Item Search

NameAudit NamePluginCategory
1.4.1 Ensure bootloader password is set - password grubCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIGUnix

ACCESS CONTROL

1.4.1 Ensure bootloader password is set - password userCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIGUnix

ACCESS CONTROL

1.4.1 Ensure bootloader password is set - superusers grubCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIGUnix

ACCESS CONTROL

DKER-EE-001190 - Docker Enterprise sensitive host system directories must not be mounted on containers.DISA STIG Docker Enterprise 2.x Linux/Unix v2r1Unix

ACCESS CONTROL

EP11-00-000800 - The EDB Postgres Advanced Server must enforce approved authorizations for logical access to information and system resources in accordance with applicable access control policies.EDB PostgreSQL Advanced Server v11 DB Audit v2r3PostgreSQLDB

ACCESS CONTROL

EX13-CA-000035 - Exchange ActiveSync (EAS) must only use certificate-based authentication to access email - BasicAuthEnabledDISA Microsoft Exchange 2013 Client Access Server STIG v2r1Windows

ACCESS CONTROL

EX13-CA-000035 - Exchange ActiveSync (EAS) must only use certificate-based authentication to access email - ClientCertAuthDISA Microsoft Exchange 2013 Client Access Server STIG v2r1Windows

ACCESS CONTROL

EX13-CA-000035 - Exchange ActiveSync (EAS) must only use certificate-based authentication to access email - WebSiteSSLEnabledDISA Microsoft Exchange 2013 Client Access Server STIG v2r1Windows

ACCESS CONTROL

EX13-MB-000010 - Exchange Servers must use approved DoD certificates.DISA Microsoft Exchange 2013 Mailbox Server STIG v2r2Windows

ACCESS CONTROL

EX16-ED-000020 - Exchange servers must use approved DoD certificates.DISA Microsoft Exchange 2016 Edge Transport Server STIG v2r5Windows

ACCESS CONTROL

F5BI-DM-000027 - The BIG-IP appliance must be configured to enforce the assigned privilege level for each administrator and authorizations for access to all commands relative to the privilege level in accordance with applicable policy for the device.DISA F5 BIG-IP Device Management STIG v2r3F5

ACCESS CONTROL

F5BI-LT-000003 - The BIG-IP Core implementation must be configured to enforce approved authorizations for logical access to information and system resources by employing identity-based, role-based, and/or attribute-based security policies.DISA F5 BIG-IP Local Traffic Manager STIG v2r3F5

ACCESS CONTROL

JBOS-AS-000025 - Java permissions must be set for hosted applications.DISA RedHat JBoss EAP 6.3 STIG v2r3Unix

ACCESS CONTROL

JBOS-AS-000035 - The JBoss server must be configured with Role Based Access Controls.DISA RedHat JBoss EAP 6.3 STIG v2r3Unix

ACCESS CONTROL

JBOS-AS-000040 - Users in JBoss Management Security Realms must be in the appropriate role.DISA RedHat JBoss EAP 6.3 STIG v2r3Unix

ACCESS CONTROL

JBOS-AS-000045 - Silent Authentication must be removed from the Default Application Security Realm.DISA RedHat JBoss EAP 6.3 STIG v2r3Unix

ACCESS CONTROL

JBOS-AS-000075 - JBoss management interfaces must be secured - native-interfaceDISA RedHat JBoss EAP 6.3 STIG v2r3Unix

ACCESS CONTROL

JUSX-AG-000019 - For User Role Firewalls, the Juniper SRX Services Gateway Firewall must employ user attribute-based security policies to enforce approved authorizations for logical access to information and system resources.DISA Juniper SRX Services Gateway ALG v2r1Juniper

ACCESS CONTROL

JUSX-DM-000025 - The Juniper SRX Services Gateway must enforce the assigned privilege level for each administrator and authorizations for access to all commands by assigning a login class to all AAA-authenticated users.DISA Juniper SRX Services Gateway NDM v2r1Juniper

