Big Sur - Configure the System to Protect Memory from Unauthorized Code Execution | NIST macOS Big Sur v1.4.0 - 800-53r4 High | Unix | SYSTEM AND INFORMATION INTEGRITY |
Big Sur - Configure the System to Protect Memory from Unauthorized Code Execution | NIST macOS Big Sur v1.4.0 - 800-53r5 Moderate | Unix | SYSTEM AND INFORMATION INTEGRITY |
Big Sur - Configure the System to Protect Memory from Unauthorized Code Execution | NIST macOS Big Sur v1.4.0 - All Profiles | Unix | SYSTEM AND INFORMATION INTEGRITY |
Big Sur - Configure the System to Protect Memory from Unauthorized Code Execution | NIST macOS Big Sur v1.4.0 - 800-53r4 Moderate | Unix | SYSTEM AND INFORMATION INTEGRITY |
Big Sur - Configure the System to Protect Memory from Unauthorized Code Execution | NIST macOS Big Sur v1.4.0 - 800-53r5 High | Unix | SYSTEM AND INFORMATION INTEGRITY |
Big Sur - Configure the System to Protect Memory from Unauthorized Code Execution | NIST macOS Big Sur v1.4.0 - CNSSI 1253 | Unix | SYSTEM AND INFORMATION INTEGRITY |
Catalina - Configure the System to Protect Memory from Unauthorized Code Execution | NIST macOS Catalina v1.5.0 - 800-53r4 High | Unix | SYSTEM AND INFORMATION INTEGRITY |
Catalina - Configure the System to Protect Memory from Unauthorized Code Execution | NIST macOS Catalina v1.5.0 - 800-53r5 High | Unix | SYSTEM AND INFORMATION INTEGRITY |
Catalina - Configure the System to Protect Memory from Unauthorized Code Execution | NIST macOS Catalina v1.5.0 - 800-53r5 Moderate | Unix | SYSTEM AND INFORMATION INTEGRITY |
Catalina - Configure the System to Protect Memory from Unauthorized Code Execution | NIST macOS Catalina v1.5.0 - 800-53r4 Moderate | Unix | SYSTEM AND INFORMATION INTEGRITY |
Catalina - Configure the System to Protect Memory from Unauthorized Code Execution | NIST macOS Catalina v1.5.0 - All Profiles | Unix | SYSTEM AND INFORMATION INTEGRITY |
Catalina - Configure the System to Protect Memory from Unauthorized Code Execution | NIST macOS Catalina v1.5.0 - CNSSI 1253 | Unix | SYSTEM AND INFORMATION INTEGRITY |
Monterey - Configure the System to Protect Memory from Unauthorized Code Execution | NIST macOS Monterey v1.0.0 - 800-53r4 Moderate | Unix | SYSTEM AND INFORMATION INTEGRITY |
Monterey - Configure the System to Protect Memory from Unauthorized Code Execution | NIST macOS Monterey v1.0.0 - All Profiles | Unix | SYSTEM AND INFORMATION INTEGRITY |
Monterey - Configure the System to Protect Memory from Unauthorized Code Execution | NIST macOS Monterey v1.0.0 - 800-53r5 High | Unix | SYSTEM AND INFORMATION INTEGRITY |
Monterey - Configure the System to Protect Memory from Unauthorized Code Execution | NIST macOS Monterey v1.0.0 - 800-53r4 High | Unix | SYSTEM AND INFORMATION INTEGRITY |
Monterey - Configure the System to Protect Memory from Unauthorized Code Execution | NIST macOS Monterey v1.0.0 - 800-53r5 Moderate | Unix | SYSTEM AND INFORMATION INTEGRITY |
Monterey - Configure the System to Protect Memory from Unauthorized Code Execution | NIST macOS Monterey v1.0.0 - CNSSI 1253 | Unix | SYSTEM AND INFORMATION INTEGRITY |
OL08-00-010420 - OL 8 must implement non-executable data to protect its memory from unauthorized code execution - /proc/cpuinfo | DISA Oracle Linux 8 STIG v1r2 | Unix | |
OL08-00-010420 - OL 8 must implement non-executable data to protect its memory from unauthorized code execution. | DISA Oracle Linux 8 STIG v1r8 | Unix | |
OL08-00-010430 - OL 8 must implement address space layout randomization (ASLR) to protect its memory from unauthorized code execution - ASLR to protect its memory from unauthorized code execution | DISA Oracle Linux 8 STIG v1r8 | Unix | |
OL08-00-010430 - OL 8 must implement address space layout randomization (ASLR) to protect its memory from unauthorized code execution - conf files | DISA Oracle Linux 8 STIG v1r4 | Unix | |
OL08-00-010430 - OL 8 must implement address space layout randomization (ASLR) to protect its memory from unauthorized code execution - sysctl | DISA Oracle Linux 8 STIG v1r4 | Unix | |
OL08-00-010430 - OL 8 must implement address space layout randomization (ASLR) to protect its memory from unauthorized code execution. | DISA Oracle Linux 8 STIG v1r10 | Unix | |
RHEL-08-010420 - RHEL 8 must implement non-executable data to protect its memory from unauthorized code execution - /proc/cpuinfo | DISA Red Hat Enterprise Linux 8 STIG v1r3 | Unix | |
RHEL-08-010420 - RHEL 8 must implement non-executable data to protect its memory from unauthorized code execution - dmesg NX | DISA Red Hat Enterprise Linux 8 STIG v1r6 | Unix | |
