Item Search

NameAudit NamePluginCategory
1.6.1 Ensure message of the day is configured properlyCIS Oracle Linux 7 v4.0.0 L1 ServerUnix

ACCESS CONTROL

1.6.1 Ensure message of the day is configured properlyCIS Oracle Linux 7 v4.0.0 L1 WorkstationUnix

ACCESS CONTROL

1.6.1 Ensure message of the day is configured properlyCIS Debian Linux 12 v1.1.0 L1 WorkstationUnix

ACCESS CONTROL

1.7.1 Ensure message of the day is configured properlyCIS CentOS Linux 8 Server L1 v2.0.0Unix

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

1.7.1 Ensure message of the day is configured properlyCIS Red Hat EL8 Workstation L1 v3.0.0Unix

ACCESS CONTROL

1.7.1 Ensure message of the day is configured properly - mrsvCIS Red Hat 6 Workstation L1 v3.0.0Unix

CONFIGURATION MANAGEMENT

1.7.1 Ensure message of the day is configured properly - mrsvCIS Red Hat 6 Server L1 v3.0.0Unix

CONFIGURATION MANAGEMENT

1.8.1.1 Ensure message of the day is configured properlyCIS Fedora 19 Family Linux Server L1 v1.0.0Unix

CONFIGURATION MANAGEMENT

1.8.1.1 Ensure message of the day is configured properlyCIS Fedora 19 Family Linux Workstation L1 v1.0.0Unix

CONFIGURATION MANAGEMENT

1.8.1.1 Ensure message of the day is configured properlyCIS Ubuntu Linux 18.04 LXD Host L1 Server v1.0.0Unix

CONFIGURATION MANAGEMENT

1.8.1.1 Ensure message of the day is configured properlyCIS SUSE Linux Enterprise 12 v3.2.1 L1 ServerUnix

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

4.2.2 Disable ICMP Redirect Acceptance - net.ipv4.conf.all.accept_redirects = 0CIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

CONFIGURATION MANAGEMENT

4.2.3 Disable Secure ICMP Redirect Acceptance - net.ipv4.conf.all.secure_redirects = 0CIS Red Hat Enterprise Linux 5 L2 v2.2.1Unix

SYSTEM AND INFORMATION INTEGRITY

9.2.9 Check Permissions on User .netrc FilesCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

ACCESS CONTROL

9.2.19 Check for Presence of User .netrc FilesCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

IDENTIFICATION AND AUTHENTICATION

ALMA-09-002990 - AlmaLinux OS 9 SSH client must be configured to use only encryption ciphers employing FIPS 140-3 validated cryptographic hash algorithms to protect the confidentiality of SSH client connections.DISA CloudLinux AlmaLinux OS 9 STIG v1r2Unix

ACCESS CONTROL

AOSX-13-000200 - The macOS system must generate audit records for DoD-defined events such as successful/unsuccessful logon attempts, successful/unsuccessful direct access attempts, starting and ending time for user access, and concurrent logons to the same account from different sources.DISA STIG Apple Mac OSX 10.13 v2r5Unix

AUDIT AND ACCOUNTABILITY

APPL-11-001001 - The macOS system must generate audit records for all account creations, modifications, disabling, and termination events; privileged activities or other system-level access; all kernel module load, unload, and restart actions; all program initiations; and organizationally defined events for all non-local maintenance and diagnostic sessions.DISA STIG Apple macOS 11 v1r5Unix

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY, MAINTENANCE

APPL-11-001044 - The macOS system must generate audit records for DoD-defined events such as successful/unsuccessful logon attempts, successful/unsuccessful direct access attempts, starting and ending time for user access, and concurrent logons to the same account from different sources.DISA STIG Apple macOS 11 v1r5Unix

AUDIT AND ACCOUNTABILITY

APPL-15-000014 - The macOS system must enforce time synchronization.DISA Apple macOS 15 (Sequoia) STIG v1r3Unix

AUDIT AND ACCOUNTABILITY

APPNET0070 - Software utilizing .Net 4.0 must be identified and relevant access controls configured.DISA STIG for Microsoft Dot Net Framework 4.0 v2r4Windows

SYSTEM AND COMMUNICATIONS PROTECTION

O19C-00-013700 - Oracle Database must ensure users are authenticated with an individual authenticator prior to using a shared authenticator.DISA Oracle Database 19c STIG v1r1 DatabaseOracleDB

IDENTIFICATION AND AUTHENTICATION

O112-C2-013300 - The DBMS must ensure users are authenticated with an individual authenticator prior to using a group authenticator.DISA STIG Oracle 11.2g v2r5 DatabaseOracleDB

IDENTIFICATION AND AUTHENTICATION

OL6-00-000539 - The Oracle Linux operating system must not be configured to bypass password requirements for privilege escalation.DISA STIG Oracle Linux 6 v2r7Unix

IDENTIFICATION AND AUTHENTICATION

OL08-00-030070 - OL 8 audit logs must have a mode of "0600" or less permissive to prevent unauthorized read access.DISA Oracle Linux 8 STIG v2r4Unix

AUDIT AND ACCOUNTABILITY

OL08-00-030090 - OL 8 audit logs must be group-owned by root to prevent unauthorized read access.DISA Oracle Linux 8 STIG v2r4Unix

