AMLS-L3-000150 - The Arista Multilayer Switch must protect an enclave connected to an Alternate Gateway by using an inbound filter that only permits packets with destination addresses within the sites address space. | DISA STIG Arista MLS DCS-7000 Series RTR v1r3 | Arista | ACCESS CONTROL |
AMLS-L3-000160 - If Border Gateway Protocol (BGP) is enabled on The Arista Multilayer Switch, The Arista Multilayer Switch must not be a BGP peer with a router from an Autonomous System belonging to any Alternate Gateway. | DISA STIG Arista MLS DCS-7000 Series RTR v1r3 | Arista | ACCESS CONTROL |
AOSX-15-100001 - The macOS system must be a supported release. | DISA STIG Apple Mac OSX 10.15 v1r10 | Unix | CONFIGURATION MANAGEMENT |
ARST-RT-000160 - The Arista perimeter router must be configured to protect an enclave connected to an alternate gateway by using an inbound filter that only permits packets with destination addresses within the sites address space. | DISA STIG Arista MLS EOS 4.2x Router v1r1 | Arista | ACCESS CONTROL |
ARST-RT-000170 - The Arista perimeter router must be configured to not be a Border Gateway Protocol (BGP) peer to an alternate gateway service provider. | DISA STIG Arista MLS EOS 4.2x Router v1r1 | Arista | ACCESS CONTROL |
ARST-RT-000830 - The perimeter router must be configured to block all packets with any IP options. | DISA STIG Arista MLS EOS 4.2x Router v1r1 | Arista | SYSTEM AND COMMUNICATIONS PROTECTION |
CISC-RT-000280 - The Cisco perimeter router must be configured to protect an enclave connected to an alternate gateway by using an inbound filter that only permits packets with destination addresses within the sites address space. | DISA STIG Cisco IOS Router RTR v2r6 | Cisco | ACCESS CONTROL |
CISC-RT-000280 - The Cisco perimeter router must be configured to protect an enclave connected to an alternate gateway by using an inbound filter that only permits packets with destination addresses within the sites address space. | DISA STIG Cisco IOS-XR Router RTR v2r4 | Cisco | ACCESS CONTROL |
CISC-RT-000280 - The Cisco perimeter router must be configured to protect an enclave connected to an alternate gateway by using an inbound filter that only permits packets with destination addresses within the sites address space. | DISA STIG Cisco IOS XE Router RTR v2r9 | Cisco | ACCESS CONTROL |
DISA_IIS_8.5_Web_Server_v2r7.audit from DISA Microsoft IIS 8.5 Server v2r7 STIG | DISA IIS 8.5 Server v2r7 | Windows | |
DISA_IIS_8.5_Web_Site_v2r9.audit from DISA Microsoft IIS 8.5 Site v2r9 STIG | DISA IIS 8.5 Site v2r9 | Windows | |
DISA_Oracle_11g_Installation_v9r1_DB.audit from DISA Oracle Database 11g Installation STIG v9r1 STIG | DISA STIG Oracle 11 Installation v9r1 Database | OracleDB | |
DISA_Oracle_11g_Installation_v9r1_OS_Linux.audit from DISA Oracle Database 11g Installation STIG v9r1 STIG | DISA STIG Oracle 11 Installation v9r1 Linux | Unix | |
DISA_Oracle_11g_Installation_v9r1_OS_Windows.audit from DISA Oracle Database 11g Installation STIG v9r1 STIG | DISA STIG Oracle 11 Installation v9r1 Windows | Windows | |
DISA_Oracle_11g_Instance_v9r1_DB.audit from DISA Oracle Database 11g Instance STIG v9r1 STIG | DISA STIG Oracle 11 Instance v9r1 Database | OracleDB | |
DISA_Oracle_11g_Instance_v9r1_OS_Linux.audit from DISA Oracle Database 11g Instance STIG v9r1 STIG | DISA STIG Oracle 11 Instance v9r1 OS Unix | Unix | |
DISA_Oracle_11g_Instance_v9r1_OS_Windows.audit from DISA Oracle Database 11g Instance STIG v9r1 STIG | DISA STIG Oracle 11 Instance v9r1 OS Windows | Windows | |
DISA_STIG_Cisco_IOS_Router_NDM_v2r8.audit from DISA Cisco IOS Router NDM v2r8 STIG | DISA STIG Cisco IOS Router NDM v2r8 | Cisco | |
DISA_STIG_Cisco_IOS_Router_RTR_v2r6.audit from DISA Cisco IOS Router RTR v2r6 STIG | DISA STIG Cisco IOS Router RTR v2r6 | Cisco | |
DISA_STIG_Cisco_IOS_XE_Router_NDM_v2r9.audit from DISA Cisco IOS XE Router NDM v2r9 STIG | DISA STIG Cisco IOS XE Router NDM v2r9 | Cisco | |
DISA_STIG_Cisco_IOS_XE_Router_RTR_v2r9.audit from DISA Cisco IOS XE Router RTR v2r9 STIG | DISA STIG Cisco IOS XE Router RTR v2r9 | Cisco | |
DISA_STIG_Kubernetes_v1r11.audit from DISA Kubernetes v1r11 STIG | DISA STIG Kubernetes v1r11 | Unix | |
DISA_STIG_Microsoft_Edge_v1r7.audit from DISA Microsoft Edge v1r7 STIG | DISA STIG Edge v1r7 | Windows | |
DISA_STIG_Microsoft_OneDrive_v2r3.audit from DISA Microsoft OneDrive v2r3 STIG | DISA STIG Microsoft OneDrive v2r3 | Windows | |
