Item Search

NameAudit NamePluginCategory
Big Sur - Ensure all Federal Laws, Executive Orders, Directives, Policies, Regulations, Standards, and Guidance for Authentication to a Cryptographic Module are MetNIST macOS Big Sur v1.4.0 - 800-53r4 LowUnix

IDENTIFICATION AND AUTHENTICATION

Big Sur - Ensure all Federal Laws, Executive Orders, Directives, Policies, Regulations, Standards, and Guidance for Authentication to a Cryptographic Module are MetNIST macOS Big Sur v1.4.0 - 800-53r5 ModerateUnix

IDENTIFICATION AND AUTHENTICATION

Big Sur - Ensure all Federal Laws, Executive Orders, Directives, Policies, Regulations, Standards, and Guidance for Authentication to a Cryptographic Module are MetNIST macOS Big Sur v1.4.0 - All ProfilesUnix

IDENTIFICATION AND AUTHENTICATION

Big Sur - Ensure all Federal Laws, Executive Orders, Directives, Policies, Regulations, Standards, and Guidance for Authentication to a Cryptographic Module are MetNIST macOS Big Sur v1.4.0 - 800-53r4 ModerateUnix

IDENTIFICATION AND AUTHENTICATION

Big Sur - Ensure all Federal Laws, Executive Orders, Directives, Policies, Regulations, Standards, and Guidance for Authentication to a Cryptographic Module are MetNIST macOS Big Sur v1.4.0 - 800-53r5 LowUnix

IDENTIFICATION AND AUTHENTICATION

Big Sur - Ensure all Federal Laws, Executive Orders, Directives, Policies, Regulations, Standards, and Guidance for Authentication to a Cryptographic Module are MetNIST macOS Big Sur v1.4.0 - CNSSI 1253Unix

IDENTIFICATION AND AUTHENTICATION

Big Sur - Ensure all Federal Laws, Executive Orders, Directives, Policies, Regulations, Standards, and Guidance for Authentication to a Cryptographic Module are MetNIST macOS Big Sur v1.4.0 - 800-53r4 HighUnix

IDENTIFICATION AND AUTHENTICATION

Big Sur - Ensure all Federal Laws, Executive Orders, Directives, Policies, Regulations, Standards, and Guidance for Authentication to a Cryptographic Module are MetNIST macOS Big Sur v1.4.0 - 800-53r5 HighUnix

IDENTIFICATION AND AUTHENTICATION

Catalina - Ensure all Federal Laws, Executive Orders, Directives, Policies, Regulations, Standards, and Guidance for Authentication to a Cryptographic Module are MetNIST macOS Catalina v1.5.0 - CNSSI 1253Unix

IDENTIFICATION AND AUTHENTICATION

Catalina - Ensure all Federal Laws, Executive Orders, Directives, Policies, Regulations, Standards, and Guidance for Authentication to a Cryptographic Module are MetNIST macOS Catalina v1.5.0 - 800-53r4 LowUnix

IDENTIFICATION AND AUTHENTICATION

Catalina - Ensure all Federal Laws, Executive Orders, Directives, Policies, Regulations, Standards, and Guidance for Authentication to a Cryptographic Module are MetNIST macOS Catalina v1.5.0 - 800-53r4 ModerateUnix

IDENTIFICATION AND AUTHENTICATION

Catalina - Ensure all Federal Laws, Executive Orders, Directives, Policies, Regulations, Standards, and Guidance for Authentication to a Cryptographic Module are MetNIST macOS Catalina v1.5.0 - 800-53r5 ModerateUnix

IDENTIFICATION AND AUTHENTICATION

Catalina - Ensure all Federal Laws, Executive Orders, Directives, Policies, Regulations, Standards, and Guidance for Authentication to a Cryptographic Module are MetNIST macOS Catalina v1.5.0 - 800-53r4 HighUnix

IDENTIFICATION AND AUTHENTICATION

Catalina - Ensure all Federal Laws, Executive Orders, Directives, Policies, Regulations, Standards, and Guidance for Authentication to a Cryptographic Module are MetNIST macOS Catalina v1.5.0 - All ProfilesUnix

IDENTIFICATION AND AUTHENTICATION

Catalina - Ensure all Federal Laws, Executive Orders, Directives, Policies, Regulations, Standards, and Guidance for Authentication to a Cryptographic Module are MetNIST macOS Catalina v1.5.0 - 800-53r5 HighUnix

