Item Search

NameAudit NamePluginCategory
1.6.1.3 Ensure SELinux policy is configuredCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIGUnix

ACCESS CONTROL, SYSTEM AND INFORMATION INTEGRITY

1.6.1.5 Ensure the SELinux mode is enforcingCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIGUnix

ACCESS CONTROL, SYSTEM AND INFORMATION INTEGRITY

APPL-14-005100 - The macOS system must ensure secure boot level set to full.DISA Apple macOS 14 (Sonoma) STIG v2r2Unix

SYSTEM AND INFORMATION INTEGRITY

APPL-15-005100 - The macOS system must ensure Secure Boot level is set to 'full'.DISA Apple macOS 15 (Sequoia) STIG v1r1Unix

SYSTEM AND INFORMATION INTEGRITY

ESXI-80-000085 The ESXi host must implement Secure Boot enforcement.DISA VMware vSphere 8.0 ESXi STIG OS v2r1Unix

AUDIT AND ACCOUNTABILITY, SYSTEM AND INFORMATION INTEGRITY

GEN006570 - The file integrity tool must be configured to verify ACLs - configDISA STIG Solaris 10 SPARC v2r4Unix

SYSTEM AND INFORMATION INTEGRITY

GEN006570 - The file integrity tool must be configured to verify ACLs - configDISA STIG Solaris 10 X86 v2r4Unix

SYSTEM AND INFORMATION INTEGRITY

GEN006570 - The file integrity tool must be configured to verify ACLs - usedDISA STIG Solaris 10 X86 v2r4Unix

SYSTEM AND INFORMATION INTEGRITY

GEN006570 - The file integrity tool must be configured to verify ACLs - usedDISA STIG Solaris 10 SPARC v2r4Unix

SYSTEM AND INFORMATION INTEGRITY

GEN006570 - The file integrity tool must be configured to verify ACLs.DISA STIG for Oracle Linux 5 v2r1Unix

SYSTEM AND INFORMATION INTEGRITY

GEN006571 - The file integrity tool must be configured to verify extended attributes - configDISA STIG Solaris 10 X86 v2r4Unix

SYSTEM AND INFORMATION INTEGRITY

GEN006571 - The file integrity tool must be configured to verify extended attributes - configDISA STIG Solaris 10 SPARC v2r4Unix

SYSTEM AND INFORMATION INTEGRITY

GEN006571 - The file integrity tool must be configured to verify extended attributes - usedDISA STIG Solaris 10 X86 v2r4Unix

SYSTEM AND INFORMATION INTEGRITY

GEN006571 - The file integrity tool must be configured to verify extended attributes - usedDISA STIG Solaris 10 SPARC v2r4Unix

SYSTEM AND INFORMATION INTEGRITY

GEN006571 - The file integrity tool must be configured to verify extended attributes.DISA STIG for Oracle Linux 5 v2r1Unix

SYSTEM AND INFORMATION INTEGRITY

OL07-00-020029 - The Oracle Linux operating system must use a file integrity tool to verify correct operation of all security functions.DISA Oracle Linux 7 STIG v2r14Unix

SYSTEM AND INFORMATION INTEGRITY

OL07-00-020210 - The Oracle Linux operating system must enable SELinux.DISA Oracle Linux 7 STIG v2r14Unix

ACCESS CONTROL, SYSTEM AND INFORMATION INTEGRITY

OL07-00-020220 - The Oracle Linux operating system must enable the SELinux targeted policy.DISA Oracle Linux 7 STIG v2r14Unix

ACCESS CONTROL, SYSTEM AND INFORMATION INTEGRITY

OL08-00-010359 - The OL 8 operating system must use a file integrity tool to verify correct operation of all security functions.DISA Oracle Linux 8 STIG v2r2Unix

SYSTEM AND INFORMATION INTEGRITY

OL08-00-010450 - OL 8 must enable the SELinux targeted policy.DISA Oracle Linux 8 STIG v2r2Unix

SYSTEM AND INFORMATION INTEGRITY

PHTN-30-000013 - The Photon operating system must have the auditd service running.DISA STIG VMware vSphere 7.0 Photon OS v1r3Unix

AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY

PHTN-67-000018 - The Photon operating system must have the auditd service running.DISA STIG VMware vSphere 6.7 Photon OS v1r6Unix

AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY

RHEL-06-000017 - The system must use a Linux Security Module at boot time.DISA Red Hat Enterprise Linux 6 STIG v2r2Unix

ACCESS CONTROL, SYSTEM AND INFORMATION INTEGRITY

RHEL-07-020029 - The Red Hat Enterprise Linux operating system must use a file integrity tool to verify correct operation of all security functions.DISA Red Hat Enterprise Linux 7 STIG v3r15Unix

