Item Search

NameAudit NamePluginCategory
AMLS-NM-000350 - Arista MLS sessions must implement crypto mechanisms to protect the confidentiality of communications - api httpDISA STIG Arista MLS DCS-7000 Series NDM V1R2Arista

CONFIGURATION MANAGEMENT

AMLS-NM-000350 - Arista MLS sessions must implement crypto mechanisms to protect the confidentiality of communications - api httpsDISA STIG Arista MLS DCS-7000 Series NDM V1R2Arista

SYSTEM AND COMMUNICATIONS PROTECTION

AMLS-NM-000350 - Arista MLS sessions must implement crypto mechanisms to protect the confidentiality of communications - telnetDISA STIG Arista MLS DCS-7000 Series NDM V1R2Arista

CONFIGURATION MANAGEMENT

AOSX-09-000691 - Systems used for maintenance sessions must implement cryptographic mechanisms to protect the integrity of communications.DISA STIG Apple Mac OSX 10.9 v1r2Unix

CONFIGURATION MANAGEMENT

AOSX-10-000691 - Systems used for maintenance sessions must implement cryptographic mechanisms to protect the integrity of communications.DISA STIG Apple Mac OSX 10.10 v1r5Unix

CONFIGURATION MANAGEMENT

ARST-ND-000700 - The Arista network device must be configured to implement cryptographic mechanisms using a FIPS 140-2 approved algorithm to protect the confidentiality of remote maintenance sessions.DISA STIG Arista MLS EOS 4.2x NDM v1r1Arista
ARST-ND-000700 - The Arista network device must be configured to implement cryptographic mechanisms using a FIPS 140-2 approved algorithm to protect the confidentiality of remote maintenance sessions.DISA STIG Arista MLS EOS 4.2x NDM v2r1Arista

MAINTENANCE

CASA-ND-001150 - The Cisco ASA must be configured to implement cryptographic mechanisms using a FIPS 140-2 approved algorithm to protect the confidentiality of remote maintenance sessions - ssh cipherDISA STIG Cisco ASA NDM v1r1Cisco
CASA-ND-001150 - The Cisco ASA must be configured to implement cryptographic mechanisms using a FIPS 140-2 approved algorithm to protect the confidentiality of remote maintenance sessions - ssh cipherDISA STIG Cisco ASA NDM v1r5Cisco
CASA-ND-001150 - The Cisco ASA must be configured to implement cryptographic mechanisms using a FIPS 140-2 approved algorithm to protect the confidentiality of remote maintenance sessions - ssh cipherDISA STIG Cisco ASA NDM v1r3Cisco
CASA-ND-001150 - The Cisco ASA must be configured to implement cryptographic mechanisms using a FIPS 140-2 approved algorithm to protect the confidentiality of remote maintenance sessions - ssh cipherDISA STIG Cisco ASA NDM v1r6Cisco

MAINTENANCE

CASA-ND-001150 - The Cisco ASA must be configured to implement cryptographic mechanisms using a FIPS 140-2 approved algorithm to protect the confidentiality of remote maintenance sessions - ssh key-exchangeDISA STIG Cisco ASA NDM v1r5Cisco
CASA-ND-001150 - The Cisco ASA must be configured to implement cryptographic mechanisms using a FIPS 140-2 approved algorithm to protect the confidentiality of remote maintenance sessions - ssh key-exchangeDISA STIG Cisco ASA NDM v1r1Cisco
CASA-ND-001150 - The Cisco ASA must be configured to implement cryptographic mechanisms using a FIPS 140-2 approved algorithm to protect the confidentiality of remote maintenance sessions - ssh key-exchangeDISA STIG Cisco ASA NDM v1r3Cisco
CASA-ND-001150 - The Cisco ASA must be configured to implement cryptographic mechanisms using a FIPS 140-2 approved algorithm to protect the confidentiality of remote maintenance sessions - ssh key-exchangeDISA STIG Cisco ASA NDM v1r6Cisco

MAINTENANCE

CISC-ND-001210 - The Cisco switch must be configured to implement cryptographic mechanisms to protect the confidentiality of remote maintenance sessions.DISA STIG Cisco IOS XE Switch NDM v1r1Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

CISC-ND-001210 - The Cisco switch must be configured to implement cryptographic mechanisms to protect the confidentiality of remote maintenance sessions.DISA STIG Cisco NX-OS Switch NDM v1r1Cisco

IDENTIFICATION AND AUTHENTICATION

FGFW-ND-000265 - The FortiGate device must implement cryptographic mechanisms using a FIPS 140-2 approved algorithm to protect the confidentiality of remote maintenance sessions.DISA Fortigate Firewall NDM STIG v1r1FortiGate
FGFW-ND-000265 - The FortiGate device must implement cryptographic mechanisms using a FIPS 140-2 approved algorithm to protect the confidentiality of remote maintenance sessions.DISA Fortigate Firewall NDM STIG v1r3FortiGate
FGFW-ND-000265 - The FortiGate device must implement cryptographic mechanisms using a FIPS 140-2 approved algorithm to protect the confidentiality of remote maintenance sessions.DISA Fortigate Firewall NDM STIG v1r4FortiGate

MAINTENANCE

JUEX-NM-000520 - The Juniper EX switch must be configured to implement cryptographic mechanisms using a FIPS 140-2 approved algorithm to protect the confidentiality of remote maintenance sessions.DISA Juniper EX Series Network Device Management v1r4Juniper
JUEX-NM-000520 - The Juniper EX switch must be configured to implement cryptographic mechanisms using a FIPS 140-2 approved algorithm to protect the confidentiality of remote maintenance sessions.DISA Juniper EX Series Network Device Management v1r5Juniper

