Item Search

NameAudit NamePluginCategory
APPL-26-005056 - The macOS system must disable Unlock with Apple Watch during Setup Assistant.DISA Apple macOS 26 Tahoe STIG v1r2Unix

CONFIGURATION MANAGEMENT

APPL-26-005060 - The macOS system must disable proximity-based password sharing requests.DISA Apple macOS 26 Tahoe STIG v1r2Unix

CONFIGURATION MANAGEMENT

APPL-26-005110 - The macOS system must enforce enrollment in Mobile Device Management (MDM).DISA Apple macOS 26 Tahoe STIG v1r2Unix

CONFIGURATION MANAGEMENT

APPL-26-005140 - The macOS system must disable Genmoji AI Creation.DISA Apple macOS 26 Tahoe STIG v1r2Unix

CONFIGURATION MANAGEMENT

APPL-26-005160 - The macOS system must disable Apple Intelligence Writing Tools.DISA Apple macOS 26 Tahoe STIG v1r2Unix

CONFIGURATION MANAGEMENT

O19C-00-001800 - Oracle Database must provide audit record generation capability for organization-defined auditable events within the database.DISA Oracle Database 19c STIG v1r5 OracleDBOracleDB

AUDIT AND ACCOUNTABILITY

O19C-00-002000 - Oracle Database must generate audit records for the DOD-selected list of auditable events, when successfully accessed, added, modified, or deleted, to the extent such information is available.DISA Oracle Database 19c STIG v1r5 OracleDBOracleDB

AUDIT AND ACCOUNTABILITY

O19C-00-008700 - Fixed user and PUBLIC Database links must be authorized for use.DISA Oracle Database 19c STIG v1r5 OracleDBOracleDB

CONFIGURATION MANAGEMENT

O19C-00-009800 - Object permissions granted to PUBLIC must be restricted.DISA Oracle Database 19c STIG v1r5 OracleDBOracleDB

CONFIGURATION MANAGEMENT

O19C-00-010400 - The directories assigned to the LOG_ARCHIVE_DEST* parameters must be protected from unauthorized access.DISA Oracle Database 19c STIG v1r5 OracleDBOracleDB

CONFIGURATION MANAGEMENT

O19C-00-010700 - Use of the Oracle Database installation account must be logged.DISA Oracle Database 19c STIG v1r5 OracleDBOracleDB

CONFIGURATION MANAGEMENT

O19C-00-011300 - Changes to configuration options must be audited.DISA Oracle Database 19c STIG v1r5 OracleDBOracleDB

CONFIGURATION MANAGEMENT

O19C-00-011600 - Remote administration must be disabled for the Oracle connection manager.DISA Oracle Database 19c STIG v1r5 WindowsWindows

CONFIGURATION MANAGEMENT

O19C-00-013000 - Unused database components, database management system (DBMS) software, and database objects must be removed.DISA Oracle Database 19c STIG v1r5 OracleDBOracleDB

CONFIGURATION MANAGEMENT

O19C-00-017100 - Oracle Database must isolate security functions from nonsecurity functions by means of separate security domains.DISA Oracle Database 19c STIG v1r5 OracleDBOracleDB

SYSTEM AND COMMUNICATIONS PROTECTION

O19C-00-020400 - Oracle Database must include only approved trust anchors in trust stores or certificate stores managed by the organization.DISA Oracle Database 19c STIG v1r5 WindowsWindows

SYSTEM AND COMMUNICATIONS PROTECTION

O19C-00-020500 - A minimum of three Oracle Control Files must be created and each stored on a separate physical and logical device.DISA Oracle Database 19c STIG v1r5 OracleDBOracleDB

CONFIGURATION MANAGEMENT

SQLD-22-000700 - SQL Server must allow only the information system security manager (ISSM) (or individuals or roles appointed by the ISSM) to select which auditable events are to be audited.DISA Microsoft SQL Server 2022 Database STIG v1r3MS_SQLDB

AUDIT AND ACCOUNTABILITY

SQLI-22-004300 - SQL Server must be configured to generate audit records for DOD-defined auditable events within all DBMS/database components.DISA Microsoft SQL Server 2022 Instance STIG v1r4 MS_SQLDBMS_SQLDB