IDENTIFICATION AND AUTHENTICATION

Catalina - Ensure all Federal Laws, Executive Orders, Directives, Policies, Regulations, Standards, and Guidance for Authentication to a Cryptographic Module are MetNIST macOS Catalina v1.5.0 - 800-53r5 LowUnix

IDENTIFICATION AND AUTHENTICATION

CISC-L2-000030 - The Cisco switch must authenticate all VLAN Trunk Protocol (VTP) messages with a hash function using the most secured cryptographic algorithm available.DISA STIG Cisco NX-OS Switch L2S v2r1Cisco

IDENTIFICATION AND AUTHENTICATION

DB2X-00-004600 - DB2 must use NIST FIPS 140-2 validated cryptographic modules for cryptographic operations - DB2COMMDISA STIG IBM DB2 v10.5 LUW v1r4 OS LinuxUnix

IDENTIFICATION AND AUTHENTICATION

DTOO257 - Outlook - S/Mime interoperability with external clients for message handling must be configured.DISA STIG Office 2010 Outlook v1r13Windows

IDENTIFICATION AND AUTHENTICATION

DTOO257 - S/Mime interoperability with external clients for message handling must be configured.DISA STIG Microsoft Outlook 2013 v1r13Windows

IDENTIFICATION AND AUTHENTICATION

DTOO260 - Message formats must be set to use SMime.DISA STIG Microsoft Outlook 2013 v1r13Windows

IDENTIFICATION AND AUTHENTICATION

DTOO260 - Outlook - Message formats must be set to use SMime.DISA STIG Office 2010 Outlook v1r13Windows

IDENTIFICATION AND AUTHENTICATION

DTOO262 - Outlook - Run in FIPS compliant mode must be enforced.DISA STIG Office 2010 Outlook v1r13Windows

IDENTIFICATION AND AUTHENTICATION

DTOO262 - Run in FIPS compliant mode must be enforced.DISA STIG Microsoft Outlook 2013 v1r13Windows

IDENTIFICATION AND AUTHENTICATION

FGFW-ND-000255 - The FortiGate device must use FIPS 140-2 approved algorithms for authentication to a cryptographic module.DISA Fortigate Firewall NDM STIG v1r3FortiGate

IDENTIFICATION AND AUTHENTICATION

GEN000590 - The system must use a FIPS 140-2 approved cryptographic hashing algorithm for generating account password hashes.DISA STIG AIX 5.3 v1r2Unix

IDENTIFICATION AND AUTHENTICATION

MADB-10-004400 - MariaDB must use NIST FIPS 140-2 validated cryptographic modules for cryptographic operations. - fips_enabledDISA MariaDB Enterprise 10.x v1r2 OS LinuxUnix

IDENTIFICATION AND AUTHENTICATION

MADB-10-004400 - MariaDB must use NIST FIPS 140-2 validated cryptographic modules for cryptographic operations. - opensslDISA MariaDB Enterprise 10.x v1r2 OS LinuxUnix

IDENTIFICATION AND AUTHENTICATION

Monterey - Ensure all Federal Laws, Executive Orders, Directives, Policies, Regulations, Standards, and Guidance for Authentication to a Cryptographic Module are MetNIST macOS Monterey v1.0.0 - 800-53r5 HighUnix

IDENTIFICATION AND AUTHENTICATION

Monterey - Ensure all Federal Laws, Executive Orders, Directives, Policies, Regulations, Standards, and Guidance for Authentication to a Cryptographic Module are MetNIST macOS Monterey v1.0.0 - 800-53r4 LowUnix

IDENTIFICATION AND AUTHENTICATION

Monterey - Ensure all Federal Laws, Executive Orders, Directives, Policies, Regulations, Standards, and Guidance for Authentication to a Cryptographic Module are MetNIST macOS Monterey v1.0.0 - CNSSI 1253Unix

IDENTIFICATION AND AUTHENTICATION

Monterey - Ensure all Federal Laws, Executive Orders, Directives, Policies, Regulations, Standards, and Guidance for Authentication to a Cryptographic Module are MetNIST macOS Monterey v1.0.0 - 800-53r5 LowUnix

IDENTIFICATION AND AUTHENTICATION

Monterey - Ensure all Federal Laws, Executive Orders, Directives, Policies, Regulations, Standards, and Guidance for Authentication to a Cryptographic Module are MetNIST macOS Monterey v1.0.0 - 800-53r5 ModerateUnix

IDENTIFICATION AND AUTHENTICATION

Monterey - Ensure all Federal Laws, Executive Orders, Directives, Policies, Regulations, Standards, and Guidance for Authentication to a Cryptographic Module are MetNIST macOS Monterey v1.0.0 - All ProfilesUnix