RHEL-08-010420 - RHEL 8 must implement non-executable data to protect its memory from unauthorized code execution - dmesg NX | DISA Red Hat Enterprise Linux 8 STIG v1r3 | Unix | |
RHEL-08-010430 - RHEL 8 must implement address space layout randomization (ASLR) to protect its memory from unauthorized code execution - conf files | DISA Red Hat Enterprise Linux 8 STIG v1r9 | Unix | |
RHEL-08-010430 - RHEL 8 must implement address space layout randomization (ASLR) to protect its memory from unauthorized code execution - conf files | DISA Red Hat Enterprise Linux 8 STIG v1r8 | Unix | |
RHEL-08-010430 - RHEL 8 must implement address space layout randomization (ASLR) to protect its memory from unauthorized code execution - sysctl | DISA Red Hat Enterprise Linux 8 STIG v1r9 | Unix | |
RHEL-08-010430 - RHEL 8 must implement address space layout randomization (ASLR) to protect its memory from unauthorized code execution - sysctl | DISA Red Hat Enterprise Linux 8 STIG v1r6 | Unix | |
RHEL-08-010430 - RHEL 8 must implement address space layout randomization (ASLR) to protect its memory from unauthorized code execution. | DISA Red Hat Enterprise Linux 8 STIG v1r13 | Unix | |
RHEL-08-010430 - RHEL 8 must implement address space layout randomization (ASLR) to protect its memory from unauthorized code execution. - 99-*.conf | DISA Red Hat Enterprise Linux 8 STIG v1r5 | Unix | |
RHEL-09-213110 - RHEL 9 must implement nonexecutable data to protect its memory from unauthorized code execution. | DISA Red Hat Enterprise Linux 9 STIG v1r2 | Unix | |
SLES-15-010540 - The SUSE operating system must implement kptr-restrict to prevent the leaking of internal kernel addresses. | DISA SLES 15 STIG v1r6 | Unix | |
SLES-15-010550 - Address space layout randomization (ASLR) must be implemented by the SUSE operating system to protect memory from unauthorized code execution. | DISA SLES 15 STIG v1r10 | Unix | |
SLES-15-010550 - Address space layout randomization (ASLR) must be implemented by the SUSE operating system to protect memory from unauthorized code execution. | DISA SLES 15 STIG v1r6 | Unix | |
UBTU-20-010447 - The Ubuntu operating system must implement non-executable data to protect its memory from unauthorized code execution. | DISA STIG Ubuntu 20.04 LTS v1r4 | Unix | |
UBTU-20-010447 - The Ubuntu operating system must implement nonexecutable data to protect its memory from unauthorized code execution. | DISA STIG Ubuntu 20.04 LTS v1r9 | Unix | |
UBTU-20-010448 - The Ubuntu operating system must implement address space layout randomization to protect its memory from unauthorized code execution | DISA STIG Ubuntu 20.04 LTS v1r9 | Unix | |
UBTU-20-010448 - The Ubuntu operating system must implement address space layout randomization to protect its memory from unauthorized code execution - proc | DISA STIG Ubuntu 20.04 LTS v1r4 | Unix | |
UBTU-20-010448 - The Ubuntu operating system must implement address space layout randomization to protect its memory from unauthorized code execution - proc | DISA STIG Ubuntu 20.04 LTS v1r5 | Unix | |
UBTU-20-010448 - The Ubuntu operating system must implement address space layout randomization to protect its memory from unauthorized code execution - proc | DISA STIG Ubuntu 20.04 LTS v1r1 | Unix | |
UBTU-20-010448 - The Ubuntu operating system must implement address space layout randomization to protect its memory from unauthorized code execution - sysctl | DISA STIG Ubuntu 20.04 LTS v1r1 | Unix | |
UBTU-20-010448 - The Ubuntu operating system must implement address space layout randomization to protect its memory from unauthorized code execution. | DISA STIG Ubuntu 20.04 LTS v1r9 | Unix | |
UBTU-22-213025 - Ubuntu 22.04 LTS must implement nonexecutable data to protect its memory from unauthorized code execution. | DISA STIG Canonical Ubuntu 22.04 LTS v2r1 | Unix | |
UBTU-22-213025 - Ubuntu 22.04 LTS must implement nonexecutable data to protect its memory from unauthorized code execution. | DISA STIG Canonical Ubuntu 22.04 LTS v1r1 | Unix | |
WN11-00-000145 - Data Execution Prevention (DEP) must be configured to at least OptOut. | DISA Windows 11 STIG v1r6 | Windows | |
WN11-00-000150 - Structured Exception Handling Overwrite Protection (SEHOP) must be enabled. | DISA Windows 11 STIG v1r2 | Windows | |
WN11-CC-000215 - Explorer Data Execution Prevention must be enabled. | DISA Windows 11 STIG v1r2 | Windows | |