AUDIT AND ACCOUNTABILITY

SQLI-22-004600 - SQL Server must generate audit records when attempts to access privileges, categorized information, and security objects occur.DISA Microsoft SQL Server 2022 Instance STIG v1r4 MS_SQLDBMS_SQLDB

AUDIT AND ACCOUNTABILITY

SQLI-22-007300 - Access to common language runtime (CLR) code must be disabled or restricted unless specifically required and approved.DISA Microsoft SQL Server 2022 Instance STIG v1r4 MS_SQLDBMS_SQLDB

CONFIGURATION MANAGEMENT

SQLI-22-007500 - Access to linked servers must be disabled or restricted, unless specifically required and approved.DISA Microsoft SQL Server 2022 Instance STIG v1r4 MS_SQLDBMS_SQLDB

CONFIGURATION MANAGEMENT

SQLI-22-010010 - SQL Server and associated applications must reserve the use of dynamic code execution for situations that require it.DISA Microsoft SQL Server 2022 Instance STIG v1r4 MS_SQLDBMS_SQLDB

SYSTEM AND INFORMATION INTEGRITY

SQLI-22-012300 - SQL Server must maintain a separate execution domain for each executing process.DISA Microsoft SQL Server 2022 Instance STIG v1r4 MS_SQLDBMS_SQLDB

SYSTEM AND COMMUNICATIONS PROTECTION

SQLI-22-013800 - SQL Server must generate audit records when successful and unsuccessful attempts to modify or delete security objects occur.DISA Microsoft SQL Server 2022 Instance STIG v1r4 MS_SQLDBMS_SQLDB

AUDIT AND ACCOUNTABILITY

SQLI-22-016600 - The SQL Server Service Broker endpoint must use AES encryption.DISA Microsoft SQL Server 2022 Instance STIG v1r4 MS_SQLDBMS_SQLDB

CONFIGURATION MANAGEMENT

SQLI-22-017200 - The "Remote Access" feature must be disabled unless specifically required and approved.DISA Microsoft SQL Server 2022 Instance STIG v1r4 MS_SQLDBMS_SQLDB

CONFIGURATION MANAGEMENT

SQLI-22-017800 - The SQL Server Browser service must be disabled unless specifically required and approved.DISA Microsoft SQL Server 2022 Instance STIG v1r4 WindowsWindows

CONFIGURATION MANAGEMENT

UBTU-22-232010 - Ubuntu 22.04 LTS must have directories that contain system commands set to a mode of "755" or less permissive.DISA Canonical Ubuntu 22.04 LTS STIG v2r8Unix

AUDIT AND ACCOUNTABILITY

UBTU-22-232026 - Ubuntu 22.04 LTS must generate error messages that provide information necessary for corrective actions without revealing information that could be exploited by adversaries.DISA Canonical Ubuntu 22.04 LTS STIG v2r8Unix

SYSTEM AND INFORMATION INTEGRITY

UBTU-22-232100 - Ubuntu 22.04 LTS must be configured so that the "journalctl" command is owned by "root".DISA Canonical Ubuntu 22.04 LTS STIG v2r8Unix

SYSTEM AND INFORMATION INTEGRITY

UBTU-22-255030 - Ubuntu 22.04 LTS must be configured so that all network connections associated with SSH traffic terminate after becoming unresponsive.DISA Canonical Ubuntu 22.04 LTS STIG v2r8Unix

SYSTEM AND COMMUNICATIONS PROTECTION

UBTU-22-255045 - Ubuntu 22.04 LTS SSH daemon must prevent remote hosts from connecting to the proxy display.DISA Canonical Ubuntu 22.04 LTS STIG v2r8Unix

CONFIGURATION MANAGEMENT

UBTU-22-255065 - Ubuntu 22.04 LTS must use strong authenticators in establishing nonlocal maintenance and diagnostic sessions.DISA Canonical Ubuntu 22.04 LTS STIG v2r8Unix

