Item Search

NameAudit NamePluginCategory
AIX7-00-001102 - AIX must employ strong authenticators in the establishment of nonlocal maintenance and diagnostic sessions.DISA STIG AIX 7.x v2r9Unix

MAINTENANCE

AOSX-13-000054 - The macOS system must implement approved Ciphers to protect the confidentiality of SSH connections.DISA STIG Apple Mac OSX 10.13 v2r5Unix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, MAINTENANCE

AOSX-13-000055 - The macOS system must use only Message Authentication Codes (MACs) employing FIPS 140-2 validated cryptographic hash algorithms.DISA STIG Apple Mac OSX 10.13 v2r5Unix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, MAINTENANCE

AOSX-13-000056 - The macOS system must implement an approved Key Exchange Algorithm.DISA STIG Apple Mac OSX 10.13 v2r5Unix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, MAINTENANCE

AOSX-14-000054 - The macOS system must implement approved Ciphers to protect the confidentiality of SSH connections.DISA STIG Apple Mac OSX 10.14 v2r6Unix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, MAINTENANCE

AOSX-14-000055 - The macOS system must use only Message Authentication Codes (MACs) employing FIPS 140-2 validated cryptographic hash algorithms.DISA STIG Apple Mac OSX 10.14 v2r6Unix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, MAINTENANCE

AOSX-14-000056 - The macOS system must implement an approved Key Exchange Algorithm.DISA STIG Apple Mac OSX 10.14 v2r6Unix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, MAINTENANCE

AOSX-14-003024 - The macOS system must use multifactor authentication in the establishment of nonlocal maintenance and diagnostic sessions - ChallengeResponseAuthenticationDISA STIG Apple Mac OSX 10.14 v2r6Unix

MAINTENANCE

AOSX-14-003024 - The macOS system must use multifactor authentication in the establishment of nonlocal maintenance and diagnostic sessions - enforceSmartCardDISA STIG Apple Mac OSX 10.14 v2r6Unix

MAINTENANCE

AOSX-14-003024 - The macOS system must use multifactor authentication in the establishment of nonlocal maintenance and diagnostic sessions - PasswordAuthenticationDISA STIG Apple Mac OSX 10.14 v2r6Unix

MAINTENANCE

AOSX-15-000054 - The macOS system must implement approved Ciphers to protect the confidentiality of SSH connections..DISA STIG Apple Mac OSX 10.15 v1r10Unix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, MAINTENANCE

AOSX-15-000055 - The macOS system must use only Message Authentication Codes (MACs) employing FIPS 140-2 validated cryptographic hash algorithms.DISA STIG Apple Mac OSX 10.15 v1r10Unix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, MAINTENANCE

AOSX-15-000056 - The macOS system must implement an approved Key Exchange Algorithm.DISA STIG Apple Mac OSX 10.15 v1r10Unix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, MAINTENANCE

APPL-12-000057 - The macOS system must implement approved ciphers within the SSH client configuration to protect the confidentiality of SSH connections.DISA STIG Apple macOS 12 v1r8Unix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, MAINTENANCE

APPL-13-000059 - The macOS system must implement approved Key Exchange Algorithms within the SSH client configuration.DISA STIG Apple macOS 13 v1r3Unix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, MAINTENANCE

OL08-00-010290 - The OL 8 SSH server must be configured to use only Message Authentication Codes (MACs) employing FIPS 140-2 validated cryptographic hash algorithms - MACs employing FIPS 140-2 validated cryptographic hash algorithmsDISA Oracle Linux 8 STIG v1r8Unix

MAINTENANCE

OL08-00-010291 - The OL 8 SSH server must be configured to use only ciphers employing FIPS 140-2 validated cryptographic algorithms.DISA Oracle Linux 8 STIG v1r8Unix

MAINTENANCE

RHEL-09-255050 - RHEL 9 must enable the Pluggable Authentication Module (PAM) interface for SSHD.DISA Red Hat Enterprise Linux 9 STIG v1r2Unix

MAINTENANCE

RHEL-09-671010 - RHEL 9 must enable FIPS mode.DISA Red Hat Enterprise Linux 9 STIG v1r2Unix

ACCESS CONTROL, MAINTENANCE, SYSTEM AND COMMUNICATIONS PROTECTION

SLES-12-030180 - The SUSE operating system SSH daemon must be configured to only use Message Authentication Codes (MACs) employing FIPS 140-2 approved cryptographic hash algorithms.DISA SLES 12 STIG v2r13Unix

ACCESS CONTROL, MAINTENANCE

SLES-15-010270 - The SUSE operating system SSH daemon must be configured to only use Message Authentication Codes (MACs) employing FIPS 140-2 approved cryptographic hash algorithms.DISA SLES 15 STIG v1r12Unix

ACCESS CONTROL, MAINTENANCE

UBTU-18-010414 - The Ubuntu operating system must use strong authenticators in establishing nonlocal maintenance and diagnostic sessions.DISA STIG Ubuntu 18.04 LTS v2r13Unix

MAINTENANCE

UBTU-20-010035 - The Ubuntu operating system must use strong authenticators in establishing nonlocal maintenance and diagnostic sessions.DISA STIG Ubuntu 20.04 LTS v1r10Unix