ACCESS CONTROL

O112-C2-002700 - The DBMS must enforce approved authorizations for logical access to the system in accordance with applicable policy - Role Table SELECTDISA STIG Oracle 11.2g v2r3 DatabaseOracleDB

ACCESS CONTROL

O112-C2-003500 - The DBMS must restrict grants to sensitive information to authorized user roles.DISA STIG Oracle 11.2g v2r3 DatabaseOracleDB

ACCESS CONTROL

O121-C2-002700 - The DBMS must enforce approved authorizations for logical access to the system in accordance with applicable policy.DISA STIG Oracle 12c v2r9 DatabaseOracleDB

ACCESS CONTROL

OL6-00-000068 - The system boot loader must require authentication.DISA STIG Oracle Linux 6 v2r7Unix

ACCESS CONTROL

OL07-00-010482 - Oracle Linux operating systems version 7.2 or newer with a Basic Input/Output System (BIOS) must require authentication upon booting into single-user and maintenance modes - BIOS must require authentication upon booting into single-user and maintenance modes.DISA Oracle Linux 7 STIG v2r14Unix

ACCESS CONTROL

OL07-00-010491 - Oracle Linux operating systems version 7.2 or newer using Unified Extensible Firmware Interface (UEFI) must require authentication upon booting into single-user and maintenance modes - UEFI must require authentication upon booting into single-user and maintenance modes.DISA Oracle Linux 7 STIG v2r14Unix

ACCESS CONTROL

PGS9-00-000900 - PostgreSQL must enforce approved authorizations for logical access to information and system resources in accordance with applicable access control policies - role privilegesDISA STIG PostgreSQL 9.x on RHEL OS v2r3Unix

ACCESS CONTROL

PPS9-00-000800 - The EDB Postgres Advanced Server must enforce approved authorizations for logical access to information and system resources in accordance with applicable access control policies.EDB PostgreSQL Advanced Server DB Audit v2r2PostgreSQLDB

ACCESS CONTROL

RHEL-06-000069 - The system must require authentication upon booting into single-user and maintenance modes.DISA Red Hat Enterprise Linux 6 STIG v2r2Unix

ACCESS CONTROL

RHEL-07-010491 - Red Hat Enterprise Linux operating systems version 7.2 or newer using Unified Extensible Firmware Interface (UEFI) must require authentication upon booting into single-user and maintenance modes.DISA Red Hat Enterprise Linux 7 STIG v3r14Unix

ACCESS CONTROL

SLES-12-010440 - SUSE operating systems with Unified Extensible Firmware Interface (UEFI) implemented must require authentication upon booting into single-user mode and maintenance.DISA SLES 12 STIG v2r13Unix

ACCESS CONTROL

SQL6-D0-003900 - SQL Server must enforce approved authorizations for logical access to information and system resources in accordance with applicable access control policies.DISA STIG SQL Server 2016 Instance DB Audit v2r11MS_SQLDB

ACCESS CONTROL

SQL6-D0-016200 - The SQL Server default account [sa] must be disabled.DISA STIG SQL Server 2016 Instance DB Audit v2r11MS_SQLDB

ACCESS CONTROL

UBTU-16-010390 - Ubuntu operating systems booted with United Extensible Firmware Interface (UEFI) implemented must require authentication upon booting into single-user mode and maintenance.DISA STIG Ubuntu 16.04 LTS v2r3Unix

ACCESS CONTROL

WN10-UR-000010 - The Access this computer from the network user right must only be assigned to the Administrators and Remote Desktop Users groups.DISA Windows 10 STIG v2r8Windows

ACCESS CONTROL

WN10-UR-000025 - The Allow log on locally user right must only be assigned to the Administrators and Users groups.DISA Windows 10 STIG v2r8Windows

ACCESS CONTROL

WN12-GE-000005 - Local volumes must use a format that supports NTFS attributes.DISA Windows Server 2012 and 2012 R2 MS STIG v3r7Windows