AUDIT AND ACCOUNTABILITY

OL08-00-030100 - The OL 8 audit log directory must be owned by root to prevent unauthorized read access.DISA Oracle Linux 8 STIG v2r4Unix

AUDIT AND ACCOUNTABILITY

OL08-00-030110 - The OL 8 audit log directory must be group-owned by root to prevent unauthorized read access.DISA Oracle Linux 8 STIG v2r4Unix

AUDIT AND ACCOUNTABILITY

OL08-00-030250 - OL 8 must generate audit records for any use of the "chage" command.DISA Oracle Linux 8 STIG v2r4Unix

AUDIT AND ACCOUNTABILITY, MAINTENANCE

OL08-00-030550 - OL 8 must generate audit records for any use of the "sudo" command.DISA Oracle Linux 8 STIG v2r4Unix

AUDIT AND ACCOUNTABILITY, MAINTENANCE

RHEL-08-010385 - The RHEL 8 operating system must not be configured to bypass password requirements for privilege escalation.DISA Red Hat Enterprise Linux 8 STIG v2r3Unix

IDENTIFICATION AND AUTHENTICATION

RHEL-08-030100 - RHEL 8 audit log directory must be owned by root to prevent unauthorized read access.DISA Red Hat Enterprise Linux 8 STIG v2r3Unix

AUDIT AND ACCOUNTABILITY

RHEL-08-030280 - Successful/unsuccessful uses of the ssh-agent in RHEL 8 must generate an audit record.DISA Red Hat Enterprise Linux 8 STIG v2r3Unix

AUDIT AND ACCOUNTABILITY

RHEL-08-030301 - Successful/unsuccessful uses of the umount command in RHEL 8 must generate an audit record.DISA Red Hat Enterprise Linux 8 STIG v2r3Unix

AUDIT AND ACCOUNTABILITY

RHEL-08-030310 - Successful/unsuccessful uses of the unix_update in RHEL 8 must generate an audit record.DISA Red Hat Enterprise Linux 8 STIG v2r3Unix

AUDIT AND ACCOUNTABILITY

RHEL-08-030320 - Successful/unsuccessful uses of the ssh-keysign in RHEL 8 must generate an audit record.DISA Red Hat Enterprise Linux 8 STIG v2r3Unix

AUDIT AND ACCOUNTABILITY

RHEL-09-215075 - RHEL 9 must have the openssl-pkcs11 package installed.DISA Red Hat Enterprise Linux 9 STIG v2r4Unix

IDENTIFICATION AND AUTHENTICATION

RHEL-09-215105 - RHEL 9 must implement a FIPS 140-3 compliant systemwide cryptographic policy.DISA Red Hat Enterprise Linux 9 STIG v2r4Unix

MAINTENANCE, SYSTEM AND COMMUNICATIONS PROTECTION

SLES-12-010600 - The SUSE operating system Apparmor tool must be configured to control whitelisted applications and user home directory access control.DISA SLES 12 STIG v3r2Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

SRG-OS-99999-ESXI5-000135 - The system must disable DCUI to prevent local administrative control.DISA STIG VMWare ESXi Server 5 STIG v2r1VMware

CONFIGURATION MANAGEMENT

SRG-OS-99999-ESXI5-000146 - The system must ensure the vpxuser password meets length policy.DISA STIG VMWare ESXi Server 5 STIG v2r1VMware

CONFIGURATION MANAGEMENT

SRG-OS-99999-ESXI5-000158 - Unauthorized kernel modules must not be loaded on the host.DISA STIG VMWare ESXi Server 5 STIG v2r1VMware

CONFIGURATION MANAGEMENT

UBTU-16-020100 - Audit log directories must have a mode of 0750 or less permissive to prevent unauthorized read access.DISA STIG Ubuntu 16.04 LTS v2r3Unix

AUDIT AND ACCOUNTABILITY

UBTU-16-020130 - Audit log directory must be owned by root to prevent unauthorized read access.DISA STIG Ubuntu 16.04 LTS v2r3Unix

AUDIT AND ACCOUNTABILITY

UBTU-20-010123 - The Ubuntu operating system must be configured to permit only authorized users ownership of the audit log files.DISA Canonical Ubuntu 20.04 LTS STIG v2r2Unix

AUDIT AND ACCOUNTABILITY

UBTU-20-010124 - The Ubuntu operating system must permit only authorized groups ownership of the audit log files.DISA Canonical Ubuntu 20.04 LTS STIG v2r2Unix

AUDIT AND ACCOUNTABILITY

UBTU-22-653050 - Ubuntu 22.04 LTS must be configured to permit only authorized users ownership of the audit log files.DISA Canonical Ubuntu 22.04 LTS STIG v2r4Unix

AUDIT AND ACCOUNTABILITY

UBTU-24-901350 - Ubuntu 24.04 LTS must permit only authorized groups ownership of the audit log files.DISA Canonical Ubuntu 24.04 LTS STIG v1r1Unix

AUDIT AND ACCOUNTABILITY

WN12-GE-000001 - Systems must be maintained at a supported OS or service pack level.DISA Windows Server 2012 and 2012 R2 DC STIG v3r7Windows

CONFIGURATION MANAGEMENT

WN16-AC-000080 - Windows Server 2016 must have the built-in Windows password complexity policy enabled.DISA Microsoft Windows Server 2016 STIG v2r10Windows

IDENTIFICATION AND AUTHENTICATION