Item Search

NameAudit NamePluginCategory
GOOG-12-008500 - Google Android 12 must be configured to not allow backup of [all applications, configuration data] to locally connected systems.MobileIron - DISA Google Android 12 COPE v1r1MDM

SYSTEM AND COMMUNICATIONS PROTECTION

GOOG-12-008500 - Google Android 12 must be configured to not allow backup of [all applications, configuration data] to locally connected systems.MobileIron - DISA Google Android 12 COBO v1r1MDM

SYSTEM AND COMMUNICATIONS PROTECTION

GOOG-12-008500 - Google Android 12 must be configured to not allow backup of [all applications, configuration data] to locally connected systems.AirWatch - DISA Google Android 12 COBO v1r1MDM

SYSTEM AND COMMUNICATIONS PROTECTION

GOOG-12-008600 - Google Android 12 must be configured to not allow backup of [all applications, configuration data] to remote systems.MobileIron - DISA Google Android 12 COPE v1r1MDM

SYSTEM AND COMMUNICATIONS PROTECTION

GOOG-13-008500 - Google Android 13 must be configured to not allow backup of [all applications, configuration data] to locally connected systems.AirWatch - DISA Google Android 13 COBO v1r1MDM

SYSTEM AND COMMUNICATIONS PROTECTION

GOOG-13-012400 - Google Android 13 must allow only the Administrator (MDM) to perform the following management function: Disable Phone Hub.AirWatch - DISA Google Android 13 COBO v1r1MDM

SYSTEM AND COMMUNICATIONS PROTECTION

MADB-10-005400 - Database contents must be protected from unauthorized and unintended information transfer by enforcement of a data-transfer policy.DISA MariaDB Enterprise 10.x v1r2 DBMySQLDB

SYSTEM AND COMMUNICATIONS PROTECTION

MADB-10-005500 - MariaDB must prevent unauthorized and unintended information transfer via shared system resources.DISA MariaDB Enterprise 10.x v1r2 DBMySQLDB

SYSTEM AND COMMUNICATIONS PROTECTION

MADB-10-005600 - Access to database files must be limited to relevant processes and to authorized, administrative users.DISA MariaDB Enterprise 10.x v1r2 DBMySQLDB

SYSTEM AND COMMUNICATIONS PROTECTION

MD4X-00-000900 - MongoDB must prevent unauthorized and unintended information transfer via shared system resources - .conf fileDISA STIG MongoDB Enterprise Advanced 4.x v1r2 OSUnix

SYSTEM AND COMMUNICATIONS PROTECTION

MD4X-00-000900 - MongoDB must prevent unauthorized and unintended information transfer via shared system resources - Data DirDISA STIG MongoDB Enterprise Advanced 4.x v1r2 OSUnix

SYSTEM AND COMMUNICATIONS PROTECTION

MD4X-00-004000 - Database contents must be protected from unauthorized and unintended information transfer by enforcement of a data-transfer policy.DISA STIG MongoDB Enterprise Advanced 4.x v1r2 OSUnix

SYSTEM AND COMMUNICATIONS PROTECTION

MSFT-11-003700 - Microsoft Android 11 must be configured to not allow backup of [all applications, configuration data] to locally connected systems.MobileIron - DISA Microsoft Android 11 COBO v1r1MDM

SYSTEM AND COMMUNICATIONS PROTECTION

MSFT-11-003700 - Microsoft Android 11 must be configured to not allow backup of [all applications, configuration data] to locally connected systems.AirWatch - DISA Microsoft Android 11 COBO v1r1MDM

SYSTEM AND COMMUNICATIONS PROTECTION

MSFT-11-003900 - Microsoft Android 11 must be configured to not allow backup of all applications and configuration data to remote systems.AirWatch - DISA Microsoft Android 11 COPE v1r1MDM

SYSTEM AND COMMUNICATIONS PROTECTION

MSFT-11-003900 - Microsoft Android 11 must be configured to not allow backup of all applications and configuration data to remote systems.MobileIron - DISA Microsoft Android 11 COPE v1r1MDM

SYSTEM AND COMMUNICATIONS PROTECTION

MSFT-11-003900 - Microsoft Android 11 must be configured to not allow backup of all applications and configuration data to remote systems.AirWatch - DISA Microsoft Android 11 COBO v1r1MDM

SYSTEM AND COMMUNICATIONS PROTECTION

MYS8-00-006600 - Database contents must be protected from unauthorized and unintended information transfer by enforcement of a data-transfer policy.DISA Oracle MySQL 8.0 v1r4 DBMySQLDB

SYSTEM AND COMMUNICATIONS PROTECTION

MYS8-00-006800 - Access to database files must be limited to relevant processes and to authorized, administrative users.DISA Oracle MySQL 8.0 v1r4 DBMySQLDB

SYSTEM AND COMMUNICATIONS PROTECTION

OL07-00-010375 - The Oracle Linux operating system must restrict access to the kernel message buffer.DISA Oracle Linux 7 STIG v2r14Unix

SYSTEM AND COMMUNICATIONS PROTECTION

OL08-00-010190 - A sticky bit must be set on all OL 8 public directories to prevent unauthorized and unintended information transferred via shared system resources.DISA Oracle Linux 8 STIG v1r8Unix

SYSTEM AND COMMUNICATIONS PROTECTION

OL08-00-010375 - OL 8 must restrict access to the kernel message buffer.DISA Oracle Linux 8 STIG v1r8Unix

