GEN002280 - Device files and directories must only be writable by users with a system account or as configured by the vendor. | DISA STIG for Oracle Linux 5 v2r1 | Unix | ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION |
GEN002300 - Device files used for backup must only be readable and/or writable by root or the backup user. | DISA STIG for Oracle Linux 5 v2r1 | Unix | ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION |
GEN002320 - Audio devices must have mode 0660 or less permissive - '/dev/audio*' | DISA STIG for Oracle Linux 5 v2r1 | Unix | ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION |
GEN002320 - Audio devices must have mode 0660 or less permissive - '/dev/snd/*' | DISA STIG for Oracle Linux 5 v2r1 | Unix | ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION |
GEN002330 - Audio devices must not have extended ACLs - '/dev/audio*' | DISA STIG for Oracle Linux 5 v2r1 | Unix | ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION |
GEN002330 - Audio devices must not have extended ACLs - '/dev/snd/*' | DISA STIG for Oracle Linux 5 v2r1 | Unix | ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION |
GEN002340 - Audio devices must be owned by root - '/dev/audio*' | DISA STIG for Oracle Linux 5 v2r1 | Unix | ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION |
GEN002360 - Audio devices must be group-owned by root, sys, bin, or system - '/dev/audio*' | DISA STIG for Oracle Linux 5 v2r1 | Unix | ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION |
GEN002520 - All public directories must be owned by root or an application account. | DISA STIG for Oracle Linux 5 v2r1 | Unix | ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION |
GEN002540 - All public directories must be group-owned by root, sys, bin, or an application group. | DISA STIG for Oracle Linux 5 v2r1 | Unix | ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION |
GEN004400 - Files executed through a mail aliases file must be owned by root and must reside within a directory owned and writable only by root. | DISA STIG for Oracle Linux 5 v2r1 | Unix | ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION |
GEN004420 - Files executed through a mail aliases file must have mode 0755 or less permissive. | DISA STIG for Oracle Linux 5 v2r1 | Unix | ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION |
GEN004430 - Files executed through a mail aliases file must not have extended ACLs. | DISA STIG for Oracle Linux 5 v2r1 | Unix | ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION |
GEN004480 - The SMTP service log file must be owned by root. | DISA STIG for Oracle Linux 5 v2r1 | Unix | ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION |
GEN004500 - The SMTP service log file must have mode 0644 or less permissive. | DISA STIG for Oracle Linux 5 v2r1 | Unix | ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION |
GEN004880 - The ftpusers file must exist. | DISA STIG for Oracle Linux 5 v2r1 | Unix | ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION |
GEN004900 - The ftpusers file must contain account names not allowed to use FTP. | DISA STIG for Oracle Linux 5 v2r1 | Unix | ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION |
GEN004920 - The ftpusers file must be owned by root - '/etc/vsftpd/ftpusers' | DISA STIG for Oracle Linux 5 v2r1 | Unix | ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION |
GEN004930 - The ftpusers file must be group-owned by root, bin, sys, or system - '/etc/ftpusers' | DISA STIG for Oracle Linux 5 v2r1 | Unix | ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION |
GEN004940 - The ftpusers file must have mode 0640 or less permissive - '/etc/ftpusers' | DISA STIG for Oracle Linux 5 v2r1 | Unix | ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION |
GEN004940 - The ftpusers file must have mode 0640 or less permissive - '/etc/vsftpd/ftpusers' | DISA STIG for Oracle Linux 5 v2r1 | Unix | ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION |
GEN005000 - Anonymous FTP accounts must not have a functional shell. | DISA STIG for Oracle Linux 5 v2r1 | Unix | ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION |
GEN005040 - All FTP users must have a default umask of 077 - '/etc/vsftpd/vsftpd.conf anon_umask' | DISA STIG for Oracle Linux 5 v2r1 | Unix | ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION |
GEN005040 - All FTP users must have a default umask of 077 - '/etc/xinetd.d/gssftp' | DISA STIG for Oracle Linux 5 v2r1 | Unix | ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION |
GEN005100 - The TFTP daemon must have mode 0755 or less permissive. | DISA STIG for Oracle Linux 5 v2r1 | Unix | ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION |
GEN005120 - The TFTP daemon must be configured to vendor specifications, including a dedicated TFTP user account, a non-login shell such as /bin/false, and a home directory owned by the TFTP user. | DISA STIG for Oracle Linux 5 v2r1 | Unix | ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION |
