1.1 Ensure packages are obtained from authorized repositories | CIS PostgreSQL 10 OS v1.0.0 | Unix | CONFIGURATION MANAGEMENT |
1.1 Ensure packages are obtained from authorized repositories | CIS PostgreSQL 9.6 OS v1.0.0 | Unix | CONFIGURATION MANAGEMENT |
1.4.4 Ensure UEFI requires authentication for single-user and maintenance modes - password | CIS Amazon Linux 2 STIG v1.0.0 L3 | Unix | CONFIGURATION MANAGEMENT |
1.4.4 Ensure UEFI requires authentication for single-user and maintenance modes - superusers | CIS Amazon Linux 2 STIG v1.0.0 L3 | Unix | CONFIGURATION MANAGEMENT |
1.4.6 Ensure version 7.2 or newer booted with UEFI have a unique name for the grub superusers account - UEFI must have a unique name for the grub superusers account when booting into single-user mode and maintenance. | CIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIG | Unix | ACCESS CONTROL |
2.5 Autologout - 'autologout.console.timeout <= 5' | TNS NetApp Data ONTAP 7G | NetApp | ACCESS CONTROL |
3.2.6 CDE - remote GUI login disabled - remote GUI login disabled | CIS IBM AIX 7.1 L2 v2.1.0 | Unix | CONFIGURATION MANAGEMENT |
4.7.1.6 Ensure CDE remote GUI login is disabled | CIS IBM AIX 7 v1.0.0 L1 | Unix | CONFIGURATION MANAGEMENT |
5 - Granular Log Levels | TNS Best Practice JBoss 7 Linux | Unix | AUDIT AND ACCOUNTABILITY |
CD12-00-008000 - PostgreSQL must implement NIST FIPS 140-2 or 140-3 validated cryptographic modules to generate and validate cryptographic hashes. | DISA STIG Crunchy Data PostgreSQL OS v3r1 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
CD12-00-008200 - PostgreSQL must implement NIST FIPS 140-2 or 140-3 validated cryptographic modules to protect unclassified information requiring confidentiality and cryptographic protection, in accordance with the data owner's requirements. | DISA STIG Crunchy Data PostgreSQL OS v3r1 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
GEN005160 - Any X Windows host must write .Xauthority files. | DISA STIG for Oracle Linux 5 v2r1 | Unix | CONFIGURATION MANAGEMENT |
GEN005200 - X displays must not be exported to the world. | DISA STIG Solaris 10 X86 v2r4 | Unix | CONFIGURATION MANAGEMENT |
GEN005200 - X displays must not be exported to the world. | DISA STIG Solaris 10 SPARC v2r4 | Unix | CONFIGURATION MANAGEMENT |
GEN005200 - X displays must not be exported to the world. | DISA STIG AIX 5.3 v1r2 | Unix | ACCESS CONTROL |
GEN005200 - X displays must not be exported to the world. | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
GEN005200 - X displays must not be exported to the world. | DISA STIG AIX 6.1 v1r14 | Unix | ACCESS CONTROL |
GEN005240 - The .Xauthority utility must only permit access to authorized hosts. | DISA STIG AIX 5.3 v1r2 | Unix | ACCESS CONTROL |
GEN005240 - The .Xauthority utility must only permit access to authorized hosts. | DISA STIG AIX 6.1 v1r14 | Unix | ACCESS CONTROL |
GEN005260 - X Window System connections not required must be disabled. | DISA STIG AIX 6.1 v1r14 | Unix | ACCESS CONTROL |
GEN005260 - X Window System connections not required must be disabled. | DISA STIG AIX 5.3 v1r2 | Unix | ACCESS CONTROL |
GEN005260 - X Window System connections that are not required must be disabled. | DISA STIG Solaris 10 SPARC v2r4 | Unix | CONFIGURATION MANAGEMENT |