MAINTENANCE

JUNI-ND-001200 - The Juniper router must be configured to implement cryptographic mechanisms to protect the confidentiality of remote maintenance sessions.DISA STIG Juniper Router NDM v1r4Juniper

MAINTENANCE

JUNI-ND-001200 - The Juniper router must be configured to implement cryptographic mechanisms to protect the confidentiality of remote maintenance sessions.DISA STIG Juniper Router NDM v1r5Juniper

MAINTENANCE

PHTN-30-000064 - The Photon operating system must configure sshd to use FIPS 140-2 ciphers.DISA STIG VMware vSphere 7.0 Photon OS v1r2Unix
PHTN-67-000067 - The Photon operating system must configure sshd to use FIPS 140-2 ciphers.DISA STIG VMware vSphere 6.7 Photon OS v1r5Unix
PHTN-67-000067 - The Photon operating system must configure sshd to use FIPS 140-2 ciphers.DISA STIG VMware vSphere 6.7 Photon OS v1r3Unix
PHTN-67-000067 - The Photon operating system must configure sshd to use preferred ciphers.DISA STIG VMware vSphere 6.7 Photon OS v1r1Unix
RHEL-09-672010 - RHEL 9 must have the crypto-policies package installed.DISA Red Hat Enterprise Linux 9 STIG v1r1Unix
RHEL-09-672010 - RHEL 9 must have the crypto-policies package installed.DISA Red Hat Enterprise Linux 9 STIG v1r2Unix
RHEL-09-672020 - RHEL 9 crypto policy must not be overridden.DISA Red Hat Enterprise Linux 9 STIG v1r1Unix
RHEL-09-672020 - RHEL 9 crypto policy must not be overridden.DISA Red Hat Enterprise Linux 9 STIG v1r2Unix
RHEL-09-672045 - RHEL 9 must implement a system-wide encryption policy.DISA Red Hat Enterprise Linux 9 STIG v1r1Unix
SLES-15-010270 - The SUSE operating system SSH daemon must be configured to only use Message Authentication Codes (MACs) employing FIPS 140-2 approved cryptographic hash algorithms.DISA SLES 15 STIG v1r11Unix
SLES-15-010270 - The SUSE operating system SSH daemon must be configured to only use Message Authentication Codes (MACs) employing FIPS 140-2 approved cryptographic hash algorithms.DISA SLES 15 STIG v1r12Unix
SYMP-NM-000290 - The Symantec ProxySG Web Management Console and SSH sessions must implement cryptographic mechanisms to protect the confidentiality of nonlocal maintenance and diagnostic communications.DISA Symantec ProxySG Benchmark NDM v1r1BlueCoat

ACCESS CONTROL

SYMP-NM-000290 - The Symantec ProxySG Web Management Console and SSH sessions must implement cryptographic mechanisms to protect the confidentiality of nonlocal maintenance and diagnostic communications.DISA Symantec ProxySG Benchmark NDM v1r2BlueCoat

MAINTENANCE

UBTU-20-010044 - The Ubuntu operating system must configure the SSH daemon to use FIPS 140-2 approved ciphers to prevent the unauthorized disclosure of information and/or detect changes to information during transmission.DISA STIG Ubuntu 20.04 LTS v1r1Unix
UBTU-20-010044 - The Ubuntu operating system must configure the SSH daemon to use FIPS 140-2 approved ciphers to prevent the unauthorized disclosure of information and/or detect changes to information during transmission.DISA STIG Ubuntu 20.04 LTS v1r10Unix
UBTU-20-010044 - The Ubuntu operating system must configure the SSH daemon to use FIPS 140-2 approved ciphers to prevent the unauthorized disclosure of information and/or detect changes to information during transmission.DISA STIG Ubuntu 20.04 LTS v1r4Unix
WN11-CC-000350 - The Windows Remote Management (WinRM) service must not allow unencrypted traffic.DISA Windows 11 STIG v1r4Windows
WN11-CC-000350 - The Windows Remote Management (WinRM) service must not allow unencrypted traffic.DISA Windows 11 STIG v1r2Windows
WN11-CC-000350 - The Windows Remote Management (WinRM) service must not allow unencrypted traffic.DISA Windows 11 STIG v1r5Windows
WN11-CC-000350 - The Windows Remote Management (WinRM) service must not allow unencrypted traffic.DISA Windows 11 STIG v1r6Windows

MAINTENANCE

WN22-CC-000480 - Windows Server 2022 Windows Remote Management (WinRM) client must not allow unencrypted traffic.DISA Windows Server 2022 STIG v1r3Windows
WN22-CC-000480 - Windows Server 2022 Windows Remote Management (WinRM) client must not allow unencrypted traffic.DISA Windows Server 2022 STIG v1r1Windows
WN22-CC-000480 - Windows Server 2022 Windows Remote Management (WinRM) client must not allow unencrypted traffic.DISA Windows Server 2022 STIG v1r4Windows
WN22-CC-000510 - Windows Server 2022 Windows Remote Management (WinRM) service must not allow unencrypted traffic.DISA Windows Server 2022 STIG v1r1Windows
WN22-CC-000510 - Windows Server 2022 Windows Remote Management (WinRM) service must not allow unencrypted traffic.DISA Windows Server 2022 STIG v1r3Windows
WN22-CC-000510 - Windows Server 2022 Windows Remote Management (WinRM) service must not allow unencrypted traffic.DISA Windows Server 2022 STIG v1r4Windows