Item Search

NameAudit NamePluginCategory
2.2.26 Ensure ldap_tls_cacert is set for LDAP - configCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIGUnix

ACCESS CONTROL

2.2.26 Ensure ldap_tls_cacert is set for LDAP - fileCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIGUnix

ACCESS CONTROL

2.2.27 Ensure ldap_id_use_start_tls is set for LDAP - LDAP authentication communications.CIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIGUnix

ACCESS CONTROL

2.2.28 Ensure ldap_tls_reqcert is set for LDAP - LDAP communications.CIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIGUnix

ACCESS CONTROL

5.3.17 Ensure only strong MAC algorithms are used - MACs employing FIPS 140-2 approved cryptographic hash algorithms.CIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIGUnix

ACCESS CONTROL

CASA-VN-000560 - The Cisco ASA remote access VPN server must be configured to use a FIPS-validated algorithm and hash function to protect the integrity of TLS remote access sessions - ssl cipherDISA STIG Cisco ASA VPN v1r1Cisco

ACCESS CONTROL

CASA-VN-000560 - The Cisco ASA remote access VPN server must be configured to use a FIPS-validated algorithm and hash function to protect the integrity of TLS remote access sessions - ssl versionDISA STIG Cisco ASA VPN v1r1Cisco

ACCESS CONTROL

CASA-VN-000630 - The Cisco ASA remote access VPN server must be configured to use SHA-2 or greater for hashing to protect the integrity of IPsec remote access sessions - IKE Phase 1DISA STIG Cisco ASA VPN v1r1Cisco

ACCESS CONTROL

CASA-VN-000630 - The Cisco ASA remote access VPN server must be configured to use SHA-2 or greater for hashing to protect the integrity of IPsec remote access sessions - IPsec SADISA STIG Cisco ASA VPN v1r1Cisco

ACCESS CONTROL

CNTR-K8-003350 - The Kubernetes API Server must prohibit communication using TLS version 1.0 and 1.1, and SSL 2.0 and 3.0.DISA STIG Kubernetes v1r5Unix

ACCESS CONTROL

EDGE-00-000046 - Edge must be configured to allow only TLS.DISA STIG Edge v1r4Windows

ACCESS CONTROL

FFOX-00-000002 - Firefox must be configured to allow only TLS 1.2 or above.DISA STIG Mozilla Firefox Linux v6r2Unix

ACCESS CONTROL

FFOX-00-000002 - Firefox must be configured to allow only TLS 1.2 or above.DISA STIG Mozilla Firefox Windows v6r2Windows

ACCESS CONTROL

FFOX-00-000002 - Firefox must be configured to allow only TLS 1.2 or above.DISA STIG Mozilla Firefox MacOS v6r2Unix

ACCESS CONTROL

GEN005306 - SNMP must require the use of a FIPS 140-2 cryptographic hash algorithm as part of its authentication and integrity methods.DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN005306 - SNMP service must require a FIPS 140-2 approved hash algorithm as part of its authentication and integrity methodsDISA STIG AIX 5.3 v1r2Unix

ACCESS CONTROL

GEN005306 - SNMP service must require a FIPS 140-2 approved hash algorithm as part of its authentication and integrity methodsDISA STIG AIX 6.1 v1r14Unix

ACCESS CONTROL

GEN005507 - SSH daemon must be configured to only use MACs employing FIPS 140-2 approved cryptographic hash algorithmsDISA STIG AIX 5.3 v1r2Unix

ACCESS CONTROL

GEN005507 - SSH daemon must be configured to only use MACs employing FIPS 140-2 approved cryptographic hash algorithmsDISA STIG AIX 6.1 v1r14Unix

ACCESS CONTROL

GEN005507 - The SSH daemon must be configured to only use Message Authentication Codes (MACs) employing FIPS 140-2 approved cryptographic hash algorithms.DISA STIG Solaris 10 SPARC v2r2Unix

ACCESS CONTROL

GEN005507 - The SSH daemon must be configured to only use Message Authentication Codes (MACs) employing FIPS 140-2 approved cryptographic hash algorithms.DISA STIG Solaris 10 X86 v2r2Unix

ACCESS CONTROL

GEN005507 - The SSH daemon must only use message authentication codes (MACs) that employ FIPS 140-2 cryptographic hash algorithms.DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN005512 - The SSH client must be configured to only use Message Authentication Codes (MACs) employing FIPS 140-2 approved cryptographic hash algorithms.DISA STIG Solaris 10 SPARC v2r2Unix

ACCESS CONTROL

GEN005512 - The SSH client must be configured to only use Message Authentication Codes (MACs) employing FIPS 140-2 approved cryptographic hash algorithms.DISA STIG Solaris 10 X86 v2r2Unix

ACCESS CONTROL

GEN005512 - The SSH client must only use MACs employing FIPS 140-2 approved cryptographic hash algorithmsDISA STIG AIX 5.3 v1r2Unix

ACCESS CONTROL

GEN005512 - The SSH client must only use MACs employing FIPS 140-2 approved cryptographic hash algorithmsDISA STIG AIX 6.1 v1r14Unix

