ARST-ND-000110 - The Arista network device must enforce approved authorizations for controlling the flow of management information within the network device based on information flow control policies. | DISA STIG Arista MLS EOS 4.2x NDM v2r1 | Arista | ACCESS CONTROL |
Big Sur - Disable Internet Sharing | NIST macOS Big Sur v1.4.0 - 800-53r5 Low | Unix | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
Big Sur - Disable Internet Sharing | NIST macOS Big Sur v1.4.0 - CNSSI 1253 | Unix | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
Big Sur - Disable Internet Sharing | NIST macOS Big Sur v1.4.0 - 800-53r4 High | Unix | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
Big Sur - Disable Internet Sharing | NIST macOS Big Sur v1.4.0 - 800-171 | Unix | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
Big Sur - Disable Wi-Fi Interface | NIST macOS Big Sur v1.4.0 - 800-53r5 Low | Unix | ACCESS CONTROL |
Big Sur - Disable Wi-Fi Interface | NIST macOS Big Sur v1.4.0 - CNSSI 1253 | Unix | ACCESS CONTROL |
Big Sur - Disable Wi-Fi Interface | NIST macOS Big Sur v1.4.0 - 800-53r4 Low | Unix | ACCESS CONTROL |
Big Sur - Disable Wi-Fi Interface | NIST macOS Big Sur v1.4.0 - 800-53r4 Moderate | Unix | ACCESS CONTROL |
Big Sur - Disable Wi-Fi Interface | NIST macOS Big Sur v1.4.0 - 800-53r4 High | Unix | ACCESS CONTROL |
CASA-ND-000140 - The Cisco ASA must be configured to enforce approved authorizations for controlling the flow of management information within the Cisco ASA based on information flow control policies. | DISA STIG Cisco ASA NDM v2r2 | Cisco | ACCESS CONTROL |
Catalina - Disable Internet Sharing | NIST macOS Catalina v1.5.0 - 800-53r4 High | Unix | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
Catalina - Disable Internet Sharing | NIST macOS Catalina v1.5.0 - 800-53r4 Low | Unix | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
Catalina - Disable Internet Sharing | NIST macOS Catalina v1.5.0 - 800-53r5 Low | Unix | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
Catalina - Disable Internet Sharing | NIST macOS Catalina v1.5.0 - 800-171 | Unix | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
Catalina - Disable Internet Sharing | NIST macOS Catalina v1.5.0 - 800-53r5 Moderate | Unix | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
Catalina - Disable Internet Sharing | NIST macOS Catalina v1.5.0 - 800-53r4 Moderate | Unix | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
Catalina - Disable Internet Sharing | NIST macOS Catalina v1.5.0 - 800-53r5 High | Unix | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
Catalina - Disable Internet Sharing | NIST macOS Catalina v1.5.0 - CNSSI 1253 | Unix | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
GEN000000-AIX00040 - The securetcpip command must be used - /etc/security/config has been configured | DISA STIG AIX 6.1 v1r14 | Unix | ACCESS CONTROL |
GEN000000-AIX00040 - The securetcpip command must be used. | DISA STIG AIX 6.1 v1r14 | Unix | ACCESS CONTROL |
GEN000000-AIX0200 - The system must not allow directed broadcasts to gateway. | DISA STIG AIX 6.1 v1r14 | Unix | ACCESS CONTROL |
GEN000000-AIX0210 - The system must provide protection from Internet Control Message Protocol (ICMP) attacks on TCP connections. | DISA STIG AIX 6.1 v1r14 | Unix | ACCESS CONTROL |
GEN000000-AIX0220 - The system must provide protection for the TCP stack against connection resets, SYN, and data injection attacks. | DISA STIG AIX 6.1 v1r14 | Unix | ACCESS CONTROL |
GEN000000-AIX0230 - The system must provide protection against IP fragmentation attacks. | DISA STIG AIX 6.1 v1r14 | Unix | ACCESS CONTROL |
GEN000000-AIX0300 - The system must not have the bootp service active. | DISA STIG AIX 6.1 v1r14 | Unix | ACCESS CONTROL |
GEN000000-AIX0310 - The /etc/ftpaccess.ctl file must exist. | DISA STIG AIX 6.1 v1r14 | Unix | ACCESS CONTROL |
GEN003600 - The system must not forward IPv4 source-routed packets. | DISA STIG AIX 6.1 v1r14 | Unix | ACCESS CONTROL |
GEN003602 - The system must not process ICMP timestamp requests. | DISA STIG AIX 6.1 v1r14 | Unix | ACCESS CONTROL |
GEN003602 - The system must not process Internet Control Message Protocol (ICMP) timestamp requests - 'timestamp-reply -j DROP' | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
GEN003604 - The system must not respond to ICMP timestamp requests sent to a broadcast address. | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
GEN003606 - The system must prevent local applications from generating source-routed packets. | DISA STIG AIX 6.1 v1r14 | Unix | ACCESS CONTROL |
GEN003607 - The system must not accept source-routed IPv4 packets - 'net.ipv4.conf.all.accept_source_route' | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
GEN003608 - Proxy ARP must not be enabled on the system. | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
GEN003609 - The system must ignore IPv4 ICMP redirect messages. | DISA STIG AIX 5.3 v1r2 | Unix | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
GEN003619 - The system must not be configured for network bridging. | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
GEN003860 - The system must not have the finger service active. | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
GEN003860 - The system must not have the finger service active. | DISA STIG AIX 6.1 v1r14 | Unix | ACCESS CONTROL |
GEN007780 - The system must not have 6to4 enabled. | DISA STIG AIX 6.1 v1r14 | Unix | ACCESS CONTROL |
GEN007820 - The system must not have IP tunnels configured - '/sbin/ip tun list' | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
GEN007820 - The system must not have IP tunnels configured - 'lstun -a' | DISA STIG AIX 6.1 v1r14 | Unix | ACCESS CONTROL |
GEN007860 - The system must ignore IPv6 ICMP redirect messages. | DISA STIG AIX 6.1 v1r14 | Unix | ACCESS CONTROL |
GEN007860 - The system must ignore IPv6 ICMP redirect messages. | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
GEN007880 - The system must not send IPv6 ICMP redirects. | DISA STIG AIX 6.1 v1r14 | Unix | ACCESS CONTROL |
GEN007900 - The system must use an appropriate reverse-path filter for IPv6 network traffic, if the system uses IPv6. | DISA STIG AIX 6.1 v1r14 | Unix | ACCESS CONTROL |
GEN007920 - The system must not forward IPv6 source-routed packets - 'net.ipv6.conf.all.forwarding' | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
GEN007920 - The system must not forward IPv6 source-routed packets. | DISA STIG AIX 6.1 v1r14 | Unix | ACCESS CONTROL |
GEN007940 - The system must not accept source-routed IPv6 packets. | DISA STIG AIX 6.1 v1r14 | Unix | ACCESS CONTROL |
JUEX-NM-000070 - The Juniper EX switch must be configured to enforce approved authorizations for controlling the flow of management information within the network device based on information flow control policies. | DISA Juniper EX Series Network Device Management v2r2 | Juniper | ACCESS CONTROL |
JUEX-RT-000170 - The Juniper perimeter router must be configured to protect an enclave connected to an alternate gateway by using an inbound filter that only permits packets with destination addresses within the site's address space. | DISA Juniper EX Series Router v2r1 | Juniper | ACCESS CONTROL |