MAINTENANCE

UBTU-22-271010 - Ubuntu 22.04 LTS must enable the graphical user logon banner to display the Standard Mandatory DOD Notice and Consent Banner before granting local access to the system via a graphical user logon.DISA Canonical Ubuntu 22.04 LTS STIG v2r8Unix

ACCESS CONTROL

UBTU-22-653030 - Ubuntu 22.04 LTS must shut down by default upon audit failure.DISA Canonical Ubuntu 22.04 LTS STIG v2r8Unix

AUDIT AND ACCOUNTABILITY

UBTU-22-653075 - Ubuntu 22.04 LTS must permit only authorized groups to own the audit configuration files.DISA Canonical Ubuntu 22.04 LTS STIG v2r8Unix

AUDIT AND ACCOUNTABILITY

UBTU-22-654020 - Ubuntu 22.04 LTS must generate audit records for successful/unsuccessful uses of the chage command.DISA Canonical Ubuntu 22.04 LTS STIG v2r8Unix

AUDIT AND ACCOUNTABILITY

UBTU-22-654040 - Ubuntu 22.04 LTS must generate audit records for successful/unsuccessful uses of the crontab command.DISA Canonical Ubuntu 22.04 LTS STIG v2r8Unix

AUDIT AND ACCOUNTABILITY

UBTU-22-654065 - Ubuntu 22.04 LTS must generate audit records for successful/unsuccessful uses of the mount command.DISA Canonical Ubuntu 22.04 LTS STIG v2r8Unix

AUDIT AND ACCOUNTABILITY

UBTU-22-654095 - Ubuntu 22.04 LTS must generate audit records for successful/unsuccessful uses of the ssh-keysign command.DISA Canonical Ubuntu 22.04 LTS STIG v2r8Unix

AUDIT AND ACCOUNTABILITY

UBTU-22-654125 - Ubuntu 22.04 LTS must generate audit records for successful/unsuccessful uses of the usermod command.DISA Canonical Ubuntu 22.04 LTS STIG v2r8Unix

AUDIT AND ACCOUNTABILITY

UBTU-22-654165 - Ubuntu 22.04 LTS must generate audit records for successful/unsuccessful uses of the creat, open, openat, open_by_handle_at, truncate, and ftruncate system calls.DISA Canonical Ubuntu 22.04 LTS STIG v2r8Unix

AUDIT AND ACCOUNTABILITY

UBTU-22-654185 - Ubuntu 22.04 LTS must generate audit records for any successful/unsuccessful use of unlink, unlinkat, rename, renameat, and rmdir system calls.DISA Canonical Ubuntu 22.04 LTS STIG v2r8Unix

AUDIT AND ACCOUNTABILITY

UBTU-22-654215 - Ubuntu 22.04 LTS must generate audit records for the use and modification of the lastlog file.DISA Canonical Ubuntu 22.04 LTS STIG v2r8Unix

AUDIT AND ACCOUNTABILITY

UBTU-24-300023 - Ubuntu 24.04 LTS SSH daemon must prevent remote hosts from connecting to the proxy display.DISA Canonical Ubuntu 24.04 LTS STIG v1r5Unix

CONFIGURATION MANAGEMENT

UBTU-24-500050 - Ubuntu 24.04 LTS must use strong authenticators in establishing nonlocal maintenance and diagnostic sessions.DISA Canonical Ubuntu 24.04 LTS STIG v1r5Unix

MAINTENANCE

UBTU-24-600070 - Ubuntu 24.04 LTS must disable kernel core dumps.DISA Canonical Ubuntu 24.04 LTS STIG v1r5Unix

SYSTEM AND COMMUNICATIONS PROTECTION

UBTU-24-700040 - Ubuntu 24.04 LTS must be configured so that the "journalctl" command is owned by "root".DISA Canonical Ubuntu 24.04 LTS STIG v1r5Unix

SYSTEM AND INFORMATION INTEGRITY

UBTU-24-700150 - Ubuntu 24.04 LTS must configure /var/log/syslog file with mode "0640" or less permissive.DISA Canonical Ubuntu 24.04 LTS STIG v1r5Unix

SYSTEM AND INFORMATION INTEGRITY