ACCESS CONTROL

GEN005512 - The SSH client must only use message authentication codes (MACs) that employ FIPS 140-2 cryptographic hash algorithms.DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN007980 - If the system is using LDAP for authentication or account information, the system must use a TLS connection using FIPS 140-2 approved cryptographic algorithms - configuredDISA STIG Solaris 10 SPARC v2r2Unix

ACCESS CONTROL

GEN007980 - If the system is using LDAP for authentication or account information, the system must use a TLS connection using FIPS 140-2 approved cryptographic algorithms - serversDISA STIG Solaris 10 X86 v2r2Unix

ACCESS CONTROL

GEN007980 - If using LDAP for auth or account information, must use a TLS connection using FIPS 140-2 algorithms - '/etc/ldap.conf'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN007980 - If using LDAP for auth or account information, must use a TLS connection using FIPS 140-2 algorithms - 'ssl start_tls'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN007980 - If using LDAP for auth or account information, must use a TLS connection using FIPS 140-2 approved algorithms - 'tls_ciphers'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

OL08-00-010287 - The OL 8 SSH daemon must be configured to use system-wide crypto policies.DISA Oracle Linux 8 STIG v1r2Unix

ACCESS CONTROL

OL08-00-010293 - The OL 8 operating system must implement DoD-approved encryption in the OpenSSL package - /etc/pki/tls/openssl.cnfDISA Oracle Linux 8 STIG v1r2Unix

ACCESS CONTROL

OL08-00-010293 - The OL 8 operating system must implement DoD-approved encryption in the OpenSSL package - update-crypto-policiesDISA Oracle Linux 8 STIG v1r2Unix

ACCESS CONTROL

OL08-00-010294 - The OL 8 operating system must implement DoD-approved TLS encryption in the OpenSSL package.DISA Oracle Linux 8 STIG v1r2Unix

ACCESS CONTROL

OL08-00-010295 - The OL 8 operating system must implement DoD-approved TLS encryption in the GnuTLS package.DISA Oracle Linux 8 STIG v1r2Unix

ACCESS CONTROL

RHEL-08-010287 - The RHEL 8 SSH daemon must be configured to use system-wide crypto policies.DISA Red Hat Enterprise Linux 8 STIG v1r6Unix

ACCESS CONTROL

RHEL-08-010290 - The RHEL 8 SSH server must be configured to use only Message Authentication Codes (MACs) employing FIPS 140-2 validated cryptographic hash algorithms - MACs employing FIPS 140-2 validated cryptographic hash algorithmsDISA Red Hat Enterprise Linux 8 STIG v1r6Unix

ACCESS CONTROL

RHEL-08-010291 - The RHEL 8 operating system must implement DoD-approved encryption to protect the confidentiality of SSH server connections.DISA Red Hat Enterprise Linux 8 STIG v1r6Unix

ACCESS CONTROL

RHEL-08-010293 - The RHEL 8 operating system must implement DoD-approved encryption in the OpenSSL package - /etc/pki/tls/openssl.cnfDISA Red Hat Enterprise Linux 8 STIG v1r6Unix

ACCESS CONTROL

RHEL-08-010293 - The RHEL 8 operating system must implement DoD-approved encryption in the OpenSSL package - update-crypto-policiesDISA Red Hat Enterprise Linux 8 STIG v1r6Unix

ACCESS CONTROL

RHEL-08-010294 - The RHEL 8 operating system must implement DoD-approved TLS encryption in the OpenSSL package.DISA Red Hat Enterprise Linux 8 STIG v1r6Unix

ACCESS CONTROL

RHEL-08-010295 - The RHEL 8 operating system must implement DoD-approved TLS encryption in the GnuTLS package.DISA Red Hat Enterprise Linux 8 STIG v1r6Unix

ACCESS CONTROL

VCFL-67-000007 - vSphere Client must be configured to only communicate over TLS 1.2.DISA STIG VMware vSphere 6.7 Virgo Client v1r1Unix

ACCESS CONTROL

VCFL-67-000008 - vSphere Client must be configured to use the HTTPS scheme.DISA STIG VMware vSphere 6.7 Virgo Client v1r1Unix

ACCESS CONTROL

VCRP-67-000004 - The rhttpproxy must use cryptography to protect the integrity of remote sessions.DISA STIG VMware vSphere 6.7 RhttpProxy v1r2Unix

ACCESS CONTROL

WBSP-AS-000190 - The WebSphere Application Server security cookies must be set to HTTPOnly.DISA IBM WebSphere Traditional 9 Windows STIG v1r1Windows

ACCESS CONTROL

WBSP-AS-000190 - The WebSphere Application Server security cookies must be set to HTTPOnly.DISA IBM WebSphere Traditional 9 STIG v1r1 MiddlewareUnix

ACCESS CONTROL

WBSP-AS-000190 - The WebSphere Application Server security cookies must be set to HTTPOnly.DISA IBM WebSphere Traditional 9 STIG v1r1Unix

ACCESS CONTROL