MAINTENANCE

WBLC-06-000191 - Oracle WebLogic must employ strong identification and authentication techniques when establishing nonlocal maintenance and diagnostic sessions - Listen PortOracle WebLogic Server 12c Linux v2r1 MiddlewareUnix

MAINTENANCE

WBLC-06-000191 - Oracle WebLogic must employ strong identification and authentication techniques when establishing nonlocal maintenance and diagnostic sessions - Listen PortOracle WebLogic Server 12c Linux v2r1Unix

MAINTENANCE

WBLC-06-000191 - Oracle WebLogic must employ strong identification and authentication techniques when establishing nonlocal maintenance and diagnostic sessions - Listen PortOracle WebLogic Server 12c Windows v2r1Windows

MAINTENANCE

WBLC-06-000191 - Oracle WebLogic must employ strong identification and authentication techniques when establishing nonlocal maintenance and diagnostic sessions - SSL Listen PortOracle WebLogic Server 12c Windows v2r1Windows

MAINTENANCE

WBLC-06-000191 - Oracle WebLogic must employ strong identification and authentication techniques when establishing nonlocal maintenance and diagnostic sessions - SSL Listen PortOracle WebLogic Server 12c Linux v2r1 MiddlewareUnix

MAINTENANCE

WBLC-06-000191 - Oracle WebLogic must employ strong identification and authentication techniques when establishing nonlocal maintenance and diagnostic sessions - SSL Listen PortOracle WebLogic Server 12c Linux v2r1Unix

MAINTENANCE

WN10-CC-000330 - The Windows Remote Management (WinRM) client must not use Basic authentication.DISA Windows 10 STIG v2r8Windows

MAINTENANCE

WN10-CC-000345 - The Windows Remote Management (WinRM) service must not use Basic authentication.DISA Windows 10 STIG v2r8Windows

MAINTENANCE

WN10-CC-000360 - The Windows Remote Management (WinRM) client must not use Digest authentication.DISA Windows 10 STIG v2r8Windows

MAINTENANCE

WN11-CC-000330 - The Windows Remote Management (WinRM) client must not use Basic authentication.DISA Windows 11 STIG v1r5Windows

MAINTENANCE

WN11-CC-000345 - The Windows Remote Management (WinRM) service must not use Basic authentication.DISA Windows 11 STIG v1r5Windows

MAINTENANCE

WN11-CC-000360 - The Windows Remote Management (WinRM) client must not use Digest authentication.DISA Windows 11 STIG v1r5Windows

MAINTENANCE

WN12-CC-000123 - The Windows Remote Management (WinRM) client must not use Basic authentication.DISA Windows Server 2012 and 2012 R2 MS STIG v3r7Windows

MAINTENANCE

WN12-CC-000123 - The Windows Remote Management (WinRM) client must not use Basic authentication.DISA Windows Server 2012 and 2012 R2 DC STIG v3r7Windows

MAINTENANCE

WN12-CC-000125 - The Windows Remote Management (WinRM) client must not use Digest authentication.DISA Windows Server 2012 and 2012 R2 DC STIG v3r7Windows

MAINTENANCE

WN12-CC-000125 - The Windows Remote Management (WinRM) client must not use Digest authentication.DISA Windows Server 2012 and 2012 R2 MS STIG v3r7Windows

MAINTENANCE

WN12-CC-000126 - The Windows Remote Management (WinRM) service must not use Basic authentication.DISA Windows Server 2012 and 2012 R2 MS STIG v3r7Windows

MAINTENANCE

WN12-CC-000126 - The Windows Remote Management (WinRM) service must not use Basic authentication.DISA Windows Server 2012 and 2012 R2 DC STIG v3r7Windows

MAINTENANCE

WN16-CC-000500 - The Windows Remote Management (WinRM) client must not use Basic authentication.DISA Windows Server 2016 STIG v2r7Windows

MAINTENANCE

WN16-CC-000520 - The Windows Remote Management (WinRM) client must not use Digest authentication.DISA Windows Server 2016 STIG v2r7Windows

MAINTENANCE

WN16-CC-000530 - The Windows Remote Management (WinRM) service must not use Basic authentication.DISA Windows Server 2016 STIG v2r7Windows

MAINTENANCE

WN19-CC-000470 - Windows Server 2019 Windows Remote Management (WinRM) client must not use Basic authentication.DISA Windows Server 2019 STIG v2r8Windows

MAINTENANCE

WN19-CC-000490 - Windows Server 2019 Windows Remote Management (WinRM) client must not use Digest authentication.DISA Windows Server 2019 STIG v2r8Windows

MAINTENANCE

WN19-CC-000500 - Windows Server 2019 Windows Remote Management (WinRM) service must not use Basic authentication.DISA Windows Server 2019 STIG v2r8Windows

MAINTENANCE

WN22-CC-000470 - Windows Server 2022 Windows Remote Management (WinRM) client must not use Basic authentication.DISA Windows Server 2022 STIG v1r4Windows

MAINTENANCE

WN22-CC-000490 - Windows Server 2022 Windows Remote Management (WinRM) client must not use Digest authentication.DISA Windows Server 2022 STIG v1r4Windows

MAINTENANCE

WN22-CC-000500 - Windows Server 2022 Windows Remote Management (WinRM) service must not use Basic authentication.DISA Windows Server 2022 STIG v1r4Windows

MAINTENANCE