GEN005740 - The Network File System (NFS) export configuration file must be owned by root. | DISA STIG for Oracle Linux 5 v2r1 | Unix | ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION |
GEN005750 - The Network File System (NFS) export configuration file must be group-owned by root, bin, sys, or system. | DISA STIG for Oracle Linux 5 v2r1 | Unix | ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION |
GEN005760 - The Network File System (NFS) export configuration file must have mode 0644 or less permissive. | DISA STIG for Oracle Linux 5 v2r1 | Unix | ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION |
GEN005800 - All Network File System (NFS) exported system files and system directories must be owned by root. | DISA STIG for Oracle Linux 5 v2r1 | Unix | ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION |
MD3X-00-000460 - Database contents must be protected from unauthorized and unintended information transfer by enforcement of a data-transfer policy. | DISA STIG MongoDB Enterprise Advanced 3.x v2r2 OS | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
O112-C2-018900 - The DBMS must prevent unauthorized and unintended information transfer via shared system resources. | DISA STIG Oracle 11.2g v2r4 Database | OracleDB | SYSTEM AND COMMUNICATIONS PROTECTION |
O121-C2-003900 - The DBMS must restrict access to system tables and other configuration information or metadata to DBAs or other authorized users. | DISA STIG Oracle 12c v2r9 Database | OracleDB | SYSTEM AND COMMUNICATIONS PROTECTION |
O121-C2-012500 - DBMS backup and restoration files must be protected from unauthorized access. | DISA STIG Oracle 12c v2r9 Database | OracleDB | SYSTEM AND COMMUNICATIONS PROTECTION |
O121-C2-018900 - The DBMS must prevent unauthorized and unintended information transfer via shared system resources. | DISA STIG Oracle 12c v2r9 Database | OracleDB | SYSTEM AND COMMUNICATIONS PROTECTION |
SQL6-D0-010000 - Access to database files must be limited to relevant processes and to authorized, administrative users. | DISA STIG SQL Server 2016 Instance OS Audit v2r11 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
UBTU-16-010410 - All public directories must be owned by root to prevent unauthorized and unintended information transferred via shared system resources. | DISA STIG Ubuntu 16.04 LTS v2r3 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
WN10-00-000060 - Non system-created file shares on a system must limit access to groups that require it. | DISA Windows 10 STIG v2r8 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
WN10-CC-000155 - Solicited Remote Assistance must not be allowed. | DISA Windows 10 STIG v2r8 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
WN10-CC-000275 - Local drives must be prevented from sharing with Remote Desktop Session Hosts. | DISA Windows 10 STIG v2r8 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
WN10-EP-000310 - Windows 10 Kernel (Direct Memory Access) DMA Protection must be enabled. | DISA Windows 10 STIG v2r8 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
WN10-SO-000150 - Anonymous enumeration of shares must be restricted. | DISA Windows 10 STIG v2r8 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
WN10-SO-000165 - Anonymous access to Named Pipes and Shares must be restricted. | DISA Windows 10 STIG v2r8 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
WN12-SO-000055-DC - Named pipes that can be accessed anonymously must be configured with limited values on domain controllers. | DISA Windows Server 2012 and 2012 R2 DC STIG v3r7 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
WN12-SO-000055-MS - Named pipes that can be accessed anonymously must be configured to contain no values on member servers. | DISA Windows Server 2012 and 2012 R2 MS STIG v3r7 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
WN16-00-000250 - Non-system-created file shares on a system must limit access to groups that require it. | DISA Windows Server 2016 STIG v2r7 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
WN16-CC-000380 - Local drives must be prevented from sharing with Remote Desktop Session Hosts. | DISA Windows Server 2016 STIG v2r7 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
WN16-DC-000120 - Data files owned by users must be on a different logical partition from the directory server data files. | DISA Windows Server 2016 STIG v2r7 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
WN19-00-000230 - Windows Server 2019 non-system-created file shares must limit access to groups that require it. | DISA Windows Server 2019 STIG v2r8 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
WN19-SO-000230 - Windows Server 2019 must not allow anonymous enumeration of shares. | DISA Windows Server 2019 STIG v2r8 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |