| APPL-26-005056 - The macOS system must disable Unlock with Apple Watch during Setup Assistant. | DISA Apple macOS 26 Tahoe STIG v1r2 | Unix | CONFIGURATION MANAGEMENT |
| APPL-26-005060 - The macOS system must disable proximity-based password sharing requests. | DISA Apple macOS 26 Tahoe STIG v1r2 | Unix | CONFIGURATION MANAGEMENT |
| APPL-26-005110 - The macOS system must enforce enrollment in Mobile Device Management (MDM). | DISA Apple macOS 26 Tahoe STIG v1r2 | Unix | CONFIGURATION MANAGEMENT |
| APPL-26-005140 - The macOS system must disable Genmoji AI Creation. | DISA Apple macOS 26 Tahoe STIG v1r2 | Unix | CONFIGURATION MANAGEMENT |
| APPL-26-005160 - The macOS system must disable Apple Intelligence Writing Tools. | DISA Apple macOS 26 Tahoe STIG v1r2 | Unix | CONFIGURATION MANAGEMENT |
| O19C-00-001800 - Oracle Database must provide audit record generation capability for organization-defined auditable events within the database. | DISA Oracle Database 19c STIG v1r5 OracleDB | OracleDB | AUDIT AND ACCOUNTABILITY |
| O19C-00-002000 - Oracle Database must generate audit records for the DOD-selected list of auditable events, when successfully accessed, added, modified, or deleted, to the extent such information is available. | DISA Oracle Database 19c STIG v1r5 OracleDB | OracleDB | AUDIT AND ACCOUNTABILITY |
| O19C-00-008700 - Fixed user and PUBLIC Database links must be authorized for use. | DISA Oracle Database 19c STIG v1r5 OracleDB | OracleDB | CONFIGURATION MANAGEMENT |
| O19C-00-009800 - Object permissions granted to PUBLIC must be restricted. | DISA Oracle Database 19c STIG v1r5 OracleDB | OracleDB | CONFIGURATION MANAGEMENT |
| O19C-00-010400 - The directories assigned to the LOG_ARCHIVE_DEST* parameters must be protected from unauthorized access. | DISA Oracle Database 19c STIG v1r5 OracleDB | OracleDB | CONFIGURATION MANAGEMENT |
| O19C-00-010700 - Use of the Oracle Database installation account must be logged. | DISA Oracle Database 19c STIG v1r5 OracleDB | OracleDB | CONFIGURATION MANAGEMENT |
| O19C-00-011300 - Changes to configuration options must be audited. | DISA Oracle Database 19c STIG v1r5 OracleDB | OracleDB | CONFIGURATION MANAGEMENT |
| O19C-00-011600 - Remote administration must be disabled for the Oracle connection manager. | DISA Oracle Database 19c STIG v1r5 Windows | Windows | CONFIGURATION MANAGEMENT |
| O19C-00-013000 - Unused database components, database management system (DBMS) software, and database objects must be removed. | DISA Oracle Database 19c STIG v1r5 OracleDB | OracleDB | CONFIGURATION MANAGEMENT |
| O19C-00-017100 - Oracle Database must isolate security functions from nonsecurity functions by means of separate security domains. | DISA Oracle Database 19c STIG v1r5 OracleDB | OracleDB | SYSTEM AND COMMUNICATIONS PROTECTION |
| O19C-00-020400 - Oracle Database must include only approved trust anchors in trust stores or certificate stores managed by the organization. | DISA Oracle Database 19c STIG v1r5 Windows | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
| O19C-00-020500 - A minimum of three Oracle Control Files must be created and each stored on a separate physical and logical device. | DISA Oracle Database 19c STIG v1r5 OracleDB | OracleDB | CONFIGURATION MANAGEMENT |
| SQLD-22-000700 - SQL Server must allow only the information system security manager (ISSM) (or individuals or roles appointed by the ISSM) to select which auditable events are to be audited. | DISA Microsoft SQL Server 2022 Database STIG v1r3 | MS_SQLDB | AUDIT AND ACCOUNTABILITY |