DISA_STIG_Microsoft_Outlook_2010_v1r13.audit for DISA Microsoft Outlook 2010 STIG v1r13 STIG | DISA STIG Office 2010 Outlook v1r13 | Windows | |
DISA_STIG_Mozilla_Firefox_v6r5_Linux.audit from DISA Mozilla Firefox v6r5 STIG | DISA STIG Mozilla Firefox Linux v6r5 | Unix | |
DISA_STIG_Mozilla_Firefox_v6r5_MacOS.audit from DISA Mozilla Firefox v6r5 STIG | DISA STIG Mozilla Firefox MacOS v6r5 | Unix | |
DISA_STIG_Mozilla_Firefox_v6r5_Windows.audit from DISA Mozilla Firefox v6r5 STIG | DISA STIG Mozilla Firefox Windows v6r5 | Windows | |
DISA_STIG_MSSQL_2012_Database_v1r20.audit from DISA Microsoft SQL Server Instance 2012 v1r20 STIG | DISA STIG SQL Server 2012 Database Audit v1r20 | MS_SQLDB | |
DISA_STIG_MSSQL_2012_Instance-DB_v1r20.audit from DISA Microsoft SQL Server Instance 2012 v1r20 STIG | DISA STIG SQL Server 2012 DB Instance Security v1r20 | MS_SQLDB | |
DISA_STIG_MSSQL_2012_Instance-OS_v1r20.audit from DISA Microsoft SQL Server Instance 2012 v1r20 STIG | DISA STIG SQL Server 2012 Database OS Audit v1r20 | Windows | |
DISA_STIG_Oracle_Database_11.2g_v2r3_DB.audit from DISA Oracle Database 11.2g v2r3 STIG | DISA STIG Oracle 11.2g v2r3 Database | OracleDB | |
DISA_STIG_Oracle_Database_11.2g_v2r3_OS_Linux.audit from DISA Oracle Database 11.2g v2r3 STIG | DISA STIG Oracle 11.2g v2r3 Linux | Unix | |
DISA_STIG_Oracle_Database_11.2g_v2r3_OS_Windows.audit from DISA Oracle Database 11.2g v2r3 STIG | DISA STIG Oracle 11.2g v2r3 Windows | Windows | |
DISA_STIG_Oracle_Database_11.2g_v2r4_OS_Linux.audit from DISA Oracle Database 11.2g v2r4 STIG | DISA STIG Oracle 11.2g v2r4 Linux | Unix | |
DISA_STIG_Oracle_Database_11.2g_v2r4_OS_Windows.audit from DISA Oracle Database 11.2g v2r4 STIG | DISA STIG Oracle 11.2g v2r4 Windows | Windows | |
DISA_STIG_Oracle_Database_12c_v2r9_Database.audit from DISA Oracle Database 12c v2r9 STIG | DISA STIG Oracle 12c v2r9 Database | OracleDB | |
DISA_STIG_Oracle_Database_12c_v2r9_OS_Linux.audit from DISA Oracle Database 12c v2r9 STIG | DISA STIG Oracle 12c v2r9 Linux | Unix | |
DISA_STIG_Oracle_Database_12c_v2r9_OS_Windows.audit from DISA Oracle Database 12c v2r9 STIG | DISA STIG Oracle 12c v2r9 Windows | Windows | |
DISA_STIG_Oracle_MySQL_8.0_v1r5_Database.audit from DISA Oracle MySQL 8.0 v1r5 STIG | DISA Oracle MySQL 8.0 v1r5 DB | MySQLDB | |
DISA_STIG_Oracle_MySQL_8.0_v1r5_OS_Linux.audit from DISA Oracle MySQL 8.0 v1r5 STIG | DISA Oracle MySQL 8.0 v1r5 OS Linux | Unix | |
DISA_STIG_SLES_12_v2r13.audit from DISA SLES 12 v2r13 STIG | DISA SLES 12 STIG v2r13 | Unix | |
GEN000100 - The operating system must be a supported release. | DISA STIG Solaris 10 X86 v2r4 | Unix | CONFIGURATION MANAGEMENT |
JUEX-RT-000170 - The Juniper perimeter router must be configured to protect an enclave connected to an alternate gateway by using an inbound filter that only permits packets with destination addresses within the site's address space. | DISA Juniper EX Series Router v1r3 | Juniper | ACCESS CONTROL |
JUNI-ND-001470 - The Juniper router must be running a Junos release that is currently supported by Juniper Networks. | DISA STIG Juniper Router NDM v2r3 | Juniper | CONFIGURATION MANAGEMENT |
JUNI-RT-000280 - The Juniper perimeter router must be configured to protect an enclave connected to an alternate gateway by using an inbound filter that only permits packets with destination addresses within the sites address space. | DISA STIG Juniper Router RTR v2r4 | Juniper | ACCESS CONTROL |
JUNI-RT-000290 - The Juniper perimeter router must be configured to not be a Border Gateway Protocol (BGP) peer to an alternate gateway service provider - BGP peer to an alternate gateway service provider. | DISA STIG Juniper Router RTR v2r4 | Juniper | ACCESS CONTROL |
JUSX-VN-000004 - The Juniper SRX Services Gateway VPN device also fulfills the role of IDPS in the architecture, the device must inspect the VPN traffic in compliance with DoD IDPS requirements. | DISA Juniper SRX Services Gateway VPN v2r2 | Juniper | ACCESS CONTROL |
JUSX-VN-000022 - The Juniper SRX Services Gateway VPN must terminate all network connections associated with a communications session at the end of the session. | DISA Juniper SRX Services Gateway VPN v2r2 | Juniper | SYSTEM AND COMMUNICATIONS PROTECTION |
OL6-00-000010 - The Oracle Linux operating system must be a vendor-supported release. | DISA STIG Oracle Linux 6 v2r7 | Unix | CONFIGURATION MANAGEMENT |