to automatically identify accounts designated as temporary or emergency accounts.DISA Oracle Database 19c STIG v1r2 OracleDBOracleDB

CONFIGURATION MANAGEMENT

O19C-00-013400 - Access to external executables must be disabled or restricted.DISA Oracle Database 19c STIG v1r2 WindowsWindows

CONFIGURATION MANAGEMENT

O19C-00-016700 - Oracle Database must preserve any organization-defined system state information in the event of a system failure.DISA Oracle Database 19c STIG v1r2 OracleDBOracleDB

SYSTEM AND COMMUNICATIONS PROTECTION

O19C-00-017100 - Oracle Database must isolate security functions from nonsecurity functions by means of separate security domains.DISA Oracle Database 19c STIG v1r2 OracleDBOracleDB

SYSTEM AND COMMUNICATIONS PROTECTION

O19C-00-018300 - Oracle Database must only generate error messages that provide information necessary for corrective actions without revealing organization-defined sensitive or potentially harmful information in error logs and administrative messages that could be exploited.DISA Oracle Database 19c STIG v1r2 OracleDBOracleDB

SYSTEM AND INFORMATION INTEGRITY

RHEL-08-020300 - RHEL 8 must prevent the use of dictionary words for passwords.DISA Red Hat Enterprise Linux 8 STIG v2r4Unix

CONFIGURATION MANAGEMENT

RHEL-08-020310 - RHEL 8 must enforce a delay of at least four seconds between logon prompts following a failed logon attempt.DISA Red Hat Enterprise Linux 8 STIG v2r4Unix

CONFIGURATION MANAGEMENT

RHEL-08-020350 - RHEL 8 must display the date and time of the last successful account logon upon an SSH logon.DISA Red Hat Enterprise Linux 8 STIG v2r4Unix

ACCESS CONTROL

RHEL-08-030020 - The RHEL 8 System Administrator (SA) and Information System Security Officer (ISSO) (at a minimum) must be alerted of an audit processing failure event.DISA Red Hat Enterprise Linux 8 STIG v2r4Unix

AUDIT AND ACCOUNTABILITY

RHEL-08-030130 - RHEL 8 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/shadow.DISA Red Hat Enterprise Linux 8 STIG v2r4Unix

AUDIT AND ACCOUNTABILITY

RHEL-08-030172 - RHEL 8 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/sudoers.d/.DISA Red Hat Enterprise Linux 8 STIG v2r4Unix

AUDIT AND ACCOUNTABILITY

RHEL-08-030180 - The RHEL 8 audit package must be installed.DISA Red Hat Enterprise Linux 8 STIG v2r4Unix

AUDIT AND ACCOUNTABILITY

RHEL-08-030181 - RHEL 8 audit records must contain information to establish what type of events occurred, the source of events, where events occurred, and the outcome of events.DISA Red Hat Enterprise Linux 8 STIG v2r4Unix

AUDIT AND ACCOUNTABILITY

RHEL-08-030190 - Successful/unsuccessful uses of the su command in RHEL 8 must generate an audit record.DISA Red Hat Enterprise Linux 8 STIG v2r4Unix

AUDIT AND ACCOUNTABILITY

RHEL-08-030313 - Successful/unsuccessful uses of semanage in RHEL 8 must generate an audit record.DISA Red Hat Enterprise Linux 8 STIG v2r4Unix

AUDIT AND ACCOUNTABILITY

RHEL-08-030330 - Successful/unsuccessful uses of the setfacl command in RHEL 8 must generate an audit record.DISA Red Hat Enterprise Linux 8 STIG v2r4Unix

AUDIT AND ACCOUNTABILITY

RHEL-08-030340 - Successful/unsuccessful uses of the pam_timestamp_check command in RHEL 8 must generate an audit record.DISA Red Hat Enterprise Linux 8 STIG v2r4Unix

AUDIT AND ACCOUNTABILITY

RHEL-08-030400 - Successful/unsuccessful uses of the crontab command in RHEL 8 must generate an audit record.DISA Red Hat Enterprise Linux 8 STIG v2r4Unix