| SQLI-22-004300 - SQL Server must be configured to generate audit records for DOD-defined auditable events within all DBMS/database components. | DISA Microsoft SQL Server 2022 Instance STIG v1r4 MS_SQLDB | MS_SQLDB | AUDIT AND ACCOUNTABILITY |
| SQLI-22-004600 - SQL Server must generate audit records when attempts to access privileges, categorized information, and security objects occur. | DISA Microsoft SQL Server 2022 Instance STIG v1r4 MS_SQLDB | MS_SQLDB | AUDIT AND ACCOUNTABILITY |
| SQLI-22-007300 - Access to common language runtime (CLR) code must be disabled or restricted unless specifically required and approved. | DISA Microsoft SQL Server 2022 Instance STIG v1r4 MS_SQLDB | MS_SQLDB | CONFIGURATION MANAGEMENT |
| SQLI-22-007500 - Access to linked servers must be disabled or restricted, unless specifically required and approved. | DISA Microsoft SQL Server 2022 Instance STIG v1r4 MS_SQLDB | MS_SQLDB | CONFIGURATION MANAGEMENT |
| SQLI-22-010010 - SQL Server and associated applications must reserve the use of dynamic code execution for situations that require it. | DISA Microsoft SQL Server 2022 Instance STIG v1r4 MS_SQLDB | MS_SQLDB | SYSTEM AND INFORMATION INTEGRITY |
| SQLI-22-012300 - SQL Server must maintain a separate execution domain for each executing process. | DISA Microsoft SQL Server 2022 Instance STIG v1r4 MS_SQLDB | MS_SQLDB | SYSTEM AND COMMUNICATIONS PROTECTION |
| SQLI-22-013800 - SQL Server must generate audit records when successful and unsuccessful attempts to modify or delete security objects occur. | DISA Microsoft SQL Server 2022 Instance STIG v1r4 MS_SQLDB | MS_SQLDB | AUDIT AND ACCOUNTABILITY |
| SQLI-22-016600 - The SQL Server Service Broker endpoint must use AES encryption. | DISA Microsoft SQL Server 2022 Instance STIG v1r4 MS_SQLDB | MS_SQLDB | CONFIGURATION MANAGEMENT |
| SQLI-22-017200 - The "Remote Access" feature must be disabled unless specifically required and approved. | DISA Microsoft SQL Server 2022 Instance STIG v1r4 MS_SQLDB | MS_SQLDB | CONFIGURATION MANAGEMENT |
| SQLI-22-017800 - The SQL Server Browser service must be disabled unless specifically required and approved. | DISA Microsoft SQL Server 2022 Instance STIG v1r4 Windows | Windows | CONFIGURATION MANAGEMENT |
| UBTU-22-232010 - Ubuntu 22.04 LTS must have directories that contain system commands set to a mode of "755" or less permissive. | DISA Canonical Ubuntu 22.04 LTS STIG v2r8 | Unix | AUDIT AND ACCOUNTABILITY |
| UBTU-22-232026 - Ubuntu 22.04 LTS must generate error messages that provide information necessary for corrective actions without revealing information that could be exploited by adversaries. | DISA Canonical Ubuntu 22.04 LTS STIG v2r8 | Unix | SYSTEM AND INFORMATION INTEGRITY |
| UBTU-22-232100 - Ubuntu 22.04 LTS must be configured so that the "journalctl" command is owned by "root". | DISA Canonical Ubuntu 22.04 LTS STIG v2r8 | Unix | SYSTEM AND INFORMATION INTEGRITY |
| UBTU-22-255030 - Ubuntu 22.04 LTS must be configured so that all network connections associated with SSH traffic terminate after becoming unresponsive. | DISA Canonical Ubuntu 22.04 LTS STIG v2r8 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
| UBTU-22-255045 - Ubuntu 22.04 LTS SSH daemon must prevent remote hosts from connecting to the proxy display. | DISA Canonical Ubuntu 22.04 LTS STIG v2r8 | Unix | CONFIGURATION MANAGEMENT |