SYSTEM AND INFORMATION INTEGRITY

RHEL-07-020210 - The Red Hat Enterprise Linux operating system must enable SELinux.DISA Red Hat Enterprise Linux 7 STIG v3r15Unix

ACCESS CONTROL, SYSTEM AND INFORMATION INTEGRITY

RHEL-07-020220 - The Red Hat Enterprise Linux operating system must enable the SELinux targeted policy.DISA Red Hat Enterprise Linux 7 STIG v3r15Unix

ACCESS CONTROL, SYSTEM AND INFORMATION INTEGRITY

RHEL-08-010359 - The RHEL 8 operating system must use a file integrity tool to verify correct operation of all security functions.DISA Red Hat Enterprise Linux 8 STIG v2r1Unix

SYSTEM AND INFORMATION INTEGRITY

RHEL-08-010450 - RHEL 8 must enable the SELinux targeted policy.DISA Red Hat Enterprise Linux 8 STIG v2r1Unix

SYSTEM AND INFORMATION INTEGRITY

RHEL-09-431010 - RHEL 9 must use a Linux Security Module configured to enforce limits on system services.DISA Red Hat Enterprise Linux 9 STIG v2r2Unix

SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY

RHEL-09-431015 - RHEL 9 must enable the SELinux targeted policy.DISA Red Hat Enterprise Linux 9 STIG v2r2Unix

SYSTEM AND INFORMATION INTEGRITY

RHEL-09-651010 - RHEL 9 must have the AIDE package installed.DISA Red Hat Enterprise Linux 9 STIG v2r2Unix

CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY

SLES-12-010499 - The SUSE operating system must use a file integrity tool to verify correct operation of all security functions.DISA SLES 12 STIG v2r13Unix

SYSTEM AND INFORMATION INTEGRITY

SLES-12-010500 - Advanced Intrusion Detection Environment (AIDE) must verify the baseline SUSE operating system configuration at least weekly.DISA SLES 12 STIG v2r13Unix

CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY

SLES-15-010419 - The SUSE operating system must use a file integrity tool to verify correct operation of all security functions.DISA SLES 15 STIG v2r2Unix

SYSTEM AND INFORMATION INTEGRITY

SLES-15-010420 - Advanced Intrusion Detection Environment (AIDE) must verify the baseline SUSE operating system configuration at least weekly.DISA SLES 15 STIG v2r2Unix

CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY

SOL-11.1-090250 - The operating system must verify the correct operation of security functions in accordance with organization-defined conditions and in accordance with organization-defined frequency (if periodic verification).DISA STIG Solaris 11 X86 v3r1Unix

SYSTEM AND INFORMATION INTEGRITY

SOL-11.1-090250 - The operating system must verify the correct operation of security functions in accordance with organization-defined conditions and in accordance with organization-defined frequency (if periodic verification).DISA STIG Solaris 11 SPARC v3r1Unix

SYSTEM AND INFORMATION INTEGRITY

SOL-11.1-090270 - The operating system must identify potentially security-relevant error conditions.DISA STIG Solaris 11 X86 v3r1Unix

SYSTEM AND INFORMATION INTEGRITY

SOL-11.1-090270 - The operating system must identify potentially security-relevant error conditions.DISA STIG Solaris 11 SPARC v3r1Unix

SYSTEM AND INFORMATION INTEGRITY

UBTU-16-010500 - A file integrity tool must be installed to verify correct operation of all security functions in the Ubuntu operating system.DISA STIG Ubuntu 16.04 LTS v2r3Unix

SYSTEM AND INFORMATION INTEGRITY

UBTU-18-010515 - The Ubuntu operating system must use a file integrity tool to verify correct operation of all security functions.DISA STIG Ubuntu 18.04 LTS v2r15Unix

SYSTEM AND INFORMATION INTEGRITY

UBTU-20-010450 - The Ubuntu operating system must use a file integrity tool to verify correct operation of all security functions.DISA STIG Ubuntu 20.04 LTS v2r1Unix

SYSTEM AND INFORMATION INTEGRITY

UBTU-22-651010 - Ubuntu 22.04 LTS must use a file integrity tool to verify correct operation of all security functions.DISA STIG Canonical Ubuntu 22.04 LTS v2r2Unix

SYSTEM AND INFORMATION INTEGRITY

UBTU-22-651015 - Ubuntu 22.04 LTS must configure AIDE to perform file integrity checking on the file system.DISA STIG Canonical Ubuntu 22.04 LTS v2r2Unix

SYSTEM AND INFORMATION INTEGRITY