AUDIT AND ACCOUNTABILITY

RHEL-08-030610 - RHEL 8 must allow only the Information System Security Manager (ISSM) (or individuals or roles appointed by the ISSM) to select which auditable events are to be audited.DISA Red Hat Enterprise Linux 8 STIG v2r4Unix

AUDIT AND ACCOUNTABILITY

RHEL-08-030640 - RHEL 8 audit tools must be group-owned by root.DISA Red Hat Enterprise Linux 8 STIG v2r4Unix

AUDIT AND ACCOUNTABILITY

RHEL-08-040020 - RHEL 8 must cover or disable the built-in or attached camera when not in use.DISA Red Hat Enterprise Linux 8 STIG v2r4Unix

CONFIGURATION MANAGEMENT

RHEL-08-040030 - RHEL 8 must be configured to prohibit or restrict the use of functions, ports, protocols, and/or services, as defined in the Ports, Protocols, and Services Management (PPSM) Category Assignments List (CAL) and vulnerability assessments.DISA Red Hat Enterprise Linux 8 STIG v2r4Unix

CONFIGURATION MANAGEMENT

RHEL-08-040070 - The RHEL 8 file system automounter must be disabled unless required.DISA Red Hat Enterprise Linux 8 STIG v2r4Unix

IDENTIFICATION AND AUTHENTICATION

RHEL-08-040080 - RHEL 8 must be configured to disable USB mass storage.DISA Red Hat Enterprise Linux 8 STIG v2r4Unix

IDENTIFICATION AND AUTHENTICATION

RHEL-08-040150 - A firewall must be able to protect against or limit the effects of Denial of Service (DoS) attacks by ensuring RHEL 8 can implement rate-limiting measures on impacted network interfaces.DISA Red Hat Enterprise Linux 8 STIG v2r4Unix

SYSTEM AND COMMUNICATIONS PROTECTION

RHEL-08-040240 - RHEL 8 must not forward IPv6 source-routed packets.DISA Red Hat Enterprise Linux 8 STIG v2r4Unix

CONFIGURATION MANAGEMENT

RHEL-08-040250 - RHEL 8 must not forward IPv6 source-routed packets by default.DISA Red Hat Enterprise Linux 8 STIG v2r4Unix

CONFIGURATION MANAGEMENT

RHEL-08-040260 - RHEL 8 must not enable IPv6 packet forwarding unless the system is a router.DISA Red Hat Enterprise Linux 8 STIG v2r4Unix

CONFIGURATION MANAGEMENT

RHEL-08-040261 - RHEL 8 must not accept router advertisements on all IPv6 interfaces.DISA Red Hat Enterprise Linux 8 STIG v2r4Unix

CONFIGURATION MANAGEMENT

RHEL-08-040285 - RHEL 8 must use reverse path filtering on all IPv4 interfaces.DISA Red Hat Enterprise Linux 8 STIG v2r4Unix

CONFIGURATION MANAGEMENT

RHEL-08-040286 - RHEL 8 must enable hardening for the Berkeley Packet Filter Just-in-time compiler.DISA Red Hat Enterprise Linux 8 STIG v2r4Unix

CONFIGURATION MANAGEMENT

RHEL-08-040290 - RHEL 8 must be configured to prevent unrestricted mail relaying.DISA Red Hat Enterprise Linux 8 STIG v2r4Unix

CONFIGURATION MANAGEMENT

RHEL-08-040321 - The graphical display manager must not be the default target on RHEL 8 unless approved.DISA Red Hat Enterprise Linux 8 STIG v2r4Unix

CONFIGURATION MANAGEMENT

RHEL-08-040350 - If the Trivial File Transfer Protocol (TFTP) server is required, the RHEL 8 TFTP daemon must be configured to operate in secure mode.DISA Red Hat Enterprise Linux 8 STIG v2r4Unix

CONFIGURATION MANAGEMENT

RHEL-08-040390 - The tuned package must not be installed unless mission essential on RHEL 8.DISA Red Hat Enterprise Linux 8 STIG v2r4Unix

CONFIGURATION MANAGEMENT