| UBTU-22-255065 - Ubuntu 22.04 LTS must use strong authenticators in establishing nonlocal maintenance and diagnostic sessions. | DISA Canonical Ubuntu 22.04 LTS STIG v2r8 | Unix | MAINTENANCE |
| UBTU-22-271010 - Ubuntu 22.04 LTS must enable the graphical user logon banner to display the Standard Mandatory DOD Notice and Consent Banner before granting local access to the system via a graphical user logon. | DISA Canonical Ubuntu 22.04 LTS STIG v2r8 | Unix | ACCESS CONTROL |
| UBTU-22-653030 - Ubuntu 22.04 LTS must shut down by default upon audit failure. | DISA Canonical Ubuntu 22.04 LTS STIG v2r8 | Unix | AUDIT AND ACCOUNTABILITY |
| UBTU-22-653075 - Ubuntu 22.04 LTS must permit only authorized groups to own the audit configuration files. | DISA Canonical Ubuntu 22.04 LTS STIG v2r8 | Unix | AUDIT AND ACCOUNTABILITY |
| UBTU-22-654020 - Ubuntu 22.04 LTS must generate audit records for successful/unsuccessful uses of the chage command. | DISA Canonical Ubuntu 22.04 LTS STIG v2r8 | Unix | AUDIT AND ACCOUNTABILITY |
| UBTU-22-654040 - Ubuntu 22.04 LTS must generate audit records for successful/unsuccessful uses of the crontab command. | DISA Canonical Ubuntu 22.04 LTS STIG v2r8 | Unix | AUDIT AND ACCOUNTABILITY |
| UBTU-22-654065 - Ubuntu 22.04 LTS must generate audit records for successful/unsuccessful uses of the mount command. | DISA Canonical Ubuntu 22.04 LTS STIG v2r8 | Unix | AUDIT AND ACCOUNTABILITY |
| UBTU-22-654095 - Ubuntu 22.04 LTS must generate audit records for successful/unsuccessful uses of the ssh-keysign command. | DISA Canonical Ubuntu 22.04 LTS STIG v2r8 | Unix | AUDIT AND ACCOUNTABILITY |
| UBTU-22-654125 - Ubuntu 22.04 LTS must generate audit records for successful/unsuccessful uses of the usermod command. | DISA Canonical Ubuntu 22.04 LTS STIG v2r8 | Unix | AUDIT AND ACCOUNTABILITY |
| UBTU-22-654165 - Ubuntu 22.04 LTS must generate audit records for successful/unsuccessful uses of the creat, open, openat, open_by_handle_at, truncate, and ftruncate system calls. | DISA Canonical Ubuntu 22.04 LTS STIG v2r8 | Unix | AUDIT AND ACCOUNTABILITY |
| UBTU-22-654185 - Ubuntu 22.04 LTS must generate audit records for any successful/unsuccessful use of unlink, unlinkat, rename, renameat, and rmdir system calls. | DISA Canonical Ubuntu 22.04 LTS STIG v2r8 | Unix | AUDIT AND ACCOUNTABILITY |
| UBTU-22-654215 - Ubuntu 22.04 LTS must generate audit records for the use and modification of the lastlog file. | DISA Canonical Ubuntu 22.04 LTS STIG v2r8 | Unix | AUDIT AND ACCOUNTABILITY |
| UBTU-24-300023 - Ubuntu 24.04 LTS SSH daemon must prevent remote hosts from connecting to the proxy display. | DISA Canonical Ubuntu 24.04 LTS STIG v1r5 | Unix | CONFIGURATION MANAGEMENT |
| UBTU-24-500050 - Ubuntu 24.04 LTS must use strong authenticators in establishing nonlocal maintenance and diagnostic sessions. | DISA Canonical Ubuntu 24.04 LTS STIG v1r5 | Unix | MAINTENANCE |
| UBTU-24-600070 - Ubuntu 24.04 LTS must disable kernel core dumps. | DISA Canonical Ubuntu 24.04 LTS STIG v1r5 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
| UBTU-24-700040 - Ubuntu 24.04 LTS must be configured so that the "journalctl" command is owned by "root". | DISA Canonical Ubuntu 24.04 LTS STIG v1r5 | Unix | SYSTEM AND INFORMATION INTEGRITY |
| UBTU-24-700150 - Ubuntu 24.04 LTS must configure /var/log/syslog file with mode "0640" or less permissive. | DISA Canonical Ubuntu 24.04 LTS STIG v1r5 | Unix | SYSTEM AND INFORMATION INTEGRITY |