IDENTIFICATION AND AUTHENTICATION

Monterey - Ensure all Federal Laws, Executive Orders, Directives, Policies, Regulations, Standards, and Guidance for Authentication to a Cryptographic Module are MetNIST macOS Monterey v1.0.0 - 800-53r4 ModerateUnix

IDENTIFICATION AND AUTHENTICATION

Monterey - Ensure all Federal Laws, Executive Orders, Directives, Policies, Regulations, Standards, and Guidance for Authentication to a Cryptographic Module are MetNIST macOS Monterey v1.0.0 - 800-53r4 HighUnix

IDENTIFICATION AND AUTHENTICATION

OL08-00-010161 - OL 8 must prevent system daemons from using Kerberos for authentication.DISA Oracle Linux 8 STIG v1r6Unix

IDENTIFICATION AND AUTHENTICATION

OL08-00-010163 - The krb5-server package must not be installed on OL 8.DISA Oracle Linux 8 STIG v1r6Unix

IDENTIFICATION AND AUTHENTICATION

RHEL-08-010159 - The RHEL 8 pam_unix.so module must be configured in the system-auth file to use a FIPS 140-2 approved cryptographic hashing algorithm for system authentication.DISA Red Hat Enterprise Linux 8 STIG v1r9Unix

IDENTIFICATION AND AUTHENTICATION

RHEL-08-010160 - The RHEL 8 pam_unix.so module must be configured in the password-auth file to use a FIPS 140-2 approved cryptographic hashing algorithm for system authentication.DISA Red Hat Enterprise Linux 8 STIG v1r9Unix

IDENTIFICATION AND AUTHENTICATION

RHEL-08-010161 - RHEL 8 must prevent system daemons from using Kerberos for authentication.DISA Red Hat Enterprise Linux 8 STIG v1r9Unix

IDENTIFICATION AND AUTHENTICATION

RHEL-08-010162 - The krb5-workstation package must not be installed on RHEL 8.DISA Red Hat Enterprise Linux 8 STIG v1r9Unix

IDENTIFICATION AND AUTHENTICATION

SPLK-CL-000430 - Splunk Enterprise must use TLS 1.2 and SHA-2 or higher cryptographic algorithms. - inputs.conf ciphersuiteDISA STIG Splunk Enterprise 8.x for Linux v1r3 STIG OSUnix

IDENTIFICATION AND AUTHENTICATION

SPLK-CL-000430 - Splunk Enterprise must use TLS 1.2 and SHA-2 or higher cryptographic algorithms. - ldap.conf TLS_CIPHER_SUITEDISA STIG Splunk Enterprise 8.x for Linux v1r3 STIG OSUnix

IDENTIFICATION AND AUTHENTICATION

SPLK-CL-000430 - Splunk Enterprise must use TLS 1.2 and SHA-2 or higher cryptographic algorithms. - ldap.conf TLS_PROTOCOL_MINDISA STIG Splunk Enterprise 8.x for Linux v1r3 STIG OSUnix

IDENTIFICATION AND AUTHENTICATION

SPLK-CL-000430 - Splunk Enterprise must use TLS 1.2 and SHA-2 or higher cryptographic algorithms. - outputs.conf ecdhCurvesDISA STIG Splunk Enterprise 8.x for Linux v1r3 STIG OSUnix

IDENTIFICATION AND AUTHENTICATION

SPLK-CL-000430 - Splunk Enterprise must use TLS 1.2 and SHA-2 or higher cryptographic algorithms. - server.conf ciphersuiteDISA STIG Splunk Enterprise 8.x for Linux v1r3 STIG OSUnix

IDENTIFICATION AND AUTHENTICATION

SPLK-CL-000430 - Splunk Enterprise must use TLS 1.2 and SHA-2 or higher cryptographic algorithms. - web.conf ecdhCurvesDISA STIG Splunk Enterprise 8.x for Linux v1r3 STIG OSUnix

IDENTIFICATION AND AUTHENTICATION

SPLK-CL-000430 - Splunk Enterprise must use TLS 1.2 and SHA-2 or higher cryptographic algorithms. - web.conf sslVersionsDISA STIG Splunk Enterprise 8.x for Linux v1r3 STIG OSUnix

IDENTIFICATION AND AUTHENTICATION

WN11-CC-000052 - Windows 11 must be configured to prioritize ECC Curves with longer key lengths first.DISA Windows 11 STIG v1r2Windows

IDENTIFICATION AND AUTHENTICATION