Item Search

NameAudit NamePluginCategory
AS24-U2-000680 - The Apache web server must restrict inbound connections from nonsecure zones.DISA STIG Apache Server 2.4 Unix Site v2r4 MiddlewareUnix

ACCESS CONTROL

AS24-U2-000680 - The Apache web server must restrict inbound connections from nonsecure zones.DISA STIG Apache Server 2.4 Unix Site v2r4Unix

ACCESS CONTROL

F5BI-AS-000157 - To protect against data mining, the BIG-IP ASM module must be configured to prevent code injection attacks from being launched against data storage objects, including, at a minimum, databases, database records, queries, and fields when providing content filtering to virtual servers.DISA F5 BIG-IP Application Security Manager STIG v2r1F5

ACCESS CONTROL

F5BI-AS-000159 - To protect against data mining, the BIG-IP ASM module must be configured to prevent code injection attacks launched against application objects, including, at a minimum, application URLs and application code when providing content filtering to virtual servers.DISA F5 BIG-IP Application Security Manager STIG v2r1F5

ACCESS CONTROL

F5BI-AS-000161 - To protect against data mining, The BIG-IP ASM module must be configured to prevent SQL injection attacks launched against data storage objects, including, at a minimum, databases, database records, and database fields when providing content filtering to virtual servers.DISA F5 BIG-IP Application Security Manager STIG v2r1F5

ACCESS CONTROL

F5BI-AS-000163 - To protect against data mining, The BIG-IP ASM module must be configured to detect code injection attacks from being launched against data storage objects, including, at a minimum, databases, database records, queries, and fields when providing content filtering to virtual servers.DISA F5 BIG-IP Application Security Manager STIG v2r1F5

ACCESS CONTROL

F5BI-AS-000165 - To protect against data mining, The BIG-IP ASM module must be configured to detect SQL injection attacks launched against data storage objects, including, at a minimum, databases, database records, and database fields when providing content filtering to virtual servers.DISA F5 BIG-IP Application Security Manager STIG v2r1F5

ACCESS CONTROL

F5BI-AS-000167 - The BIG-IP ASM module must be configured to detect code injection attacks launched against application objects including, at a minimum, application URLs and application code, when providing content filtering to virtual servers.DISA F5 BIG-IP Application Security Manager STIG v2r1F5

ACCESS CONTROL

F5BI-LT-000157 - To protect against data mining, the BIG-IP Core implementation must be configured to prevent code injection attacks from being launched against data storage objects, including, at a minimum, databases, database records, queries, and fields when providing content filtering to virtual servers.DISA F5 BIG-IP Local Traffic Manager STIG v2r3F5

ACCESS CONTROL

F5BI-LT-000159 - To protect against data mining, the BIG-IP Core implementation providing content filtering must be configured to prevent code injection attacks from being launched against application objects, including, at a minimum, application URLs and application code.DISA F5 BIG-IP Local Traffic Manager STIG v2r3F5

ACCESS CONTROL

F5BI-LT-000161 - To protect against data mining, the BIG-IP Core implementation providing content filtering must be configured to prevent SQL injection attacks from being launched against data storage objects, including, at a minimum, databases, database records, and database fields.DISA F5 BIG-IP Local Traffic Manager STIG v2r3F5

ACCESS CONTROL

F5BI-LT-000163 - To protect against data mining, the BIG-IP Core implementation providing content filtering must be configured to detect code injection attacks being launched against data storage objects.DISA F5 BIG-IP Local Traffic Manager STIG v2r3F5

ACCESS CONTROL

F5BI-LT-000165 - To protect against data mining, the BIG-IP Core implementation providing content filtering must be configured to detect SQL injection attacks being launched against data storage objects, including, at a minimum, databases, database records, and database fields.DISA F5 BIG-IP Local Traffic Manager STIG v2r3F5

ACCESS CONTROL

F5BI-LT-000167 - The BIG-IP Core implementation must be configured to detect code injection attacks being launched against application objects, including, at a minimum, application URLs and application code, when providing content filtering to virtual servers.DISA F5 BIG-IP Local Traffic Manager STIG v2r3F5

ACCESS CONTROL

JUSX-IP-000011 - To protect against unauthorized data mining, the Juniper Networks SRX Series Gateway IDPS must prevent code injection attacks launched against data storage objects, including, at a minimum, databases, database records, queries, and fields.DISA Juniper SRX Services Gateway IDPS v1r2Juniper

ACCESS CONTROL

JUSX-IP-000012 - To protect against unauthorized data mining, the Juniper Networks SRX Series Gateway IDPS must prevent code injection attacks launched against application objects, including, at a minimum, application URLs and application code.DISA Juniper SRX Services Gateway IDPS v1r2Juniper

ACCESS CONTROL

JUSX-IP-000013 - To protect against unauthorized data mining, the Juniper Networks SRX Series Gateway IDPS must prevent SQL injection attacks launched against data storage objects, including, at a minimum, databases, database records, and database fields.DISA Juniper SRX Services Gateway IDPS v1r2Juniper

ACCESS CONTROL

JUSX-IP-000014 - To protect against unauthorized data mining, the Juniper Networks SRX Series Gateway IDPS must detect code injection attacks launched against data storage objects, including, at a minimum, databases, database records, queries, and fields.DISA Juniper SRX Services Gateway IDPS v1r2Juniper

ACCESS CONTROL

JUSX-IP-000015 - To protect against unauthorized data mining, the Juniper Networks SRX Series Gateway IDPS must detect code injection attacks launched against application objects, including, at a minimum, application URLs and application code.DISA Juniper SRX Services Gateway IDPS v1r2Juniper

ACCESS CONTROL

JUSX-IP-000016 - To protect against unauthorized data mining, the Juniper Networks SRX Series Gateway IDPS must detect SQL injection attacks launched against data storage objects, including, at a minimum, databases, database records, and database fields.DISA Juniper SRX Services Gateway IDPS v1r2Juniper

ACCESS CONTROL

PANW-AG-000080 - To protect against data mining, the Palo Alto Networks security platform must detect and prevent SQL and other code injection attacks launched against data storage objects, including, at a minimum, databases, database records, queries, and fields.DISA STIG Palo Alto ALG v2r4Palo_Alto

ACCESS CONTROL

PANW-AG-000081 - To protect against data mining, the Palo Alto Networks security platform must detect and prevent code injection attacks launched against application objects including, at a minimum, application URLs and application code.DISA STIG Palo Alto ALG v2r4Palo_Alto

ACCESS CONTROL

PANW-IP-000032 - To protect against unauthorized data mining, the Palo Alto Networks security platform must detect and prevent SQL and other code injection attacks launched against data storage objects, including, at a minimum, databases, database records, queries, and fields.DISA STIG Palo Alto IDPS v2r3Palo_Alto

ACCESS CONTROL