OL08-00-010140 - OL 8 operating systems booted with United Extensible Firmware Interface (UEFI) must require authentication upon booting into single-user mode and maintenance. | DISA Oracle Linux 8 STIG v2r4 | Unix | ACCESS CONTROL |
RHEL-07-010019 - The Red Hat Enterprise Linux operating system must ensure cryptographic verification of vendor software packages. | DISA Red Hat Enterprise Linux 7 STIG v3r15 | Unix | CONFIGURATION MANAGEMENT |
RHEL-07-010491 - Red Hat Enterprise Linux operating systems version 7.2 or newer using Unified Extensible Firmware Interface (UEFI) must require authentication upon booting into single-user and maintenance modes. | DISA Red Hat Enterprise Linux 7 STIG v3r15 | Unix | ACCESS CONTROL |
RHEL-08-010019 - RHEL 8 must ensure cryptographic verification of vendor software packages. | DISA Red Hat Enterprise Linux 8 STIG v2r3 | Unix | CONFIGURATION MANAGEMENT |
RHEL-09-214010 - RHEL 9 must ensure cryptographic verification of vendor software packages. | DISA Red Hat Enterprise Linux 9 STIG v2r4 | Unix | CONFIGURATION MANAGEMENT |
SOL-11.1-020560 - X Window System connections that are not required must be disabled. | DISA STIG Solaris 11 X86 v3r1 | Unix | CONFIGURATION MANAGEMENT |
SOL-11.1-020560 - X Window System connections that are not required must be disabled. | DISA STIG Solaris 11 SPARC v3r1 | Unix | CONFIGURATION MANAGEMENT |
vCenter : config-ntp | VMWare vSphere 5.X Hardening Guide | VMware | AUDIT AND ACCOUNTABILITY |
vCenter : limit-user-login | VMWare vSphere 5.X Hardening Guide | VMware | |
vCenter : monitor-certificate-access | VMWare vSphere 5.X Hardening Guide | VMware | |
vCenter : remove-expired-certificates | VMWare vSphere 5.X Hardening Guide | VMware | |
vCenter : remove-failed-install-logs | VMWare vSphere 5.X Hardening Guide | VMware | |
vCenter : secure-vco-file-access | VMWare vSphere 5.X Hardening Guide | VMware | |
vCenter : verify-client-plugins | VMWare vSphere 5.X Hardening Guide | VMware | |
vCenter : Verify-RDP-encryption | VMWare vSphere 5.X Hardening Guide | VMware | |
vNetwork : enable-bpdu-filter | VMWare vSphere 5.X Hardening Guide | VMware | |
vNetwork : isolate-mgmt-network-airgap | VMWare vSphere 5.X Hardening Guide | VMware | |
vNetwork : isolate-mgmt-network-vlan | VMWare vSphere 5.X Hardening Guide | VMware | |
vNetwork : isolate-vmotion-network-airgap | VMWare vSphere 5.X Hardening Guide | VMware | |
vNetwork : label-vswitches | VMWare vSphere 5.X Hardening Guide | VMware | |
vNetwork : no-unused-dvports | VMWare vSphere 5.X Hardening Guide | VMware | |
vNetwork : reject-forged-transmit - 'vSwitch' | VMWare vSphere 5.X Hardening Guide | VMware | SYSTEM AND COMMUNICATIONS PROTECTION |
vNetwork : restrict-netflow-usage | VMWare vSphere 5.X Hardening Guide | VMware | |
vNetwork : restrict-portmirror-usage | VMWare vSphere 5.X Hardening Guide | VMware | |
vNetwork : verify-vlan-id | VMWare vSphere 5.X Hardening Guide | VMware | |
WebClient : web-client-timeout | VMWare vSphere 5.X Hardening Guide | VMware | |
WN12-00-000200 - Windows PowerShell must be updated to a version that supports script block logging on Windows 2012/2012 R2. | DISA Windows Server 2012 and 2012 R2 DC STIG v3r7 | Windows | CONFIGURATION MANAGEMENT |
WN12-00-000200 - Windows PowerShell must be updated to a version that supports script block logging on Windows 2012/2012 R2. | DISA Windows Server 2012 and 2012 R2 MS STIG v3r7 | Windows | CONFIGURATION MANAGEMENT |