SYSTEM AND COMMUNICATIONS PROTECTION

OL08-00-010376 - OL 8 must prevent kernel profiling by unprivileged users.DISA Oracle Linux 8 STIG v1r8Unix

SYSTEM AND COMMUNICATIONS PROTECTION

RHEL-07-010375 - The Red Hat Enterprise Linux operating system must restrict access to the kernel message buffer.DISA Red Hat Enterprise Linux 7 STIG v3r14Unix

SYSTEM AND COMMUNICATIONS PROTECTION

RHEL-08-010190 - A sticky bit must be set on all RHEL 8 public directories to prevent unauthorized and unintended information transferred via shared system resources.DISA Red Hat Enterprise Linux 8 STIG v1r13Unix

SYSTEM AND COMMUNICATIONS PROTECTION

RHEL-08-010375 - RHEL 8 must restrict access to the kernel message buffer.DISA Red Hat Enterprise Linux 8 STIG v1r13Unix

SYSTEM AND COMMUNICATIONS PROTECTION

RHEL-08-010376 - RHEL 8 must prevent kernel profiling by unprivileged users.DISA Red Hat Enterprise Linux 8 STIG v1r13Unix

SYSTEM AND COMMUNICATIONS PROTECTION

RHEL-09-213010 - RHEL 9 must restrict access to the kernel message buffer.DISA Red Hat Enterprise Linux 9 STIG v1r2Unix

SYSTEM AND COMMUNICATIONS PROTECTION

RHEL-09-213015 - RHEL 9 must prevent kernel profiling by nonprivileged users.DISA Red Hat Enterprise Linux 9 STIG v1r2Unix

SYSTEM AND COMMUNICATIONS PROTECTION

RHEL-09-232240 - All RHEL 9 world-writable directories must be owned by root, sys, bin, or an application user.DISA Red Hat Enterprise Linux 9 STIG v1r2Unix

CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

RHEL-09-232245 - A sticky bit must be set on all RHEL 9 public directories.DISA Red Hat Enterprise Linux 9 STIG v1r2Unix

SYSTEM AND COMMUNICATIONS PROTECTION

SLES-12-010375 - The SUSE operating system must restrict access to the kernel message buffer.DISA SLES 12 STIG v2r13Unix

SYSTEM AND COMMUNICATIONS PROTECTION

SLES-15-010300 - The sticky bit must be set on all SUSE operating system world-writable directories.DISA SLES 15 STIG v1r12Unix

SYSTEM AND COMMUNICATIONS PROTECTION

SLES-15-010375 - The SUSE operating system must restrict access to the kernel message buffer.DISA SLES 15 STIG v1r12Unix

SYSTEM AND COMMUNICATIONS PROTECTION

SQL2-00-021800 - SQL Server must prevent unauthorized and unintended information transfer via shared system resources.DISA STIG SQL Server 2012 Database Audit v1r20MS_SQLDB

SYSTEM AND COMMUNICATIONS PROTECTION

SQL4-00-021800 - Database contents must be protected from unauthorized and unintended information transfer by enforcement of a data-transfer policy.DISA STIG SQL Server 2014 Database Audit v1r6MS_SQLDB

SYSTEM AND COMMUNICATIONS PROTECTION

UBTU-18-010510 - The Ubuntu operating system must restrict access to the kernel message buffer.DISA STIG Ubuntu 18.04 LTS v2r13Unix

SYSTEM AND COMMUNICATIONS PROTECTION

UBTU-20-010401 - The Ubuntu operating system must restrict access to the kernel message buffer.DISA STIG Ubuntu 20.04 LTS v1r10Unix

SYSTEM AND COMMUNICATIONS PROTECTION

UBTU-20-010411 - The Ubuntu operating system must set a sticky bit on all public directories to prevent unauthorized and unintended information transferred via shared system resources.DISA STIG Ubuntu 20.04 LTS v1r10Unix

SYSTEM AND COMMUNICATIONS PROTECTION

VCPG-67-000018 - Data from the vPostgres database must be protected from unauthorized transfer.DISA STIG VMware vSphere 6.7 PostgreSQL v1r2Unix

SYSTEM AND COMMUNICATIONS PROTECTION

WN11-00-000060 - Non-system-created file shares on a system must limit access to groups that require it.DISA Windows 11 STIG v1r5Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WN11-CC-000155 - Solicited Remote Assistance must not be allowed.DISA Windows 11 STIG v1r5Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WN11-CC-000275 - Local drives must be prevented from sharing with Remote Desktop Session Hosts.DISA Windows 11 STIG v1r5Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WN11-SO-000150 - Anonymous enumeration of shares must be restricted.DISA Windows 11 STIG v1r5Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WN11-SO-000165 - Anonymous access to Named Pipes and Shares must be restricted.DISA Windows 11 STIG v1r5Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WN22-00-000230 - Windows Server 2022 nonsystem-created file shares must limit access to groups that require it.DISA Windows Server 2022 STIG v1r4Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WN22-CC-000350 - Windows Server 2022 Remote Desktop Services must prevent drive redirection.DISA Windows Server 2022 STIG v1r4Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WN22-DC-000120 - Windows Server 2022 data files owned by users must be on a different logical partition from the directory server data files.DISA Windows Server 2022 STIG v1r4Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WN22-SO-000230 - Windows Server 2022 must not allow anonymous enumeration of shares.DISA Windows Server 2022 STIG v1r4Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WN22-SO-000250 - Windows Server 2022 must restrict anonymous access to Named Pipes and Shares.DISA Windows Server 2022 STIG v1r4Windows

SYSTEM AND COMMUNICATIONS PROTECTION