ACCESS CONTROL

WN12-UR-000005 - The Allow log on locally user right must only be assigned to the Administrators group.DISA Windows Server 2012 and 2012 R2 MS STIG v3r7Windows

ACCESS CONTROL

WN16-DC-000380 - The Deny log on as a batch job user right on domain controllers must be configured to prevent unauthenticated access.DISA Windows Server 2016 STIG v2r7Windows

ACCESS CONTROL

WN16-DC-000390 - The Deny log on as a service user right must be configured to include no accounts or groups (blank) on domain controllers.DISA Windows Server 2016 STIG v2r7Windows

ACCESS CONTROL

WN16-DC-000400 - The Deny log on locally user right on domain controllers must be configured to prevent unauthenticated access.DISA Windows Server 2016 STIG v2r7Windows

ACCESS CONTROL

WN16-MS-000340 - The 'Access this computer from the network' user right must only be assigned to the Administrators and Authenticated Users groups on member servers - Access this computer from the network user right must only be assigned to the Administrators and Authenticated Users groups on member servers.DISA Windows Server 2016 STIG v2r7Windows

ACCESS CONTROL

WN16-MS-000370 - The 'Deny access to this computer from the network' user right on member servers must be configured to prevent access from highly privileged domain accounts and local accounts on domain systems and from unauthenticated access on all systems - Deny access to this computer from the network user right on member servers must be configured to prevent access from highly privileged domain accounts and local accounts on domain systems and from unauthenticated access on all systems.DISA Windows Server 2016 STIG v2r7Windows

ACCESS CONTROL

WN16-MS-000380 - The 'Deny log on as a batch job' user right on member servers must be configured to prevent access from highly privileged domain accounts on domain systems and from unauthenticated access on all systems - Deny log on as a batch job user right on member servers must be configured to prevent access from highly privileged domain accounts on domain systems and from unauthenticated access on all systems.DISA Windows Server 2016 STIG v2r7Windows

ACCESS CONTROL

WN16-MS-000400 - The 'Deny log on locally' user right on member servers must be configured to prevent access from highly privileged domain accounts on domain systems and from unauthenticated access on all systems - Deny log on locally user right on member servers must be configured to prevent access from highly privileged domain accounts on domain systems and from unauthenticated access on all systems.DISA Windows Server 2016 STIG v2r7Windows

ACCESS CONTROL

WN16-UR-000050 - The Allow log on locally user right must only be assigned to the Administrators group.DISA Windows Server 2016 STIG v2r7Windows

ACCESS CONTROL

WN19-DC-000340 - Windows Server 2019 Access this computer from the network user right must only be assigned to the Administrators, Authenticated Users, and Enterprise Domain Controllers groups on domain controllers.DISA Windows Server 2019 STIG v2r8Windows

ACCESS CONTROL

WN19-DC-000370 - Windows Server 2019 Deny access to this computer from the network user right on domain controllers must be configured to prevent unauthenticated access.DISA Windows Server 2019 STIG v2r8Windows

ACCESS CONTROL

WN19-DC-000400 - Windows Server 2019 Deny log on locally user right on domain controllers must be configured to prevent unauthenticated access.DISA Windows Server 2019 STIG v2r8Windows

ACCESS CONTROL

WN19-MS-000090 - Windows Server 2019 'Deny log on as a batch job' user right on domain-joined member servers must be configured to prevent access from highly privileged domain accounts and from unauthenticated access on all systems - Deny log on as a batch job user right on domain-joined member servers must be configured to prevent access from highly privileged domain accounts and from unauthenticated access on all systems.DISA Windows Server 2019 STIG v2r8Windows

ACCESS CONTROL

WN19-MS-000100 - Windows Server 2019 'Deny log on as a service' user right on domain-joined member servers must be configured to prevent access from highly privileged domain accounts. No other groups or accounts must be assigned this right - Deny log on as a service user right on domain-joined member servers must be configured to prevent access from highly privileged domain accounts. No other groups or accounts must be assigned this right.DISA Windows Server 2019 STIG v2r8Windows

ACCESS CONTROL